Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
PojavLauncherTeam
GitHub Repository: PojavLauncherTeam/mobile
Path: blob/master/test/jdk/sun/security/pkcs11/tls/TestLeadingZeroesP11.java
41155 views
1
/*
2
* Copyright (c) 2013, 2021, Oracle and/or its affiliates. All rights reserved.
3
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4
*
5
* This code is free software; you can redistribute it and/or modify it
6
* under the terms of the GNU General Public License version 2 only, as
7
* published by the Free Software Foundation.
8
*
9
* This code is distributed in the hope that it will be useful, but WITHOUT
10
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12
* version 2 for more details (a copy is included in the LICENSE file that
13
* accompanied this code).
14
*
15
* You should have received a copy of the GNU General Public License version
16
* 2 along with this work; if not, write to the Free Software Foundation,
17
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18
*
19
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20
* or visit www.oracle.com if you need additional information or have any
21
* questions.
22
*/
23
24
/*
25
* @test
26
* @bug 8014618
27
* @summary Need to strip leading zeros in TlsPremasterSecret of DHKeyAgreement
28
* @library /test/lib ..
29
* @author Pasi Eronen
30
* @modules jdk.crypto.cryptoki
31
* @run main/othervm TestLeadingZeroesP11
32
* @run main/othervm -Djava.security.manager=allow TestLeadingZeroesP11 sm
33
*/
34
35
36
import java.security.KeyFactory;
37
import java.security.PrivateKey;
38
import java.security.Provider;
39
import java.security.PublicKey;
40
import java.security.spec.PKCS8EncodedKeySpec;
41
import java.security.spec.X509EncodedKeySpec;
42
import java.util.HexFormat;
43
import javax.crypto.KeyAgreement;
44
45
/**
46
* Test that leading zeroes are stripped in TlsPremasterSecret case,
47
* but are left as-is in other cases.
48
*
49
* We use pre-generated keypairs, since with randomly generated keypairs,
50
* a leading zero happens only (roughly) 1 out of 256 cases.
51
*/
52
53
public class TestLeadingZeroesP11 extends PKCS11Test {
54
55
// Hex formatter to upper case with ":" delimiter
56
private static final HexFormat HEX = HexFormat.ofDelimiter(":").withUpperCase();
57
58
public static void main(String[] args) throws Exception {
59
main(new TestLeadingZeroesP11(), args);
60
}
61
62
@Override
63
public void main(Provider p) throws Exception {
64
65
// decode pre-generated keypairs
66
KeyFactory kfac = KeyFactory.getInstance("DH", p);
67
PublicKey alicePubKey =
68
kfac.generatePublic(new X509EncodedKeySpec(alicePubKeyEnc));
69
PublicKey bobPubKey =
70
kfac.generatePublic(new X509EncodedKeySpec(bobPubKeyEnc));
71
PrivateKey alicePrivKey =
72
kfac.generatePrivate(new PKCS8EncodedKeySpec(alicePrivKeyEnc));
73
PrivateKey bobPrivKey =
74
kfac.generatePrivate(new PKCS8EncodedKeySpec(bobPrivKeyEnc));
75
76
// generate normal shared secret
77
KeyAgreement aliceKeyAgree = KeyAgreement.getInstance("DH", p);
78
aliceKeyAgree.init(alicePrivKey);
79
aliceKeyAgree.doPhase(bobPubKey, true);
80
byte[] sharedSecret = aliceKeyAgree.generateSecret();
81
System.out.println("shared secret:\n" + HEX.formatHex(sharedSecret));
82
83
// verify that leading zero is present
84
if (sharedSecret.length != 128) {
85
throw new Exception("Unexpected shared secret length");
86
}
87
if (sharedSecret[0] != 0) {
88
throw new Exception("First byte is not zero as expected");
89
}
90
91
// now, test TLS premaster secret
92
aliceKeyAgree.init(alicePrivKey);
93
aliceKeyAgree.doPhase(bobPubKey, true);
94
byte[] tlsPremasterSecret =
95
aliceKeyAgree.generateSecret("TlsPremasterSecret").getEncoded();
96
System.out.println(
97
"tls premaster secret:\n" + HEX.formatHex(tlsPremasterSecret));
98
99
// check that leading zero has been stripped
100
if (tlsPremasterSecret.length != 127) {
101
throw new Exception("Unexpected TLS premaster secret length");
102
}
103
if (tlsPremasterSecret[0] == 0) {
104
throw new Exception("First byte is zero");
105
}
106
for (int i = 0; i < tlsPremasterSecret.length; i++) {
107
if (tlsPremasterSecret[i] != sharedSecret[i+1]) {
108
throw new Exception("Shared secrets differ");
109
}
110
}
111
112
}
113
114
private static final byte alicePubKeyEnc[] = {
115
(byte)0x30, (byte)0x82, (byte)0x01, (byte)0x24,
116
(byte)0x30, (byte)0x81, (byte)0x99, (byte)0x06,
117
(byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48,
118
(byte)0x86, (byte)0xF7, (byte)0x0D, (byte)0x01,
119
(byte)0x03, (byte)0x01, (byte)0x30, (byte)0x81,
120
(byte)0x8B, (byte)0x02, (byte)0x81, (byte)0x81,
121
(byte)0x00, (byte)0xF4, (byte)0x88, (byte)0xFD,
122
(byte)0x58, (byte)0x4E, (byte)0x49, (byte)0xDB,
123
(byte)0xCD, (byte)0x20, (byte)0xB4, (byte)0x9D,
124
(byte)0xE4, (byte)0x91, (byte)0x07, (byte)0x36,
125
(byte)0x6B, (byte)0x33, (byte)0x6C, (byte)0x38,
126
(byte)0x0D, (byte)0x45, (byte)0x1D, (byte)0x0F,
127
(byte)0x7C, (byte)0x88, (byte)0xB3, (byte)0x1C,
128
(byte)0x7C, (byte)0x5B, (byte)0x2D, (byte)0x8E,
129
(byte)0xF6, (byte)0xF3, (byte)0xC9, (byte)0x23,
130
(byte)0xC0, (byte)0x43, (byte)0xF0, (byte)0xA5,
131
(byte)0x5B, (byte)0x18, (byte)0x8D, (byte)0x8E,
132
(byte)0xBB, (byte)0x55, (byte)0x8C, (byte)0xB8,
133
(byte)0x5D, (byte)0x38, (byte)0xD3, (byte)0x34,
134
(byte)0xFD, (byte)0x7C, (byte)0x17, (byte)0x57,
135
(byte)0x43, (byte)0xA3, (byte)0x1D, (byte)0x18,
136
(byte)0x6C, (byte)0xDE, (byte)0x33, (byte)0x21,
137
(byte)0x2C, (byte)0xB5, (byte)0x2A, (byte)0xFF,
138
(byte)0x3C, (byte)0xE1, (byte)0xB1, (byte)0x29,
139
(byte)0x40, (byte)0x18, (byte)0x11, (byte)0x8D,
140
(byte)0x7C, (byte)0x84, (byte)0xA7, (byte)0x0A,
141
(byte)0x72, (byte)0xD6, (byte)0x86, (byte)0xC4,
142
(byte)0x03, (byte)0x19, (byte)0xC8, (byte)0x07,
143
(byte)0x29, (byte)0x7A, (byte)0xCA, (byte)0x95,
144
(byte)0x0C, (byte)0xD9, (byte)0x96, (byte)0x9F,
145
(byte)0xAB, (byte)0xD0, (byte)0x0A, (byte)0x50,
146
(byte)0x9B, (byte)0x02, (byte)0x46, (byte)0xD3,
147
(byte)0x08, (byte)0x3D, (byte)0x66, (byte)0xA4,
148
(byte)0x5D, (byte)0x41, (byte)0x9F, (byte)0x9C,
149
(byte)0x7C, (byte)0xBD, (byte)0x89, (byte)0x4B,
150
(byte)0x22, (byte)0x19, (byte)0x26, (byte)0xBA,
151
(byte)0xAB, (byte)0xA2, (byte)0x5E, (byte)0xC3,
152
(byte)0x55, (byte)0xE9, (byte)0x2F, (byte)0x78,
153
(byte)0xC7, (byte)0x02, (byte)0x01, (byte)0x02,
154
(byte)0x02, (byte)0x02, (byte)0x02, (byte)0x00,
155
(byte)0x03, (byte)0x81, (byte)0x85, (byte)0x00,
156
(byte)0x02, (byte)0x81, (byte)0x81, (byte)0x00,
157
(byte)0xEE, (byte)0xD6, (byte)0xB1, (byte)0xA3,
158
(byte)0xB4, (byte)0x78, (byte)0x2B, (byte)0x35,
159
(byte)0xEF, (byte)0xCD, (byte)0x17, (byte)0x86,
160
(byte)0x63, (byte)0x2B, (byte)0x97, (byte)0x0E,
161
(byte)0x7A, (byte)0xD1, (byte)0xFF, (byte)0x7A,
162
(byte)0xEB, (byte)0x57, (byte)0x61, (byte)0xA1,
163
(byte)0xF7, (byte)0x90, (byte)0x11, (byte)0xA7,
164
(byte)0x79, (byte)0x28, (byte)0x69, (byte)0xBA,
165
(byte)0xA7, (byte)0xB2, (byte)0x37, (byte)0x17,
166
(byte)0xAE, (byte)0x3C, (byte)0x92, (byte)0x89,
167
(byte)0x88, (byte)0xE5, (byte)0x7E, (byte)0x8E,
168
(byte)0xF0, (byte)0x24, (byte)0xD0, (byte)0xE1,
169
(byte)0xC4, (byte)0xB0, (byte)0x26, (byte)0x5A,
170
(byte)0x1E, (byte)0xBD, (byte)0xA0, (byte)0xCF,
171
(byte)0x3E, (byte)0x97, (byte)0x2A, (byte)0x13,
172
(byte)0x92, (byte)0x3B, (byte)0x39, (byte)0xD0,
173
(byte)0x1D, (byte)0xA3, (byte)0x6B, (byte)0x3E,
174
(byte)0xC2, (byte)0xBB, (byte)0x14, (byte)0xB6,
175
(byte)0xE2, (byte)0x4C, (byte)0x0E, (byte)0x5B,
176
(byte)0x4B, (byte)0xA4, (byte)0x9D, (byte)0xA6,
177
(byte)0x21, (byte)0xB0, (byte)0xF9, (byte)0xDE,
178
(byte)0x55, (byte)0xAE, (byte)0x5C, (byte)0x29,
179
(byte)0x0E, (byte)0xC1, (byte)0xFC, (byte)0xBA,
180
(byte)0x51, (byte)0xD3, (byte)0xB6, (byte)0x6D,
181
(byte)0x75, (byte)0x72, (byte)0xDF, (byte)0x43,
182
(byte)0xAB, (byte)0x94, (byte)0x21, (byte)0x6E,
183
(byte)0x0C, (byte)0xD1, (byte)0x93, (byte)0x54,
184
(byte)0x56, (byte)0x7D, (byte)0x4B, (byte)0x90,
185
(byte)0xF1, (byte)0x94, (byte)0x45, (byte)0xD4,
186
(byte)0x2A, (byte)0x71, (byte)0xA1, (byte)0xB8,
187
(byte)0xDD, (byte)0xAA, (byte)0x05, (byte)0xF0,
188
(byte)0x27, (byte)0x37, (byte)0xBD, (byte)0x44
189
};
190
191
private static final byte alicePrivKeyEnc[] = {
192
(byte)0x30, (byte)0x81, (byte)0xE3, (byte)0x02,
193
(byte)0x01, (byte)0x00, (byte)0x30, (byte)0x81,
194
(byte)0x99, (byte)0x06, (byte)0x09, (byte)0x2A,
195
(byte)0x86, (byte)0x48, (byte)0x86, (byte)0xF7,
196
(byte)0x0D, (byte)0x01, (byte)0x03, (byte)0x01,
197
(byte)0x30, (byte)0x81, (byte)0x8B, (byte)0x02,
198
(byte)0x81, (byte)0x81, (byte)0x00, (byte)0xF4,
199
(byte)0x88, (byte)0xFD, (byte)0x58, (byte)0x4E,
200
(byte)0x49, (byte)0xDB, (byte)0xCD, (byte)0x20,
201
(byte)0xB4, (byte)0x9D, (byte)0xE4, (byte)0x91,
202
(byte)0x07, (byte)0x36, (byte)0x6B, (byte)0x33,
203
(byte)0x6C, (byte)0x38, (byte)0x0D, (byte)0x45,
204
(byte)0x1D, (byte)0x0F, (byte)0x7C, (byte)0x88,
205
(byte)0xB3, (byte)0x1C, (byte)0x7C, (byte)0x5B,
206
(byte)0x2D, (byte)0x8E, (byte)0xF6, (byte)0xF3,
207
(byte)0xC9, (byte)0x23, (byte)0xC0, (byte)0x43,
208
(byte)0xF0, (byte)0xA5, (byte)0x5B, (byte)0x18,
209
(byte)0x8D, (byte)0x8E, (byte)0xBB, (byte)0x55,
210
(byte)0x8C, (byte)0xB8, (byte)0x5D, (byte)0x38,
211
(byte)0xD3, (byte)0x34, (byte)0xFD, (byte)0x7C,
212
(byte)0x17, (byte)0x57, (byte)0x43, (byte)0xA3,
213
(byte)0x1D, (byte)0x18, (byte)0x6C, (byte)0xDE,
214
(byte)0x33, (byte)0x21, (byte)0x2C, (byte)0xB5,
215
(byte)0x2A, (byte)0xFF, (byte)0x3C, (byte)0xE1,
216
(byte)0xB1, (byte)0x29, (byte)0x40, (byte)0x18,
217
(byte)0x11, (byte)0x8D, (byte)0x7C, (byte)0x84,
218
(byte)0xA7, (byte)0x0A, (byte)0x72, (byte)0xD6,
219
(byte)0x86, (byte)0xC4, (byte)0x03, (byte)0x19,
220
(byte)0xC8, (byte)0x07, (byte)0x29, (byte)0x7A,
221
(byte)0xCA, (byte)0x95, (byte)0x0C, (byte)0xD9,
222
(byte)0x96, (byte)0x9F, (byte)0xAB, (byte)0xD0,
223
(byte)0x0A, (byte)0x50, (byte)0x9B, (byte)0x02,
224
(byte)0x46, (byte)0xD3, (byte)0x08, (byte)0x3D,
225
(byte)0x66, (byte)0xA4, (byte)0x5D, (byte)0x41,
226
(byte)0x9F, (byte)0x9C, (byte)0x7C, (byte)0xBD,
227
(byte)0x89, (byte)0x4B, (byte)0x22, (byte)0x19,
228
(byte)0x26, (byte)0xBA, (byte)0xAB, (byte)0xA2,
229
(byte)0x5E, (byte)0xC3, (byte)0x55, (byte)0xE9,
230
(byte)0x2F, (byte)0x78, (byte)0xC7, (byte)0x02,
231
(byte)0x01, (byte)0x02, (byte)0x02, (byte)0x02,
232
(byte)0x02, (byte)0x00, (byte)0x04, (byte)0x42,
233
(byte)0x02, (byte)0x40, (byte)0x36, (byte)0x4D,
234
(byte)0xD0, (byte)0x58, (byte)0x64, (byte)0x91,
235
(byte)0x78, (byte)0xA2, (byte)0x4B, (byte)0x79,
236
(byte)0x46, (byte)0xFE, (byte)0xC9, (byte)0xD9,
237
(byte)0xCA, (byte)0x5C, (byte)0xF9, (byte)0xFD,
238
(byte)0x6C, (byte)0x5D, (byte)0x76, (byte)0x3A,
239
(byte)0x41, (byte)0x6D, (byte)0x44, (byte)0x62,
240
(byte)0x75, (byte)0x93, (byte)0x81, (byte)0x93,
241
(byte)0x00, (byte)0x4C, (byte)0xB1, (byte)0xD8,
242
(byte)0x7D, (byte)0x9D, (byte)0xF3, (byte)0x16,
243
(byte)0x2C, (byte)0x6C, (byte)0x9F, (byte)0x7A,
244
(byte)0x84, (byte)0xA3, (byte)0x7A, (byte)0xC1,
245
(byte)0x4F, (byte)0x60, (byte)0xE3, (byte)0xB5,
246
(byte)0x86, (byte)0x28, (byte)0x08, (byte)0x4D,
247
(byte)0x94, (byte)0xB6, (byte)0x04, (byte)0x0D,
248
(byte)0xAC, (byte)0xBD, (byte)0x1F, (byte)0x42,
249
(byte)0x8F, (byte)0x1B
250
};
251
252
private static final byte bobPubKeyEnc[] = {
253
(byte)0x30, (byte)0x82, (byte)0x01, (byte)0x23,
254
(byte)0x30, (byte)0x81, (byte)0x99, (byte)0x06,
255
(byte)0x09, (byte)0x2A, (byte)0x86, (byte)0x48,
256
(byte)0x86, (byte)0xF7, (byte)0x0D, (byte)0x01,
257
(byte)0x03, (byte)0x01, (byte)0x30, (byte)0x81,
258
(byte)0x8B, (byte)0x02, (byte)0x81, (byte)0x81,
259
(byte)0x00, (byte)0xF4, (byte)0x88, (byte)0xFD,
260
(byte)0x58, (byte)0x4E, (byte)0x49, (byte)0xDB,
261
(byte)0xCD, (byte)0x20, (byte)0xB4, (byte)0x9D,
262
(byte)0xE4, (byte)0x91, (byte)0x07, (byte)0x36,
263
(byte)0x6B, (byte)0x33, (byte)0x6C, (byte)0x38,
264
(byte)0x0D, (byte)0x45, (byte)0x1D, (byte)0x0F,
265
(byte)0x7C, (byte)0x88, (byte)0xB3, (byte)0x1C,
266
(byte)0x7C, (byte)0x5B, (byte)0x2D, (byte)0x8E,
267
(byte)0xF6, (byte)0xF3, (byte)0xC9, (byte)0x23,
268
(byte)0xC0, (byte)0x43, (byte)0xF0, (byte)0xA5,
269
(byte)0x5B, (byte)0x18, (byte)0x8D, (byte)0x8E,
270
(byte)0xBB, (byte)0x55, (byte)0x8C, (byte)0xB8,
271
(byte)0x5D, (byte)0x38, (byte)0xD3, (byte)0x34,
272
(byte)0xFD, (byte)0x7C, (byte)0x17, (byte)0x57,
273
(byte)0x43, (byte)0xA3, (byte)0x1D, (byte)0x18,
274
(byte)0x6C, (byte)0xDE, (byte)0x33, (byte)0x21,
275
(byte)0x2C, (byte)0xB5, (byte)0x2A, (byte)0xFF,
276
(byte)0x3C, (byte)0xE1, (byte)0xB1, (byte)0x29,
277
(byte)0x40, (byte)0x18, (byte)0x11, (byte)0x8D,
278
(byte)0x7C, (byte)0x84, (byte)0xA7, (byte)0x0A,
279
(byte)0x72, (byte)0xD6, (byte)0x86, (byte)0xC4,
280
(byte)0x03, (byte)0x19, (byte)0xC8, (byte)0x07,
281
(byte)0x29, (byte)0x7A, (byte)0xCA, (byte)0x95,
282
(byte)0x0C, (byte)0xD9, (byte)0x96, (byte)0x9F,
283
(byte)0xAB, (byte)0xD0, (byte)0x0A, (byte)0x50,
284
(byte)0x9B, (byte)0x02, (byte)0x46, (byte)0xD3,
285
(byte)0x08, (byte)0x3D, (byte)0x66, (byte)0xA4,
286
(byte)0x5D, (byte)0x41, (byte)0x9F, (byte)0x9C,
287
(byte)0x7C, (byte)0xBD, (byte)0x89, (byte)0x4B,
288
(byte)0x22, (byte)0x19, (byte)0x26, (byte)0xBA,
289
(byte)0xAB, (byte)0xA2, (byte)0x5E, (byte)0xC3,
290
(byte)0x55, (byte)0xE9, (byte)0x2F, (byte)0x78,
291
(byte)0xC7, (byte)0x02, (byte)0x01, (byte)0x02,
292
(byte)0x02, (byte)0x02, (byte)0x02, (byte)0x00,
293
(byte)0x03, (byte)0x81, (byte)0x84, (byte)0x00,
294
(byte)0x02, (byte)0x81, (byte)0x80, (byte)0x2C,
295
(byte)0x40, (byte)0xFA, (byte)0xF6, (byte)0xA6,
296
(byte)0xF8, (byte)0xAC, (byte)0xC2, (byte)0x4F,
297
(byte)0xCD, (byte)0xC7, (byte)0x37, (byte)0x93,
298
(byte)0xE5, (byte)0xE4, (byte)0x5E, (byte)0x18,
299
(byte)0x14, (byte)0xE6, (byte)0x50, (byte)0xDA,
300
(byte)0x55, (byte)0x38, (byte)0x5D, (byte)0x24,
301
(byte)0xF5, (byte)0x42, (byte)0x68, (byte)0x5F,
302
(byte)0xF5, (byte)0x15, (byte)0xC8, (byte)0x9B,
303
(byte)0x5D, (byte)0x06, (byte)0x3D, (byte)0xE1,
304
(byte)0x52, (byte)0x2F, (byte)0x98, (byte)0xFF,
305
(byte)0x37, (byte)0xBB, (byte)0x75, (byte)0x48,
306
(byte)0x48, (byte)0xE9, (byte)0x65, (byte)0x84,
307
(byte)0x37, (byte)0xBB, (byte)0xB3, (byte)0xE9,
308
(byte)0x36, (byte)0x01, (byte)0xB4, (byte)0x6A,
309
(byte)0x1C, (byte)0xB2, (byte)0x11, (byte)0x82,
310
(byte)0xCE, (byte)0x3D, (byte)0x65, (byte)0xE5,
311
(byte)0x3C, (byte)0x89, (byte)0xE9, (byte)0x52,
312
(byte)0x19, (byte)0xBD, (byte)0x58, (byte)0xF6,
313
(byte)0xA2, (byte)0x03, (byte)0xA8, (byte)0xB2,
314
(byte)0xA5, (byte)0xDB, (byte)0xEB, (byte)0xF5,
315
(byte)0x94, (byte)0xF9, (byte)0x46, (byte)0xBE,
316
(byte)0x45, (byte)0x4C, (byte)0x65, (byte)0xD2,
317
(byte)0xD1, (byte)0xCF, (byte)0xFF, (byte)0xFF,
318
(byte)0xFA, (byte)0x38, (byte)0xF1, (byte)0x72,
319
(byte)0xAB, (byte)0xB9, (byte)0x14, (byte)0x4E,
320
(byte)0xF5, (byte)0xF0, (byte)0x7A, (byte)0x8E,
321
(byte)0x45, (byte)0xFD, (byte)0x5B, (byte)0xF9,
322
(byte)0xA2, (byte)0x97, (byte)0x1B, (byte)0xAE,
323
(byte)0x2C, (byte)0x7B, (byte)0x6B, (byte)0x7C,
324
(byte)0x98, (byte)0xFE, (byte)0x58, (byte)0xDD,
325
(byte)0xBE, (byte)0xF6, (byte)0x1C, (byte)0x8E,
326
(byte)0xD0, (byte)0xA1, (byte)0x72
327
};
328
329
private static final byte bobPrivKeyEnc[] = {
330
(byte)0x30, (byte)0x81, (byte)0xE4, (byte)0x02,
331
(byte)0x01, (byte)0x00, (byte)0x30, (byte)0x81,
332
(byte)0x99, (byte)0x06, (byte)0x09, (byte)0x2A,
333
(byte)0x86, (byte)0x48, (byte)0x86, (byte)0xF7,
334
(byte)0x0D, (byte)0x01, (byte)0x03, (byte)0x01,
335
(byte)0x30, (byte)0x81, (byte)0x8B, (byte)0x02,
336
(byte)0x81, (byte)0x81, (byte)0x00, (byte)0xF4,
337
(byte)0x88, (byte)0xFD, (byte)0x58, (byte)0x4E,
338
(byte)0x49, (byte)0xDB, (byte)0xCD, (byte)0x20,
339
(byte)0xB4, (byte)0x9D, (byte)0xE4, (byte)0x91,
340
(byte)0x07, (byte)0x36, (byte)0x6B, (byte)0x33,
341
(byte)0x6C, (byte)0x38, (byte)0x0D, (byte)0x45,
342
(byte)0x1D, (byte)0x0F, (byte)0x7C, (byte)0x88,
343
(byte)0xB3, (byte)0x1C, (byte)0x7C, (byte)0x5B,
344
(byte)0x2D, (byte)0x8E, (byte)0xF6, (byte)0xF3,
345
(byte)0xC9, (byte)0x23, (byte)0xC0, (byte)0x43,
346
(byte)0xF0, (byte)0xA5, (byte)0x5B, (byte)0x18,
347
(byte)0x8D, (byte)0x8E, (byte)0xBB, (byte)0x55,
348
(byte)0x8C, (byte)0xB8, (byte)0x5D, (byte)0x38,
349
(byte)0xD3, (byte)0x34, (byte)0xFD, (byte)0x7C,
350
(byte)0x17, (byte)0x57, (byte)0x43, (byte)0xA3,
351
(byte)0x1D, (byte)0x18, (byte)0x6C, (byte)0xDE,
352
(byte)0x33, (byte)0x21, (byte)0x2C, (byte)0xB5,
353
(byte)0x2A, (byte)0xFF, (byte)0x3C, (byte)0xE1,
354
(byte)0xB1, (byte)0x29, (byte)0x40, (byte)0x18,
355
(byte)0x11, (byte)0x8D, (byte)0x7C, (byte)0x84,
356
(byte)0xA7, (byte)0x0A, (byte)0x72, (byte)0xD6,
357
(byte)0x86, (byte)0xC4, (byte)0x03, (byte)0x19,
358
(byte)0xC8, (byte)0x07, (byte)0x29, (byte)0x7A,
359
(byte)0xCA, (byte)0x95, (byte)0x0C, (byte)0xD9,
360
(byte)0x96, (byte)0x9F, (byte)0xAB, (byte)0xD0,
361
(byte)0x0A, (byte)0x50, (byte)0x9B, (byte)0x02,
362
(byte)0x46, (byte)0xD3, (byte)0x08, (byte)0x3D,
363
(byte)0x66, (byte)0xA4, (byte)0x5D, (byte)0x41,
364
(byte)0x9F, (byte)0x9C, (byte)0x7C, (byte)0xBD,
365
(byte)0x89, (byte)0x4B, (byte)0x22, (byte)0x19,
366
(byte)0x26, (byte)0xBA, (byte)0xAB, (byte)0xA2,
367
(byte)0x5E, (byte)0xC3, (byte)0x55, (byte)0xE9,
368
(byte)0x2F, (byte)0x78, (byte)0xC7, (byte)0x02,
369
(byte)0x01, (byte)0x02, (byte)0x02, (byte)0x02,
370
(byte)0x02, (byte)0x00, (byte)0x04, (byte)0x43,
371
(byte)0x02, (byte)0x41, (byte)0x00, (byte)0xE0,
372
(byte)0x31, (byte)0xE7, (byte)0x77, (byte)0xB8,
373
(byte)0xD0, (byte)0x7E, (byte)0x0A, (byte)0x9B,
374
(byte)0x94, (byte)0xD5, (byte)0x3D, (byte)0x33,
375
(byte)0x62, (byte)0x32, (byte)0x51, (byte)0xCE,
376
(byte)0x74, (byte)0x5C, (byte)0xA5, (byte)0x72,
377
(byte)0xD9, (byte)0x36, (byte)0xF3, (byte)0x8A,
378
(byte)0x3F, (byte)0x8B, (byte)0xC6, (byte)0xFE,
379
(byte)0xEF, (byte)0x94, (byte)0x8B, (byte)0x50,
380
(byte)0x41, (byte)0x9B, (byte)0x14, (byte)0xC8,
381
(byte)0xE9, (byte)0x1F, (byte)0x24, (byte)0x1F,
382
(byte)0x65, (byte)0x8E, (byte)0xD3, (byte)0x85,
383
(byte)0xD0, (byte)0x68, (byte)0x6C, (byte)0xF1,
384
(byte)0x79, (byte)0x45, (byte)0xD0, (byte)0x06,
385
(byte)0xA4, (byte)0xB8, (byte)0xE0, (byte)0x64,
386
(byte)0xF5, (byte)0x38, (byte)0x72, (byte)0x97,
387
(byte)0x00, (byte)0x23, (byte)0x5F
388
};
389
}
390
391
392