summary refs log tree commit diff
path: root/crypto/test/data
diff options
context:
space:
mode:
authorPeter Dettman <peter.dettman@bouncycastle.org>2013-06-28 15:26:06 +0700
committerPeter Dettman <peter.dettman@bouncycastle.org>2013-06-28 15:26:06 +0700
commit44288db4414158ac9b98a507b15e81d0d3c66ca6 (patch)
treeaa5ef88948ebb68ed6c8df81eb5da889641a9b50 /crypto/test/data
parentSet up text/binary handling for existing file types (diff)
downloadBouncyCastle.NET-ed25519-44288db4414158ac9b98a507b15e81d0d3c66ca6.tar.xz
Initial import of old CVS repository
Diffstat (limited to 'crypto/test/data')
-rw-r--r--crypto/test/data/PKITS/README.txt3
-rw-r--r--crypto/test/data/PKITS/certs/AllCertificatesNoPoliciesTest2EE.crtbin0 -> 627 bytes
-rw-r--r--crypto/test/data/PKITS/certs/AllCertificatesSamePoliciesTest10EE.crtbin0 -> 670 bytes
-rw-r--r--crypto/test/data/PKITS/certs/AllCertificatesSamePoliciesTest13EE.crtbin0 -> 687 bytes
-rw-r--r--crypto/test/data/PKITS/certs/AllCertificatesanyPolicyTest11EE.crtbin0 -> 643 bytes
-rw-r--r--crypto/test/data/PKITS/certs/AnyPolicyTest14EE.crtbin0 -> 632 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BadCRLIssuerNameCACert.crtbin0 -> 640 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BadCRLSignatureCACert.crtbin0 -> 638 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BadSignedCACert.crtbin0 -> 631 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BadnotAfterDateCACert.crtbin0 -> 638 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BadnotBeforeDateCACert.crtbin0 -> 639 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BasicSelfIssuedCRLSigningKeyCACert.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crtbin0 -> 797 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BasicSelfIssuedNewKeyCACert.crtbin0 -> 646 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crtbin0 -> 662 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BasicSelfIssuedOldKeyCACert.crtbin0 -> 646 bytes
-rw-r--r--crypto/test/data/PKITS/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crtbin0 -> 789 bytes
-rw-r--r--crypto/test/data/PKITS/certs/CPSPointerQualifierTest20EE.crtbin0 -> 701 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DSACACert.crtbin0 -> 906 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DSAParametersInheritedCACert.crtbin0 -> 536 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DifferentPoliciesTest12EE.crtbin0 -> 643 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DifferentPoliciesTest3EE.crtbin0 -> 645 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DifferentPoliciesTest4EE.crtbin0 -> 638 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DifferentPoliciesTest5EE.crtbin0 -> 646 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DifferentPoliciesTest7EE.crtbin0 -> 672 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DifferentPoliciesTest8EE.crtbin0 -> 670 bytes
-rw-r--r--crypto/test/data/PKITS/certs/DifferentPoliciesTest9EE.crtbin0 -> 660 bytes
-rw-r--r--crypto/test/data/PKITS/certs/GeneralizedTimeCRLnextUpdateCACert.crtbin0 -> 649 bytes
-rw-r--r--crypto/test/data/PKITS/certs/GoodCACert.crtbin0 -> 625 bytes
-rw-r--r--crypto/test/data/PKITS/certs/GoodsubCACert.crtbin0 -> 639 bytes
-rw-r--r--crypto/test/data/PKITS/certs/GoodsubCAPanyPolicyMapping1to2CACert.crtbin0 -> 697 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidBadCRLIssuerNameTest5EE.crtbin0 -> 659 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidBadCRLSignatureTest4EE.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crtbin0 -> 687 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crtbin0 -> 687 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crtbin0 -> 676 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crtbin0 -> 676 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidCASignatureTest2EE.crtbin0 -> 628 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidCAnotAfterDateTest5EE.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidCAnotBeforeDateTest1EE.crtbin0 -> 656 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest31EE.crtbin0 -> 710 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest33EE.crtbin0 -> 699 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest38EE.crtbin0 -> 698 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNandRFC822nameConstraintsTest28EE.crtbin0 -> 778 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNandRFC822nameConstraintsTest29EE.crtbin0 -> 780 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest10EE.crtbin0 -> 715 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest12EE.crtbin0 -> 720 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest13EE.crtbin0 -> 720 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest15EE.crtbin0 -> 690 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest16EE.crtbin0 -> 690 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest17EE.crtbin0 -> 690 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest20EE.crtbin0 -> 633 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest2EE.crtbin0 -> 685 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest3EE.crtbin0 -> 833 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest7EE.crtbin0 -> 685 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest8EE.crtbin0 -> 685 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest9EE.crtbin0 -> 685 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidDSASignatureTest6EE.crtbin0 -> 827 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidEESignatureTest3EE.crtbin0 -> 622 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidEEnotAfterDateTest6EE.crtbin0 -> 641 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidEEnotBeforeDateTest2EE.crtbin0 -> 642 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidIDPwithindirectCRLTest23EE.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidIDPwithindirectCRLTest26EE.crtbin0 -> 743 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidLongSerialNumberTest18EE.crtbin0 -> 677 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidMappingFromanyPolicyTest7EE.crtbin0 -> 665 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidMappingToanyPolicyTest8EE.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidMissingCRLTest1EE.crtbin0 -> 638 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidMissingbasicConstraintsTest1EE.crtbin0 -> 669 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidNameChainingOrderTest2EE.crtbin0 -> 728 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidNameChainingTest1EE.crtbin0 -> 643 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidNegativeSerialNumberTest15EE.crtbin0 -> 666 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidOldCRLnextUpdateTest11EE.crtbin0 -> 658 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidPolicyMappingTest10EE.crtbin0 -> 667 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidPolicyMappingTest2EE.crtbin0 -> 647 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidPolicyMappingTest4EE.crtbin0 -> 657 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest22EE.crtbin0 -> 711 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest24EE.crtbin0 -> 722 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest26EE.crtbin0 -> 711 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidRevokedCATest2EE.crtbin0 -> 638 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidRevokedEETest3EE.crtbin0 -> 632 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crtbin0 -> 673 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crtbin0 -> 681 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crtbin0 -> 681 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crtbin0 -> 683 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crtbin0 -> 683 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crtbin0 -> 673 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSeparateCertificateandCRLKeysTest20EE.crtbin0 -> 689 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidSeparateCertificateandCRLKeysTest21EE.crtbin0 -> 689 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidURInameConstraintsTest35EE.crtbin0 -> 716 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidURInameConstraintsTest37EE.crtbin0 -> 716 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidUnknownCRLEntryExtensionTest8EE.crtbin0 -> 675 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidUnknownCRLExtensionTest10EE.crtbin0 -> 664 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidUnknownCRLExtensionTest9EE.crtbin0 -> 663 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crtbin0 -> 683 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidWrongCRLTest6EE.crtbin0 -> 639 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidcAFalseTest2EE.crtbin0 -> 663 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidcAFalseTest3EE.crtbin0 -> 667 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidcRLIssuerTest27EE.crtbin0 -> 723 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidcRLIssuerTest31EE.crtbin0 -> 855 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidcRLIssuerTest32EE.crtbin0 -> 855 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidcRLIssuerTest34EE.crtbin0 -> 768 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidcRLIssuerTest35EE.crtbin0 -> 847 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crtbin0 -> 671 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddeltaCRLTest10EE.crtbin0 -> 813 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddeltaCRLTest3EE.crtbin0 -> 812 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddeltaCRLTest4EE.crtbin0 -> 812 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddeltaCRLTest6EE.crtbin0 -> 812 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddeltaCRLTest9EE.crtbin0 -> 812 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddistributionPointTest2EE.crtbin0 -> 793 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddistributionPointTest3EE.crtbin0 -> 793 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddistributionPointTest6EE.crtbin0 -> 713 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddistributionPointTest8EE.crtbin0 -> 752 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvaliddistributionPointTest9EE.crtbin0 -> 656 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest1EE.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest4EE.crtbin0 -> 652 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest5EE.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest6EE.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest1EE.crtbin0 -> 679 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest3EE.crtbin0 -> 672 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest5EE.crtbin0 -> 671 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest6EE.crtbin0 -> 676 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crtbin0 -> 683 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crtbin0 -> 691 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crtbin0 -> 691 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crtbin0 -> 692 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidonlyContainsAttributeCertsTest14EE.crtbin0 -> 674 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidonlyContainsCACertsTest12EE.crtbin0 -> 660 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidonlyContainsUserCertsTest11EE.crtbin0 -> 681 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest15EE.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest16EE.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest17EE.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest20EE.crtbin0 -> 872 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest21EE.crtbin0 -> 872 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest10EE.crtbin0 -> 682 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest11EE.crtbin0 -> 669 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest12EE.crtbin0 -> 686 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest5EE.crtbin0 -> 659 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest6EE.crtbin0 -> 676 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest9EE.crtbin0 -> 664 bytes
-rw-r--r--crypto/test/data/PKITS/certs/Invalidpre2000CRLnextUpdateTest12EE.crtbin0 -> 666 bytes
-rw-r--r--crypto/test/data/PKITS/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidrequireExplicitPolicyTest3EE.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/InvalidrequireExplicitPolicyTest5EE.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/LongSerialNumberCACert.crtbin0 -> 639 bytes
-rw-r--r--crypto/test/data/PKITS/certs/Mapping1to2CACert.crtbin0 -> 689 bytes
-rw-r--r--crypto/test/data/PKITS/certs/MappingFromanyPolicyCACert.crtbin0 -> 690 bytes
-rw-r--r--crypto/test/data/PKITS/certs/MappingToanyPolicyCACert.crtbin0 -> 694 bytes
-rw-r--r--crypto/test/data/PKITS/certs/MissingbasicConstraintsCACert.crtbin0 -> 628 bytes
-rw-r--r--crypto/test/data/PKITS/certs/NameOrderingCACert.crtbin0 -> 709 bytes
-rw-r--r--crypto/test/data/PKITS/certs/NegativeSerialNumberCACert.crtbin0 -> 643 bytes
-rw-r--r--crypto/test/data/PKITS/certs/NoCRLCACert.crtbin0 -> 627 bytes
-rw-r--r--crypto/test/data/PKITS/certs/NoPoliciesCACert.crtbin0 -> 607 bytes
-rw-r--r--crypto/test/data/PKITS/certs/NoissuingDistributionPointCACert.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/OldCRLnextUpdateCACert.crtbin0 -> 639 bytes
-rw-r--r--crypto/test/data/PKITS/certs/OverlappingPoliciesTest6EE.crtbin0 -> 677 bytes
-rw-r--r--crypto/test/data/PKITS/certs/P12Mapping1to3CACert.crtbin0 -> 707 bytes
-rw-r--r--crypto/test/data/PKITS/certs/P12Mapping1to3subCACert.crtbin0 -> 729 bytes
-rw-r--r--crypto/test/data/PKITS/certs/P12Mapping1to3subsubCACert.crtbin0 -> 709 bytes
-rw-r--r--crypto/test/data/PKITS/certs/P1Mapping1to234CACert.crtbin0 -> 746 bytes
-rw-r--r--crypto/test/data/PKITS/certs/P1Mapping1to234subCACert.crtbin0 -> 731 bytes
-rw-r--r--crypto/test/data/PKITS/certs/P1anyPolicyMapping1to2CACert.crtbin0 -> 1058 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PanyPolicyMapping1to2CACert.crtbin0 -> 694 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP1234CACert.crtbin0 -> 693 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP1234subCAP123Cert.crtbin0 -> 677 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP1234subsubCAP123P12Cert.crtbin0 -> 676 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP123CACert.crtbin0 -> 678 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP123subCAP12Cert.crtbin0 -> 660 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP123subsubCAP12P1Cert.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP123subsubCAP12P2Cert.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP123subsubsubCAP12P2P1Cert.crtbin0 -> 665 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP12CACert.crtbin0 -> 663 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP12subCAP1Cert.crtbin0 -> 641 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP12subsubCAP1P2Cert.crtbin0 -> 651 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP2subCA2Cert.crtbin0 -> 647 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP2subCACert.crtbin0 -> 630 bytes
-rw-r--r--crypto/test/data/PKITS/certs/PoliciesP3CACert.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/RFC3280MandatoryAttributeTypesCACert.crtbin0 -> 709 bytes
-rw-r--r--crypto/test/data/PKITS/certs/RFC3280OptionalAttributeTypesCACert.crtbin0 -> 721 bytes
-rw-r--r--crypto/test/data/PKITS/certs/RevokedsubCACert.crtbin0 -> 626 bytes
-rw-r--r--crypto/test/data/PKITS/certs/RolloverfromPrintableStringtoUTF8StringCACert.crtbin0 -> 664 bytes
-rw-r--r--crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crtbin0 -> 638 bytes
-rw-r--r--crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCRLSigningCert.crtbin0 -> 638 bytes
-rw-r--r--crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCertificateSigningCACert.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/TrustAnchorRootCertificate.crtbin0 -> 572 bytes
-rw-r--r--crypto/test/data/PKITS/certs/TwoCRLsCACert.crtbin0 -> 629 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UIDCACert.crtbin0 -> 629 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UTF8StringCaseInsensitiveMatchCACert.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UTF8StringEncodedNamesCACert.crtbin0 -> 631 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UnknownCRLEntryExtensionCACert.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UnknownCRLExtensionCACert.crtbin0 -> 642 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UserNoticeQualifierTest15EE.crtbin0 -> 755 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UserNoticeQualifierTest16EE.crtbin0 -> 874 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UserNoticeQualifierTest17EE.crtbin0 -> 743 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UserNoticeQualifierTest18EE.crtbin0 -> 969 bytes
-rw-r--r--crypto/test/data/PKITS/certs/UserNoticeQualifierTest19EE.crtbin0 -> 992 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crtbin0 -> 685 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crtbin0 -> 674 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crtbin0 -> 674 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crtbin0 -> 674 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidCertificatePathTest1EE.crtbin0 -> 622 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNSnameConstraintsTest30EE.crtbin0 -> 705 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNSnameConstraintsTest32EE.crtbin0 -> 705 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNandRFC822nameConstraintsTest27EE.crtbin0 -> 773 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest11EE.crtbin0 -> 714 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest14EE.crtbin0 -> 660 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest18EE.crtbin0 -> 661 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest19EE.crtbin0 -> 685 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest1EE.crtbin0 -> 684 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest4EE.crtbin0 -> 744 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest5EE.crtbin0 -> 829 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest6EE.crtbin0 -> 684 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDSAParameterInheritanceTest5EE.crtbin0 -> 566 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidDSASignaturesTest4EE.crtbin0 -> 826 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crtbin0 -> 678 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidGeneralizedTimenotAfterDateTest8EE.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest22EE.crtbin0 -> 652 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest24EE.crtbin0 -> 740 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest25EE.crtbin0 -> 740 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidLongSerialNumberTest16EE.crtbin0 -> 675 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidLongSerialNumberTest17EE.crtbin0 -> 675 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidNameChainingCapitalizationTest5EE.crtbin0 -> 651 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidNameChainingWhitespaceTest3EE.crtbin0 -> 652 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidNameChainingWhitespaceTest4EE.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidNameUIDsTest6EE.crtbin0 -> 630 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidNegativeSerialNumberTest14EE.crtbin0 -> 665 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidNoissuingDistributionPointTest10EE.crtbin0 -> 793 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest11EE.crtbin0 -> 665 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest12EE.crtbin0 -> 1068 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest13EE.crtbin0 -> 658 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest14EE.crtbin0 -> 658 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest1EE.crtbin0 -> 645 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest3EE.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest5EE.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest6EE.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidPolicyMappingTest9EE.crtbin0 -> 656 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crtbin0 -> 740 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crtbin0 -> 751 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest21EE.crtbin0 -> 720 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest23EE.crtbin0 -> 709 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest25EE.crtbin0 -> 720 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crtbin0 -> 694 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crtbin0 -> 668 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crtbin0 -> 668 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crtbin0 -> 678 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidSelfIssuedpathLenConstraintTest15EE.crtbin0 -> 667 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidSelfIssuedpathLenConstraintTest17EE.crtbin0 -> 670 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crtbin0 -> 649 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidSeparateCertificateandCRLKeysTest19EE.crtbin0 -> 687 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidTwoCRLsTest7EE.crtbin0 -> 635 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidURInameConstraintsTest34EE.crtbin0 -> 723 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidURInameConstraintsTest36EE.crtbin0 -> 726 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crtbin0 -> 691 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidUTF8StringEncodedNamesTest9EE.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crtbin0 -> 681 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidbasicConstraintsNotCriticalTest4EE.crtbin0 -> 677 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidcRLIssuerTest28EE.crtbin0 -> 873 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidcRLIssuerTest29EE.crtbin0 -> 788 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidcRLIssuerTest30EE.crtbin0 -> 873 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidcRLIssuerTest33EE.crtbin0 -> 853 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValiddeltaCRLTest2EE.crtbin0 -> 810 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValiddeltaCRLTest5EE.crtbin0 -> 810 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValiddeltaCRLTest7EE.crtbin0 -> 810 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValiddeltaCRLTest8EE.crtbin0 -> 810 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValiddistributionPointTest1EE.crtbin0 -> 791 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValiddistributionPointTest4EE.crtbin0 -> 711 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValiddistributionPointTest5EE.crtbin0 -> 711 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValiddistributionPointTest7EE.crtbin0 -> 791 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidinhibitAnyPolicyTest2EE.crtbin0 -> 660 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidinhibitPolicyMappingTest2EE.crtbin0 -> 667 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidinhibitPolicyMappingTest4EE.crtbin0 -> 670 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidkeyUsageNotCriticalTest3EE.crtbin0 -> 661 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidonlyContainsCACertsTest13EE.crtbin0 -> 675 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidonlySomeReasonsTest18EE.crtbin0 -> 759 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidonlySomeReasonsTest19EE.crtbin0 -> 870 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidpathLenConstraintTest13EE.crtbin0 -> 667 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidpathLenConstraintTest14EE.crtbin0 -> 684 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidpathLenConstraintTest7EE.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidpathLenConstraintTest8EE.crtbin0 -> 671 bytes
-rw-r--r--crypto/test/data/PKITS/certs/Validpre2000UTCnotBeforeDateTest3EE.crtbin0 -> 649 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest1EE.crtbin0 -> 647 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest2EE.crtbin0 -> 646 bytes
-rw-r--r--crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest4EE.crtbin0 -> 671 bytes
-rw-r--r--crypto/test/data/PKITS/certs/WrongCRLCACert.crtbin0 -> 630 bytes
-rw-r--r--crypto/test/data/PKITS/certs/anyPolicyCACert.crtbin0 -> 640 bytes
-rw-r--r--crypto/test/data/PKITS/certs/basicConstraintsCriticalcAFalseCACert.crtbin0 -> 652 bytes
-rw-r--r--crypto/test/data/PKITS/certs/basicConstraintsNotCriticalCACert.crtbin0 -> 647 bytes
-rw-r--r--crypto/test/data/PKITS/certs/basicConstraintsNotCriticalcAFalseCACert.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/deltaCRLCA1Cert.crtbin0 -> 630 bytes
-rw-r--r--crypto/test/data/PKITS/certs/deltaCRLCA2Cert.crtbin0 -> 630 bytes
-rw-r--r--crypto/test/data/PKITS/certs/deltaCRLCA3Cert.crtbin0 -> 630 bytes
-rw-r--r--crypto/test/data/PKITS/certs/deltaCRLIndicatorNoBaseCACert.crtbin0 -> 646 bytes
-rw-r--r--crypto/test/data/PKITS/certs/distributionPoint1CACert.crtbin0 -> 639 bytes
-rw-r--r--crypto/test/data/PKITS/certs/distributionPoint2CACert.crtbin0 -> 639 bytes
-rw-r--r--crypto/test/data/PKITS/certs/indirectCRLCA1Cert.crtbin0 -> 633 bytes
-rw-r--r--crypto/test/data/PKITS/certs/indirectCRLCA2Cert.crtbin0 -> 633 bytes
-rw-r--r--crypto/test/data/PKITS/certs/indirectCRLCA3Cert.crtbin0 -> 633 bytes
-rw-r--r--crypto/test/data/PKITS/certs/indirectCRLCA3cRLIssuerCert.crtbin0 -> 734 bytes
-rw-r--r--crypto/test/data/PKITS/certs/indirectCRLCA4Cert.crtbin0 -> 633 bytes
-rw-r--r--crypto/test/data/PKITS/certs/indirectCRLCA4cRLIssuerCert.crtbin0 -> 861 bytes
-rw-r--r--crypto/test/data/PKITS/certs/indirectCRLCA5Cert.crtbin0 -> 633 bytes
-rw-r--r--crypto/test/data/PKITS/certs/indirectCRLCA6Cert.crtbin0 -> 633 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy0CACert.crtbin0 -> 669 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy1CACert.crtbin0 -> 669 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy1SelfIssuedCACert.crtbin0 -> 646 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCA1Cert.crtbin0 -> 644 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCA2Cert.crtbin0 -> 644 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCAIAP5Cert.crtbin0 -> 670 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy1subsubCA2Cert.crtbin0 -> 651 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy5CACert.crtbin0 -> 669 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy5subCACert.crtbin0 -> 666 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicy5subsubCACert.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitAnyPolicyTest3EE.crtbin0 -> 650 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping0CACert.crtbin0 -> 664 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping0subCACert.crtbin0 -> 699 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12CACert.crtbin0 -> 682 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subCACert.crtbin0 -> 747 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crtbin0 -> 702 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subsubCACert.crtbin0 -> 727 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crtbin0 -> 735 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1CACert.crtbin0 -> 667 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crtbin0 -> 660 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crtbin0 -> 708 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1subCACert.crtbin0 -> 705 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1subsubCACert.crtbin0 -> 711 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping5CACert.crtbin0 -> 664 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping5subCACert.crtbin0 -> 676 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping5subsubCACert.crtbin0 -> 663 bytes
-rw-r--r--crypto/test/data/PKITS/certs/inhibitPolicyMapping5subsubsubCACert.crtbin0 -> 711 bytes
-rw-r--r--crypto/test/data/PKITS/certs/keyUsageCriticalcRLSignFalseCACert.crtbin0 -> 652 bytes
-rw-r--r--crypto/test/data/PKITS/certs/keyUsageCriticalkeyCertSignFalseCACert.crtbin0 -> 656 bytes
-rw-r--r--crypto/test/data/PKITS/certs/keyUsageNotCriticalCACert.crtbin0 -> 639 bytes
-rw-r--r--crypto/test/data/PKITS/certs/keyUsageNotCriticalcRLSignFalseCACert.crtbin0 -> 653 bytes
-rw-r--r--crypto/test/data/PKITS/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crtbin0 -> 657 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN1CACert.crtbin0 -> 733 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN1SelfIssuedCACert.crtbin0 -> 650 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN1subCA1Cert.crtbin0 -> 803 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN1subCA2Cert.crtbin0 -> 775 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN1subCA3Cert.crtbin0 -> 724 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN2CACert.crtbin0 -> 814 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN3CACert.crtbin0 -> 732 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN3subCA1Cert.crtbin0 -> 746 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN3subCA2Cert.crtbin0 -> 719 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN4CACert.crtbin0 -> 812 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDN5CACert.crtbin0 -> 842 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDNS1CACert.crtbin0 -> 683 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsDNS2CACert.crtbin0 -> 686 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsRFC822CA1Cert.crtbin0 -> 687 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsRFC822CA2Cert.crtbin0 -> 686 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsRFC822CA3Cert.crtbin0 -> 686 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsURI1CACert.crtbin0 -> 684 bytes
-rw-r--r--crypto/test/data/PKITS/certs/nameConstraintsURI2CACert.crtbin0 -> 686 bytes
-rw-r--r--crypto/test/data/PKITS/certs/onlyContainsAttributeCertsCACert.crtbin0 -> 647 bytes
-rw-r--r--crypto/test/data/PKITS/certs/onlyContainsCACertsCACert.crtbin0 -> 640 bytes
-rw-r--r--crypto/test/data/PKITS/certs/onlyContainsUserCertsCACert.crtbin0 -> 642 bytes
-rw-r--r--crypto/test/data/PKITS/certs/onlySomeReasonsCA1Cert.crtbin0 -> 637 bytes
-rw-r--r--crypto/test/data/PKITS/certs/onlySomeReasonsCA2Cert.crtbin0 -> 637 bytes
-rw-r--r--crypto/test/data/PKITS/certs/onlySomeReasonsCA3Cert.crtbin0 -> 637 bytes
-rw-r--r--crypto/test/data/PKITS/certs/onlySomeReasonsCA4Cert.crtbin0 -> 637 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint0CACert.crtbin0 -> 642 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint0SelfIssuedCACert.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint0subCA2Cert.crtbin0 -> 652 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint0subCACert.crtbin0 -> 651 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint1CACert.crtbin0 -> 642 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint1SelfIssuedCACert.crtbin0 -> 648 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint1SelfIssuedsubCACert.crtbin0 -> 654 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint1subCACert.crtbin0 -> 651 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6CACert.crtbin0 -> 642 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6subCA0Cert.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6subCA1Cert.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6subCA4Cert.crtbin0 -> 655 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA00Cert.crtbin0 -> 663 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA11Cert.crtbin0 -> 663 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA41Cert.crtbin0 -> 663 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6subsubsubCA11XCert.crtbin0 -> 668 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pathLenConstraint6subsubsubCA41XCert.crtbin0 -> 668 bytes
-rw-r--r--crypto/test/data/PKITS/certs/pre2000CRLnextUpdateCACert.crtbin0 -> 643 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy0CACert.crtbin0 -> 662 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy0subCACert.crtbin0 -> 659 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy0subsubCACert.crtbin0 -> 665 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy0subsubsubCACert.crtbin0 -> 671 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy10CACert.crtbin0 -> 663 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy10subCACert.crtbin0 -> 661 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy10subsubCACert.crtbin0 -> 667 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy10subsubsubCACert.crtbin0 -> 673 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy2CACert.crtbin0 -> 662 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy2SelfIssuedCACert.crtbin0 -> 656 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy2SelfIssuedsubCACert.crtbin0 -> 662 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy2subCACert.crtbin0 -> 659 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy4CACert.crtbin0 -> 662 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy4subCACert.crtbin0 -> 659 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy4subsubCACert.crtbin0 -> 665 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy4subsubsubCACert.crtbin0 -> 671 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy5CACert.crtbin0 -> 662 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy5subCACert.crtbin0 -> 659 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy5subsubCACert.crtbin0 -> 665 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy5subsubsubCACert.crtbin0 -> 671 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy7CACert.crtbin0 -> 662 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy7subCARE2Cert.crtbin0 -> 681 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crtbin0 -> 693 bytes
-rw-r--r--crypto/test/data/PKITS/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crtbin0 -> 683 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BadCRLIssuerNameCACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BadCRLSignatureCACRL.crlbin0 -> 325 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BadSignedCACRL.crlbin0 -> 318 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BadnotAfterDateCACRL.crlbin0 -> 325 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BadnotBeforeDateCACRL.crlbin0 -> 326 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BasicSelfIssuedCRLSigningKeyCACRL.crlbin0 -> 377 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BasicSelfIssuedCRLSigningKeyCRLCertCRL.crlbin0 -> 479 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BasicSelfIssuedNewKeyCACRL.crlbin0 -> 369 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BasicSelfIssuedOldKeyCACRL.crlbin0 -> 369 bytes
-rw-r--r--crypto/test/data/PKITS/crls/BasicSelfIssuedOldKeySelfIssuedCertCRL.crlbin0 -> 462 bytes
-rw-r--r--crypto/test/data/PKITS/crls/DSACACRL.crlbin0 -> 219 bytes
-rw-r--r--crypto/test/data/PKITS/crls/DSAParametersInheritedCACRL.crlbin0 -> 241 bytes
-rw-r--r--crypto/test/data/PKITS/crls/GeneralizedTimeCRLnextUpdateCACRL.crlbin0 -> 338 bytes
-rw-r--r--crypto/test/data/PKITS/crls/GoodCACRL.crlbin0 -> 382 bytes
-rw-r--r--crypto/test/data/PKITS/crls/GoodsubCACRL.crlbin0 -> 315 bytes
-rw-r--r--crypto/test/data/PKITS/crls/GoodsubCAPanyPolicyMapping1to2CACRL.crlbin0 -> 339 bytes
-rw-r--r--crypto/test/data/PKITS/crls/LongSerialNumberCACRL.crlbin0 -> 381 bytes
-rw-r--r--crypto/test/data/PKITS/crls/Mapping1to2CACRL.crlbin0 -> 320 bytes
-rw-r--r--crypto/test/data/PKITS/crls/MappingFromanyPolicyCACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/MappingToanyPolicyCACRL.crlbin0 -> 328 bytes
-rw-r--r--crypto/test/data/PKITS/crls/MissingbasicConstraintsCACRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/NameOrderCACRL.crlbin0 -> 396 bytes
-rw-r--r--crypto/test/data/PKITS/crls/NegativeSerialNumberCACRL.crlbin0 -> 366 bytes
-rw-r--r--crypto/test/data/PKITS/crls/NoPoliciesCACRL.crlbin0 -> 319 bytes
-rw-r--r--crypto/test/data/PKITS/crls/NoissuingDistributionPointCACRL.crlbin0 -> 335 bytes
-rw-r--r--crypto/test/data/PKITS/crls/OldCRLnextUpdateCACRL.crlbin0 -> 326 bytes
-rw-r--r--crypto/test/data/PKITS/crls/P12Mapping1to3CACRL.crlbin0 -> 324 bytes
-rw-r--r--crypto/test/data/PKITS/crls/P12Mapping1to3subCACRL.crlbin0 -> 327 bytes
-rw-r--r--crypto/test/data/PKITS/crls/P12Mapping1to3subsubCACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/P1Mapping1to234CACRL.crlbin0 -> 325 bytes
-rw-r--r--crypto/test/data/PKITS/crls/P1Mapping1to234subCACRL.crlbin0 -> 328 bytes
-rw-r--r--crypto/test/data/PKITS/crls/P1anyPolicyMapping1to2CACRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PanyPolicyMapping1to2CACRL.crlbin0 -> 331 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP1234CACRL.crlbin0 -> 322 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP1234subCAP123CRL.crlbin0 -> 329 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP1234subsubCAP123P12CRL.crlbin0 -> 335 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP123CACRL.crlbin0 -> 321 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP123subCAP12CRL.crlbin0 -> 327 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP123subsubCAP12P1CRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP123subsubCAP2P2CRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP123subsubsubCAP12P2P1CRL.crlbin0 -> 337 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP12CACRL.crlbin0 -> 320 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP12subCAP1CRL.crlbin0 -> 325 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP12subsubCAP1P2CRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP2subCA2CRL.crlbin0 -> 323 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP2subCACRL.crlbin0 -> 322 bytes
-rw-r--r--crypto/test/data/PKITS/crls/PoliciesP3CACRL.crlbin0 -> 319 bytes
-rw-r--r--crypto/test/data/PKITS/crls/RFC3280MandatoryAttributeTypesCACRL.crlbin0 -> 396 bytes
-rw-r--r--crypto/test/data/PKITS/crls/RFC3280OptionalAttributeTypesCACRL.crlbin0 -> 408 bytes
-rw-r--r--crypto/test/data/PKITS/crls/RevokedsubCACRL.crlbin0 -> 318 bytes
-rw-r--r--crypto/test/data/PKITS/crls/RolloverfromPrintableStringtoUTF8StringCACRL.crlbin0 -> 351 bytes
-rw-r--r--crypto/test/data/PKITS/crls/SeparateCertificateandCRLKeysCA2CRL.crlbin0 -> 342 bytes
-rw-r--r--crypto/test/data/PKITS/crls/SeparateCertificateandCRLKeysCRL.crlbin0 -> 378 bytes
-rw-r--r--crypto/test/data/PKITS/crls/TrustAnchorRootCRL.crlbin0 -> 353 bytes
-rw-r--r--crypto/test/data/PKITS/crls/TwoCRLsCABadCRL.crlbin0 -> 364 bytes
-rw-r--r--crypto/test/data/PKITS/crls/TwoCRLsCAGoodCRL.crlbin0 -> 316 bytes
-rw-r--r--crypto/test/data/PKITS/crls/UIDCACRL.crlbin0 -> 311 bytes
-rw-r--r--crypto/test/data/PKITS/crls/UTF8StringCaseInsensitiveMatchCACRL.crlbin0 -> 341 bytes
-rw-r--r--crypto/test/data/PKITS/crls/UTF8StringEncodedNamesCACRL.crlbin0 -> 318 bytes
-rw-r--r--crypto/test/data/PKITS/crls/UnknownCRLEntryExtensionCACRL.crlbin0 -> 392 bytes
-rw-r--r--crypto/test/data/PKITS/crls/UnknownCRLExtensionCACRL.crlbin0 -> 386 bytes
-rw-r--r--crypto/test/data/PKITS/crls/WrongCRLCACRL.crlbin0 -> 353 bytes
-rw-r--r--crypto/test/data/PKITS/crls/anyPolicyCACRL.crlbin0 -> 317 bytes
-rw-r--r--crypto/test/data/PKITS/crls/basicConstraintsCriticalcAFalseCACRL.crlbin0 -> 342 bytes
-rw-r--r--crypto/test/data/PKITS/crls/basicConstraintsNotCriticalCACRL.crlbin0 -> 337 bytes
-rw-r--r--crypto/test/data/PKITS/crls/basicConstraintsNotCriticalcAFalseCACRL.crlbin0 -> 346 bytes
-rw-r--r--crypto/test/data/PKITS/crls/deltaCRLCA1CRL.crlbin0 -> 509 bytes
-rw-r--r--crypto/test/data/PKITS/crls/deltaCRLCA1deltaCRL.crlbin0 -> 472 bytes
-rw-r--r--crypto/test/data/PKITS/crls/deltaCRLCA2CRL.crlbin0 -> 441 bytes
-rw-r--r--crypto/test/data/PKITS/crls/deltaCRLCA2deltaCRL.crlbin0 -> 368 bytes
-rw-r--r--crypto/test/data/PKITS/crls/deltaCRLCA3CRL.crlbin0 -> 404 bytes
-rw-r--r--crypto/test/data/PKITS/crls/deltaCRLCA3deltaCRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/deltaCRLIndicatorNoBaseCACRL.crlbin0 -> 348 bytes
-rw-r--r--crypto/test/data/PKITS/crls/distributionPoint1CACRL.crlbin0 -> 501 bytes
-rw-r--r--crypto/test/data/PKITS/crls/distributionPoint2CACRL.crlbin0 -> 419 bytes
-rw-r--r--crypto/test/data/PKITS/crls/indirectCRLCA1CRL.crlbin0 -> 373 bytes
-rw-r--r--crypto/test/data/PKITS/crls/indirectCRLCA3CRL.crlbin0 -> 427 bytes
-rw-r--r--crypto/test/data/PKITS/crls/indirectCRLCA3cRLIssuerCRL.crlbin0 -> 481 bytes
-rw-r--r--crypto/test/data/PKITS/crls/indirectCRLCA4cRLIssuerCRL.crlbin0 -> 481 bytes
-rw-r--r--crypto/test/data/PKITS/crls/indirectCRLCA5CRL.crlbin0 -> 1408 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy0CACRL.crlbin0 -> 325 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy1CACRL.crlbin0 -> 325 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCA1CRL.crlbin0 -> 329 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCA2CRL.crlbin0 -> 329 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCAIAP5CRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy1subsubCA2CRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy5CACRL.crlbin0 -> 325 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy5subCACRL.crlbin0 -> 328 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitAnyPolicy5subsubCACRL.crlbin0 -> 331 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping0CACRL.crlbin0 -> 329 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping0subCACRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12CACRL.crlbin0 -> 333 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subCACRL.crlbin0 -> 336 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subCAIPM5CRL.crlbin0 -> 340 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subsubCACRL.crlbin0 -> 339 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subsubCAIPM5CRL.crlbin0 -> 343 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1CACRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1subCACRL.crlbin0 -> 335 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1subsubCACRL.crlbin0 -> 338 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping5CACRL.crlbin0 -> 329 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping5subCACRL.crlbin0 -> 332 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping5subsubCACRL.crlbin0 -> 335 bytes
-rw-r--r--crypto/test/data/PKITS/crls/inhibitPolicyMapping5subsubsubCACRL.crlbin0 -> 338 bytes
-rw-r--r--crypto/test/data/PKITS/crls/keyUsageCriticalcRLSignFalseCACRL.crlbin0 -> 339 bytes
-rw-r--r--crypto/test/data/PKITS/crls/keyUsageCriticalkeyCertSignFalseCACRL.crlbin0 -> 343 bytes
-rw-r--r--crypto/test/data/PKITS/crls/keyUsageNotCriticalCACRL.crlbin0 -> 329 bytes
-rw-r--r--crypto/test/data/PKITS/crls/keyUsageNotCriticalcRLSignFalseCACRL.crlbin0 -> 343 bytes
-rw-r--r--crypto/test/data/PKITS/crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crlbin0 -> 347 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN1CACRL.crlbin0 -> 327 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN1subCA1CRL.crlbin0 -> 359 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN1subCA2CRL.crlbin0 -> 359 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN1subCA3CRL.crlbin0 -> 359 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN2CACRL.crlbin0 -> 327 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN3CACRL.crlbin0 -> 327 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN3subCA1CRL.crlbin0 -> 331 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN3subCA2CRL.crlbin0 -> 331 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN4CACRL.crlbin0 -> 327 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDN5CACRL.crlbin0 -> 327 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDNS1CACRL.crlbin0 -> 328 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsDNS2CACRL.crlbin0 -> 328 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsRFC822CA1CRL.crlbin0 -> 331 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsRFC822CA2CRL.crlbin0 -> 331 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsRFC822CA3CRL.crlbin0 -> 331 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsURI1CACRL.crlbin0 -> 328 bytes
-rw-r--r--crypto/test/data/PKITS/crls/nameConstraintsURI2CACRL.crlbin0 -> 328 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlyContainsAttributeCertsCACRL.crlbin0 -> 351 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlyContainsCACertsCACRL.crlbin0 -> 344 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlyContainsUserCertsCACRL.crlbin0 -> 346 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlySomeReasonsCA1compromiseCRL.crlbin0 -> 378 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlySomeReasonsCA1otherreasonsCRL.crlbin0 -> 379 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlySomeReasonsCA2CRL1.crlbin0 -> 342 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlySomeReasonsCA2CRL2.crlbin0 -> 342 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlySomeReasonsCA3compromiseCRL.crlbin0 -> 438 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlySomeReasonsCA3otherreasonsCRL.crlbin0 -> 439 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlySomeReasonsCA4compromiseCRL.crlbin0 -> 475 bytes
-rw-r--r--crypto/test/data/PKITS/crls/onlySomeReasonsCA4otherreasonsCRL.crlbin0 -> 476 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint0CACRL.crlbin0 -> 326 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint0subCA2CRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint0subCACRL.crlbin0 -> 329 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint1CACRL.crlbin0 -> 326 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint1subCACRL.crlbin0 -> 329 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6CACRL.crlbin0 -> 326 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6subCA0CRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6subCA1CRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6subCA4CRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA00CRL.crlbin0 -> 334 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA11CRL.crlbin0 -> 334 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA41CRL.crlbin0 -> 334 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6subsubsubCA11XCRL.crlbin0 -> 338 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pathLenConstraint6subsubsubCA41XCRL.crlbin0 -> 338 bytes
-rw-r--r--crypto/test/data/PKITS/crls/pre2000CRLnextUpdateCACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy0CACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy0subCACRL.crlbin0 -> 333 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy0subsubCACRL.crlbin0 -> 336 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy0subsubsubCACRL.crlbin0 -> 339 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy10CACRL.crlbin0 -> 331 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy10subCACRL.crlbin0 -> 334 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy10subsubCACRL.crlbin0 -> 337 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy10subsubsubCACRL.crlbin0 -> 340 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy2CACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy2subCACRL.crlbin0 -> 333 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy4CACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy4subCACRL.crlbin0 -> 333 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy4subsubCACRL.crlbin0 -> 336 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy4subsubsubCACRL.crlbin0 -> 339 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy5CACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy5subCACRL.crlbin0 -> 333 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy5subsubCACRL.crlbin0 -> 336 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy5subsubsubCACRL.crlbin0 -> 339 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy7CACRL.crlbin0 -> 330 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy7subCARE2CRL.crlbin0 -> 336 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy7subsubCARE2RE4CRL.crlbin0 -> 342 bytes
-rw-r--r--crypto/test/data/PKITS/crls/requireExplicitPolicy7subsubsubCARE2RE4CRL.crlbin0 -> 345 bytes
-rw-r--r--crypto/test/data/asn1/masterlist-content.databin0 -> 1748 bytes
-rw-r--r--crypto/test/data/cms/sigs/PSSSignData.data1
-rw-r--r--crypto/test/data/cms/sigs/PSSSignDataSHA1.sigbin0 -> 3345 bytes
-rw-r--r--crypto/test/data/cms/sigs/PSSSignDataSHA1Enc.sigbin0 -> 3371 bytes
-rw-r--r--crypto/test/data/cms/sigs/PSSSignDataSHA256.sigbin0 -> 3417 bytes
-rw-r--r--crypto/test/data/cms/sigs/PSSSignDataSHA256Enc.sigbin0 -> 3443 bytes
-rw-r--r--crypto/test/data/cms/sigs/PSSSignDataSHA512.sigbin0 -> 3450 bytes
-rw-r--r--crypto/test/data/cms/sigs/PSSSignDataSHA512Enc.sigbin0 -> 3476 bytes
-rw-r--r--crypto/test/data/cms/sigs/counterSig.p7mbin0 -> 5647 bytes
-rw-r--r--crypto/test/data/hc256/hc128/ecrypt_HC-128.txt2337
-rw-r--r--crypto/test/data/hc256/hc256/ecrypt_HC-256_128K_128IV.txt2337
-rw-r--r--crypto/test/data/hc256/hc256/ecrypt_HC-256_128K_256IV.txt2783
-rw-r--r--crypto/test/data/hc256/hc256/ecrypt_HC-256_256K_128IV.txt2783
-rw-r--r--crypto/test/data/hc256/hc256/ecrypt_HC-256_256K_256IV.txt3257
-rw-r--r--crypto/test/data/keys/README.txt4
-rw-r--r--crypto/test/data/keys/pbes1/pbeWithMD2AndDES_CBC.keybin0 -> 677 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbeWithMD2AndRC2_CBC.keybin0 -> 677 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbeWithMD5AndDES_CBC.keybin0 -> 677 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbeWithMD5AndRC2_CBC.keybin0 -> 677 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbeWithSHA1AndDES_CBC.keybin0 -> 677 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbeWithSHA1AndRC2_CBC.keybin0 -> 677 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbe_WithSHA1And128BitRC2_CBC.keybin0 -> 678 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbe_WithSHA1And128BitRC4.keybin0 -> 673 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbe_WithSHA1And2_Key_TripleDES_CBC.keybin0 -> 678 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbe_WithSHA1And3_Key_TripleDES_CBC.keybin0 -> 678 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbe_WithSHA1And40BitRC2_CBC.keybin0 -> 678 bytes
-rw-r--r--crypto/test/data/keys/pbes1/pbe_WithSHA1And40BitRC4.keybin0 -> 673 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-128-cbc.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-128-cfb.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-128-cfb1.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-128-cfb8.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-128-ecb.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-128-ofb.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-192-cbc.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-192-cfb.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-192-cfb1.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-192-cfb8.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-192-ecb.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-192-ofb.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-256-cbc.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-256-cfb.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-256-cfb1.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-256-cfb8.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-256-ecb.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes-256-ofb.keybin0 -> 718 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes128.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes192.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.aes256.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.bf-cbc.keybin0 -> 715 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.bf.keybin0 -> 715 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.blowfish.keybin0 -> 715 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.cast-cbc.keybin0 -> 715 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.cast.keybin0 -> 715 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.cast5-cbc.keybin0 -> 715 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des-cbc.keybin0 -> 711 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des-cfb.keybin0 -> 706 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des-cfb1.keybin0 -> 706 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des-cfb8.keybin0 -> 706 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des-ecb.keybin0 -> 711 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des-ede.keybin0 -> 711 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des-ede3-cbc.keybin0 -> 714 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des-ofb.keybin0 -> 706 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des.keybin0 -> 711 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.des3.keybin0 -> 714 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.rc2-40-cbc.keybin0 -> 723 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.rc2-64-cbc.keybin0 -> 722 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.rc2-cbc.keybin0 -> 722 bytes
-rw-r--r--crypto/test/data/keys/pbes2/pbes2.rc2.keybin0 -> 722 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/README.txt36
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-1024-160.pubbin0 -> 534 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-1024-160.secbin0 -> 597 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-15360-512.pubbin0 -> 6043 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-15360-512.secbin0 -> 6150 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-2048-224.pubbin0 -> 941 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-2048-224.secbin0 -> 1012 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-3072-256.pubbin0 -> 1337 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-3072-256.secbin0 -> 1412 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-7680-384.pubbin0 -> 3113 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/keys/DSA-7680-384.secbin0 -> 3204 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-1024-160-sign.gpg1
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-1024-224-sign.gpgbin0 -> 121 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-1024-256-sign.gpgbin0 -> 123 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-1024-384-sign.gpgbin0 -> 122 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-1024-512-sign.gpgbin0 -> 122 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-15360-512-sign.gpgbin0 -> 216 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-2048-224-sign.gpgbin0 -> 141 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-3072-256-sign.gpgbin0 -> 150 bytes
-rw-r--r--crypto/test/data/openpgp/dsa/sigs/dsa-7680-384-sign.gpgbin0 -> 184 bytes
-rw-r--r--crypto/test/data/openssl/README.txt8
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes128_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes128_cfb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes128_ecb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes128_ofb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes192_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes192_cfb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes192_ecb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes192_ofb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes256_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes256_cfb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes256_ecb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_aes256_ofb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_blowfish_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_blowfish_cfb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_blowfish_ecb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_blowfish_ofb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des1_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des1_cfb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des1_ecb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des1_ofb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des2_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des2_cfb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des2_ecb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des2_ofb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des3_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des3_cfb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des3_ecb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_des3_ofb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_cfb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_ecb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_ofb.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_rc2_40_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_rc2_64_cbc.pem23
-rw-r--r--crypto/test/data/openssl/dsa/openssl_dsa_unencrypted.pem20
-rw-r--r--crypto/test/data/openssl/eckey.pem9
-rw-r--r--crypto/test/data/openssl/enckey.pem30
-rw-r--r--crypto/test/data/openssl/pkcs7.pem54
-rw-r--r--crypto/test/data/openssl/pkcs8/openssl_pkcs8_rsa.pem28
-rw-r--r--crypto/test/data/openssl/pkcs8/openssl_pkcs8_rsa_enc.pem30
-rw-r--r--crypto/test/data/openssl/pkcs8test.pem175
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes128_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes128_cfb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes128_ecb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes128_ofb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes192_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes192_cfb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes192_ecb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes192_ofb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes256_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes256_cfb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes256_ecb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_aes256_ofb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_blowfish_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_blowfish_cfb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_blowfish_ecb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_blowfish_ofb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des1_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des1_cfb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des1_ecb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des1_ofb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des2_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des2_cfb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des2_ecb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des2_ofb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des3_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des3_cfb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des3_ecb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_des3_ofb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_cfb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_ecb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_ofb.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_rc2_40_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_rc2_64_cbc.pem30
-rw-r--r--crypto/test/data/openssl/rsa/openssl_rsa_unencrypted.pem27
-rw-r--r--crypto/test/data/openssl/test.pem133
-rw-r--r--crypto/test/data/rfc4134/3.1.binbin0 -> 55 bytes
-rw-r--r--crypto/test/data/rfc4134/3.2.bin1
-rw-r--r--crypto/test/data/rfc4134/4.1.binbin0 -> 923 bytes
-rw-r--r--crypto/test/data/rfc4134/4.10.binbin0 -> 2051 bytes
-rw-r--r--crypto/test/data/rfc4134/4.11.binbin0 -> 1676 bytes
-rw-r--r--crypto/test/data/rfc4134/4.2.binbin0 -> 854 bytes
-rw-r--r--crypto/test/data/rfc4134/4.3.binbin0 -> 891 bytes
-rw-r--r--crypto/test/data/rfc4134/4.4.binbin0 -> 2833 bytes
-rw-r--r--crypto/test/data/rfc4134/4.5.binbin0 -> 1359 bytes
-rw-r--r--crypto/test/data/rfc4134/4.6.binbin0 -> 1467 bytes
-rw-r--r--crypto/test/data/rfc4134/4.7.binbin0 -> 920 bytes
-rw-r--r--crypto/test/data/rfc4134/4.8.eml39
-rw-r--r--crypto/test/data/rfc4134/4.9.eml28
-rw-r--r--crypto/test/data/rfc4134/5.1.binbin0 -> 290 bytes
-rw-r--r--crypto/test/data/rfc4134/5.2.binbin0 -> 361 bytes
-rw-r--r--crypto/test/data/rfc4134/5.3.eml19
-rw-r--r--crypto/test/data/rfc4134/6.0.binbin0 -> 96 bytes
-rw-r--r--crypto/test/data/rfc4134/7.1.binbin0 -> 89 bytes
-rw-r--r--crypto/test/data/rfc4134/7.2.binbin0 -> 152 bytes
-rw-r--r--crypto/test/data/rfc4134/AliceDSSSignByCarlNoInherit.cerbin0 -> 736 bytes
-rw-r--r--crypto/test/data/rfc4134/AlicePrivDSSSign.pribin0 -> 335 bytes
-rw-r--r--crypto/test/data/rfc4134/AlicePrivRSASign.pribin0 -> 634 bytes
-rw-r--r--crypto/test/data/rfc4134/AliceRSASignByCarl.cerbin0 -> 560 bytes
-rw-r--r--crypto/test/data/rfc4134/BobPrivRSAEncrypt.pribin0 -> 649 bytes
-rw-r--r--crypto/test/data/rfc4134/BobRSASignByCarl.cerbin0 -> 555 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlDSSCRLEmpty.crlbin0 -> 111 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlDSSCRLForAll.crlbin0 -> 219 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlDSSCRLForCarl.crlbin0 -> 134 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlDSSSelf.cerbin0 -> 671 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlPrivDSSSign.pribin0 -> 334 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlPrivRSASign.pribin0 -> 634 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlRSACRLEmpty.crlbin0 -> 202 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlRSACRLForAll.crlbin0 -> 311 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlRSACRLForCarl.crlbin0 -> 239 bytes
-rw-r--r--crypto/test/data/rfc4134/CarlRSASelf.cerbin0 -> 495 bytes
-rw-r--r--crypto/test/data/rfc4134/DianeDSSSignByCarlInherit.cerbin0 -> 444 bytes
-rw-r--r--crypto/test/data/rfc4134/DianePrivDSSSign.pribin0 -> 335 bytes
-rw-r--r--crypto/test/data/rfc4134/DianePrivRSASignEncrypt.pribin0 -> 635 bytes
-rw-r--r--crypto/test/data/rfc4134/DianeRSASignByCarl.cerbin0 -> 560 bytes
-rw-r--r--crypto/test/data/rfc4134/ExContent.bin1
-rw-r--r--crypto/test/data/rfc4134/rfc4134.txt7619
-rw-r--r--crypto/test/data/rsa3/self-testcase-A.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-A.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-B.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-B.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-C.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-C.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-D.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-D.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-E.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-E.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-F.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-F.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-G.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-G.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-H.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-H.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-I.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-I.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-J.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-J.pem52
-rw-r--r--crypto/test/data/rsa3/self-testcase-L.p12bin0 -> 2742 bytes
-rw-r--r--crypto/test/data/rsa3/self-testcase-L.pem52
-rw-r--r--crypto/test/data/rsa3/testcases.READMEbin0 -> 14352 bytes
-rw-r--r--crypto/test/data/scrypt/TestVectors.txt20
-rw-r--r--crypto/test/data/tls/keystores/client_store.dsabin0 -> 2035 bytes
-rw-r--r--crypto/test/data/tls/keystores/client_store.rsabin0 -> 1947 bytes
-rw-r--r--crypto/test/data/tls/keystores/server_store.dsabin0 -> 2035 bytes
-rw-r--r--crypto/test/data/tls/keystores/server_store.rsabin0 -> 1947 bytes
814 files changed, 24157 insertions, 0 deletions
diff --git a/crypto/test/data/PKITS/README.txt b/crypto/test/data/PKITS/README.txt
new file mode 100644
index 000000000..00a124b65
--- /dev/null
+++ b/crypto/test/data/PKITS/README.txt
@@ -0,0 +1,3 @@
+PKITS test data from http://csrc.nist.gov/pki/testing/x509paths.html
+
+For more details please check the website above.
diff --git a/crypto/test/data/PKITS/certs/AllCertificatesNoPoliciesTest2EE.crt b/crypto/test/data/PKITS/certs/AllCertificatesNoPoliciesTest2EE.crt
new file mode 100644
index 000000000..6c40491f2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/AllCertificatesNoPoliciesTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/AllCertificatesSamePoliciesTest10EE.crt b/crypto/test/data/PKITS/certs/AllCertificatesSamePoliciesTest10EE.crt
new file mode 100644
index 000000000..41b6d15b2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/AllCertificatesSamePoliciesTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/AllCertificatesSamePoliciesTest13EE.crt b/crypto/test/data/PKITS/certs/AllCertificatesSamePoliciesTest13EE.crt
new file mode 100644
index 000000000..9210106f5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/AllCertificatesSamePoliciesTest13EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/AllCertificatesanyPolicyTest11EE.crt b/crypto/test/data/PKITS/certs/AllCertificatesanyPolicyTest11EE.crt
new file mode 100644
index 000000000..a7f9d22b0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/AllCertificatesanyPolicyTest11EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/AnyPolicyTest14EE.crt b/crypto/test/data/PKITS/certs/AnyPolicyTest14EE.crt
new file mode 100644
index 000000000..b5961c75f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/AnyPolicyTest14EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BadCRLIssuerNameCACert.crt b/crypto/test/data/PKITS/certs/BadCRLIssuerNameCACert.crt
new file mode 100644
index 000000000..6afe5ddd0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BadCRLIssuerNameCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BadCRLSignatureCACert.crt b/crypto/test/data/PKITS/certs/BadCRLSignatureCACert.crt
new file mode 100644
index 000000000..bfac8a406
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BadCRLSignatureCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BadSignedCACert.crt b/crypto/test/data/PKITS/certs/BadSignedCACert.crt
new file mode 100644
index 000000000..abf7f319c
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BadSignedCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BadnotAfterDateCACert.crt b/crypto/test/data/PKITS/certs/BadnotAfterDateCACert.crt
new file mode 100644
index 000000000..d8babc267
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BadnotAfterDateCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BadnotBeforeDateCACert.crt b/crypto/test/data/PKITS/certs/BadnotBeforeDateCACert.crt
new file mode 100644
index 000000000..9b4cd824a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BadnotBeforeDateCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BasicSelfIssuedCRLSigningKeyCACert.crt b/crypto/test/data/PKITS/certs/BasicSelfIssuedCRLSigningKeyCACert.crt
new file mode 100644
index 000000000..41881148c
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BasicSelfIssuedCRLSigningKeyCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt b/crypto/test/data/PKITS/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt
new file mode 100644
index 000000000..7c1b13952
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BasicSelfIssuedCRLSigningKeyCRLCert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BasicSelfIssuedNewKeyCACert.crt b/crypto/test/data/PKITS/certs/BasicSelfIssuedNewKeyCACert.crt
new file mode 100644
index 000000000..b4ccbe84f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BasicSelfIssuedNewKeyCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt b/crypto/test/data/PKITS/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt
new file mode 100644
index 000000000..336a1caa0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BasicSelfIssuedNewKeyOldWithNewCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BasicSelfIssuedOldKeyCACert.crt b/crypto/test/data/PKITS/certs/BasicSelfIssuedOldKeyCACert.crt
new file mode 100644
index 000000000..78953d66f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BasicSelfIssuedOldKeyCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt b/crypto/test/data/PKITS/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt
new file mode 100644
index 000000000..853dc0613
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/BasicSelfIssuedOldKeyNewWithOldCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/CPSPointerQualifierTest20EE.crt b/crypto/test/data/PKITS/certs/CPSPointerQualifierTest20EE.crt
new file mode 100644
index 000000000..8bc703698
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/CPSPointerQualifierTest20EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DSACACert.crt b/crypto/test/data/PKITS/certs/DSACACert.crt
new file mode 100644
index 000000000..a1f9e05f6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DSACACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DSAParametersInheritedCACert.crt b/crypto/test/data/PKITS/certs/DSAParametersInheritedCACert.crt
new file mode 100644
index 000000000..7eae4863e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DSAParametersInheritedCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DifferentPoliciesTest12EE.crt b/crypto/test/data/PKITS/certs/DifferentPoliciesTest12EE.crt
new file mode 100644
index 000000000..6aa6ae5cd
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DifferentPoliciesTest12EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DifferentPoliciesTest3EE.crt b/crypto/test/data/PKITS/certs/DifferentPoliciesTest3EE.crt
new file mode 100644
index 000000000..8cd24ec7e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DifferentPoliciesTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DifferentPoliciesTest4EE.crt b/crypto/test/data/PKITS/certs/DifferentPoliciesTest4EE.crt
new file mode 100644
index 000000000..6af794d89
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DifferentPoliciesTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DifferentPoliciesTest5EE.crt b/crypto/test/data/PKITS/certs/DifferentPoliciesTest5EE.crt
new file mode 100644
index 000000000..43150466b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DifferentPoliciesTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DifferentPoliciesTest7EE.crt b/crypto/test/data/PKITS/certs/DifferentPoliciesTest7EE.crt
new file mode 100644
index 000000000..8caf46a33
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DifferentPoliciesTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DifferentPoliciesTest8EE.crt b/crypto/test/data/PKITS/certs/DifferentPoliciesTest8EE.crt
new file mode 100644
index 000000000..f49721d7e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DifferentPoliciesTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/DifferentPoliciesTest9EE.crt b/crypto/test/data/PKITS/certs/DifferentPoliciesTest9EE.crt
new file mode 100644
index 000000000..49a38a558
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/DifferentPoliciesTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/GeneralizedTimeCRLnextUpdateCACert.crt b/crypto/test/data/PKITS/certs/GeneralizedTimeCRLnextUpdateCACert.crt
new file mode 100644
index 000000000..c22228aa0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/GeneralizedTimeCRLnextUpdateCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/GoodCACert.crt b/crypto/test/data/PKITS/certs/GoodCACert.crt
new file mode 100644
index 000000000..5aecbc0cf
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/GoodCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/GoodsubCACert.crt b/crypto/test/data/PKITS/certs/GoodsubCACert.crt
new file mode 100644
index 000000000..09c98aad6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/GoodsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/GoodsubCAPanyPolicyMapping1to2CACert.crt b/crypto/test/data/PKITS/certs/GoodsubCAPanyPolicyMapping1to2CACert.crt
new file mode 100644
index 000000000..2540cd45d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/GoodsubCAPanyPolicyMapping1to2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidBadCRLIssuerNameTest5EE.crt b/crypto/test/data/PKITS/certs/InvalidBadCRLIssuerNameTest5EE.crt
new file mode 100644
index 000000000..749f7cc0f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidBadCRLIssuerNameTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidBadCRLSignatureTest4EE.crt b/crypto/test/data/PKITS/certs/InvalidBadCRLSignatureTest4EE.crt
new file mode 100644
index 000000000..3c4d2cbe2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidBadCRLSignatureTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt b/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt
new file mode 100644
index 000000000..7919115d2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedCRLSigningKeyTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt b/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt
new file mode 100644
index 000000000..b242bad64
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedCRLSigningKeyTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt b/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt
new file mode 100644
index 000000000..e75d97865
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedNewWithOldTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt
new file mode 100644
index 000000000..ed3000124
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidBasicSelfIssuedOldWithNewTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidCASignatureTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidCASignatureTest2EE.crt
new file mode 100644
index 000000000..8d337bddf
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidCASignatureTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidCAnotAfterDateTest5EE.crt b/crypto/test/data/PKITS/certs/InvalidCAnotAfterDateTest5EE.crt
new file mode 100644
index 000000000..6f6748d07
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidCAnotAfterDateTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidCAnotBeforeDateTest1EE.crt b/crypto/test/data/PKITS/certs/InvalidCAnotBeforeDateTest1EE.crt
new file mode 100644
index 000000000..e7b01de4d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidCAnotBeforeDateTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest31EE.crt b/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest31EE.crt
new file mode 100644
index 000000000..3f86eefe0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest31EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest33EE.crt b/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest33EE.crt
new file mode 100644
index 000000000..805205b29
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest33EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest38EE.crt b/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest38EE.crt
new file mode 100644
index 000000000..eff3779d3
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNSnameConstraintsTest38EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNandRFC822nameConstraintsTest28EE.crt b/crypto/test/data/PKITS/certs/InvalidDNandRFC822nameConstraintsTest28EE.crt
new file mode 100644
index 000000000..7c1dd9cb2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNandRFC822nameConstraintsTest28EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNandRFC822nameConstraintsTest29EE.crt b/crypto/test/data/PKITS/certs/InvalidDNandRFC822nameConstraintsTest29EE.crt
new file mode 100644
index 000000000..bdf08adcb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNandRFC822nameConstraintsTest29EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest10EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest10EE.crt
new file mode 100644
index 000000000..5ff84a45b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest12EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest12EE.crt
new file mode 100644
index 000000000..11ec10fe8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest12EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest13EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest13EE.crt
new file mode 100644
index 000000000..08c3050d1
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest13EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest15EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest15EE.crt
new file mode 100644
index 000000000..28ab46587
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest15EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest16EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest16EE.crt
new file mode 100644
index 000000000..56e42d0f1
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest16EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest17EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest17EE.crt
new file mode 100644
index 000000000..f9f53b932
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest17EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest20EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest20EE.crt
new file mode 100644
index 000000000..15fbe8faa
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest20EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest2EE.crt
new file mode 100644
index 000000000..8daf2f2a6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest3EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest3EE.crt
new file mode 100644
index 000000000..52cd9993e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest7EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest7EE.crt
new file mode 100644
index 000000000..799760b5f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest8EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest8EE.crt
new file mode 100644
index 000000000..d874621eb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest9EE.crt b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest9EE.crt
new file mode 100644
index 000000000..18314bd01
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDNnameConstraintsTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidDSASignatureTest6EE.crt b/crypto/test/data/PKITS/certs/InvalidDSASignatureTest6EE.crt
new file mode 100644
index 000000000..bcc900cf4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidDSASignatureTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidEESignatureTest3EE.crt b/crypto/test/data/PKITS/certs/InvalidEESignatureTest3EE.crt
new file mode 100644
index 000000000..e21461e37
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidEESignatureTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidEEnotAfterDateTest6EE.crt b/crypto/test/data/PKITS/certs/InvalidEEnotAfterDateTest6EE.crt
new file mode 100644
index 000000000..46269d05e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidEEnotAfterDateTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidEEnotBeforeDateTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidEEnotBeforeDateTest2EE.crt
new file mode 100644
index 000000000..f1bf1d1a4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidEEnotBeforeDateTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidIDPwithindirectCRLTest23EE.crt b/crypto/test/data/PKITS/certs/InvalidIDPwithindirectCRLTest23EE.crt
new file mode 100644
index 000000000..31965f628
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidIDPwithindirectCRLTest23EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidIDPwithindirectCRLTest26EE.crt b/crypto/test/data/PKITS/certs/InvalidIDPwithindirectCRLTest26EE.crt
new file mode 100644
index 000000000..b9b87a6c1
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidIDPwithindirectCRLTest26EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidLongSerialNumberTest18EE.crt b/crypto/test/data/PKITS/certs/InvalidLongSerialNumberTest18EE.crt
new file mode 100644
index 000000000..1c84dce0e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidLongSerialNumberTest18EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidMappingFromanyPolicyTest7EE.crt b/crypto/test/data/PKITS/certs/InvalidMappingFromanyPolicyTest7EE.crt
new file mode 100644
index 000000000..49aab726e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidMappingFromanyPolicyTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidMappingToanyPolicyTest8EE.crt b/crypto/test/data/PKITS/certs/InvalidMappingToanyPolicyTest8EE.crt
new file mode 100644
index 000000000..0a56c5e0d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidMappingToanyPolicyTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidMissingCRLTest1EE.crt b/crypto/test/data/PKITS/certs/InvalidMissingCRLTest1EE.crt
new file mode 100644
index 000000000..7af5ce5aa
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidMissingCRLTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidMissingbasicConstraintsTest1EE.crt b/crypto/test/data/PKITS/certs/InvalidMissingbasicConstraintsTest1EE.crt
new file mode 100644
index 000000000..f5d8703c3
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidMissingbasicConstraintsTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidNameChainingOrderTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidNameChainingOrderTest2EE.crt
new file mode 100644
index 000000000..9c40a3391
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidNameChainingOrderTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidNameChainingTest1EE.crt b/crypto/test/data/PKITS/certs/InvalidNameChainingTest1EE.crt
new file mode 100644
index 000000000..f7ae3b0e8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidNameChainingTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidNegativeSerialNumberTest15EE.crt b/crypto/test/data/PKITS/certs/InvalidNegativeSerialNumberTest15EE.crt
new file mode 100644
index 000000000..2d323b4df
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidNegativeSerialNumberTest15EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidOldCRLnextUpdateTest11EE.crt b/crypto/test/data/PKITS/certs/InvalidOldCRLnextUpdateTest11EE.crt
new file mode 100644
index 000000000..858db72d6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidOldCRLnextUpdateTest11EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest10EE.crt b/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest10EE.crt
new file mode 100644
index 000000000..ef227b8ea
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest2EE.crt
new file mode 100644
index 000000000..58ace916a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest4EE.crt b/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest4EE.crt
new file mode 100644
index 000000000..c0dd555d5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidPolicyMappingTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest22EE.crt b/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest22EE.crt
new file mode 100644
index 000000000..d8134e0a6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest22EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest24EE.crt b/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest24EE.crt
new file mode 100644
index 000000000..b71c6a377
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest24EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest26EE.crt b/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest26EE.crt
new file mode 100644
index 000000000..0ffdf26fa
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidRFC822nameConstraintsTest26EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidRevokedCATest2EE.crt b/crypto/test/data/PKITS/certs/InvalidRevokedCATest2EE.crt
new file mode 100644
index 000000000..65a0a1ab4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidRevokedCATest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidRevokedEETest3EE.crt b/crypto/test/data/PKITS/certs/InvalidRevokedEETest3EE.crt
new file mode 100644
index 000000000..80ea4d3f5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidRevokedEETest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt
new file mode 100644
index 000000000..21c32e976
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitAnyPolicyTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt
new file mode 100644
index 000000000..d57f0cb52
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitAnyPolicyTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt
new file mode 100644
index 000000000..577998c4f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt
new file mode 100644
index 000000000..621c325eb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest11EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt
new file mode 100644
index 000000000..98f8160cb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt
new file mode 100644
index 000000000..b80277286
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedinhibitPolicyMappingTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt
new file mode 100644
index 000000000..9fba63afb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedpathLenConstraintTest16EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt
new file mode 100644
index 000000000..a1b58ffaa
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedrequireExplicitPolicyTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt b/crypto/test/data/PKITS/certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt
new file mode 100644
index 000000000..108f38c5f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSelfIssuedrequireExplicitPolicyTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt b/crypto/test/data/PKITS/certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt
new file mode 100644
index 000000000..8671cc6f5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSeparateCertificateandCRLKeysTest20EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt b/crypto/test/data/PKITS/certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt
new file mode 100644
index 000000000..b8faa4acc
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidSeparateCertificateandCRLKeysTest21EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidURInameConstraintsTest35EE.crt b/crypto/test/data/PKITS/certs/InvalidURInameConstraintsTest35EE.crt
new file mode 100644
index 000000000..5313fc96d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidURInameConstraintsTest35EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidURInameConstraintsTest37EE.crt b/crypto/test/data/PKITS/certs/InvalidURInameConstraintsTest37EE.crt
new file mode 100644
index 000000000..81fd01db7
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidURInameConstraintsTest37EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidUnknownCRLEntryExtensionTest8EE.crt b/crypto/test/data/PKITS/certs/InvalidUnknownCRLEntryExtensionTest8EE.crt
new file mode 100644
index 000000000..6170daef8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidUnknownCRLEntryExtensionTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidUnknownCRLExtensionTest10EE.crt b/crypto/test/data/PKITS/certs/InvalidUnknownCRLExtensionTest10EE.crt
new file mode 100644
index 000000000..8c8dfc0d8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidUnknownCRLExtensionTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidUnknownCRLExtensionTest9EE.crt b/crypto/test/data/PKITS/certs/InvalidUnknownCRLExtensionTest9EE.crt
new file mode 100644
index 000000000..83c1b6af4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidUnknownCRLExtensionTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
new file mode 100644
index 000000000..65c7a68ec
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidUnknownCriticalCertificateExtensionTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidWrongCRLTest6EE.crt b/crypto/test/data/PKITS/certs/InvalidWrongCRLTest6EE.crt
new file mode 100644
index 000000000..206892ceb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidWrongCRLTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidcAFalseTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidcAFalseTest2EE.crt
new file mode 100644
index 000000000..25b925a28
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidcAFalseTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidcAFalseTest3EE.crt b/crypto/test/data/PKITS/certs/InvalidcAFalseTest3EE.crt
new file mode 100644
index 000000000..5d8f86320
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidcAFalseTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest27EE.crt b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest27EE.crt
new file mode 100644
index 000000000..1cb9f595d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest27EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest31EE.crt b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest31EE.crt
new file mode 100644
index 000000000..7e08a55d3
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest31EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest32EE.crt b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest32EE.crt
new file mode 100644
index 000000000..ec020a1a4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest32EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest34EE.crt b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest34EE.crt
new file mode 100644
index 000000000..b309b809b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest34EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest35EE.crt b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest35EE.crt
new file mode 100644
index 000000000..257daab5a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidcRLIssuerTest35EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crt b/crypto/test/data/PKITS/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crt
new file mode 100644
index 000000000..30e49a4ec
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddeltaCRLIndicatorNoBaseTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest10EE.crt b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest10EE.crt
new file mode 100644
index 000000000..d60e4f698
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest3EE.crt b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest3EE.crt
new file mode 100644
index 000000000..27ce111ae
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest4EE.crt b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest4EE.crt
new file mode 100644
index 000000000..a7edcf890
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest6EE.crt b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest6EE.crt
new file mode 100644
index 000000000..0e247f2ab
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest9EE.crt b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest9EE.crt
new file mode 100644
index 000000000..e5b34e4ac
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddeltaCRLTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddistributionPointTest2EE.crt b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest2EE.crt
new file mode 100644
index 000000000..c61a6460a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddistributionPointTest3EE.crt b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest3EE.crt
new file mode 100644
index 000000000..531033234
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddistributionPointTest6EE.crt b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest6EE.crt
new file mode 100644
index 000000000..9236346ee
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddistributionPointTest8EE.crt b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest8EE.crt
new file mode 100644
index 000000000..3520f6a3f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvaliddistributionPointTest9EE.crt b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest9EE.crt
new file mode 100644
index 000000000..5982bb6a2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvaliddistributionPointTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest1EE.crt b/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest1EE.crt
new file mode 100644
index 000000000..b6fe66182
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest4EE.crt b/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest4EE.crt
new file mode 100644
index 000000000..e6a924a1a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest5EE.crt b/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest5EE.crt
new file mode 100644
index 000000000..20c40a497
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest6EE.crt b/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest6EE.crt
new file mode 100644
index 000000000..03c8a3208
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidinhibitAnyPolicyTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest1EE.crt b/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest1EE.crt
new file mode 100644
index 000000000..f028a76ff
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest3EE.crt b/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest3EE.crt
new file mode 100644
index 000000000..3393af56c
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest5EE.crt b/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest5EE.crt
new file mode 100644
index 000000000..374681425
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest6EE.crt b/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest6EE.crt
new file mode 100644
index 000000000..9f7eafa22
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidinhibitPolicyMappingTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt b/crypto/test/data/PKITS/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt
new file mode 100644
index 000000000..888f7e2ae
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidkeyUsageCriticalcRLSignFalseTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt b/crypto/test/data/PKITS/certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt
new file mode 100644
index 000000000..43b0d9587
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidkeyUsageCriticalkeyCertSignFalseTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt b/crypto/test/data/PKITS/certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt
new file mode 100644
index 000000000..fbfb4c4e4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidkeyUsageNotCriticalcRLSignFalseTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt b/crypto/test/data/PKITS/certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt
new file mode 100644
index 000000000..a9da41446
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidkeyUsageNotCriticalkeyCertSignFalseTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidonlyContainsAttributeCertsTest14EE.crt b/crypto/test/data/PKITS/certs/InvalidonlyContainsAttributeCertsTest14EE.crt
new file mode 100644
index 000000000..60e0f7dbf
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidonlyContainsAttributeCertsTest14EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidonlyContainsCACertsTest12EE.crt b/crypto/test/data/PKITS/certs/InvalidonlyContainsCACertsTest12EE.crt
new file mode 100644
index 000000000..c0ada1281
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidonlyContainsCACertsTest12EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidonlyContainsUserCertsTest11EE.crt b/crypto/test/data/PKITS/certs/InvalidonlyContainsUserCertsTest11EE.crt
new file mode 100644
index 000000000..acf119985
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidonlyContainsUserCertsTest11EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest15EE.crt b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest15EE.crt
new file mode 100644
index 000000000..45460ee00
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest15EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest16EE.crt b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest16EE.crt
new file mode 100644
index 000000000..b82e84e61
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest16EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest17EE.crt b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest17EE.crt
new file mode 100644
index 000000000..d29a9ff08
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest17EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest20EE.crt b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest20EE.crt
new file mode 100644
index 000000000..431d60071
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest20EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest21EE.crt b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest21EE.crt
new file mode 100644
index 000000000..68bf8f9ab
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidonlySomeReasonsTest21EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest10EE.crt b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest10EE.crt
new file mode 100644
index 000000000..788389d3e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest11EE.crt b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest11EE.crt
new file mode 100644
index 000000000..01ea4d0b7
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest11EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest12EE.crt b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest12EE.crt
new file mode 100644
index 000000000..231641608
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest12EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest5EE.crt b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest5EE.crt
new file mode 100644
index 000000000..7164f04fe
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest6EE.crt b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest6EE.crt
new file mode 100644
index 000000000..eec5f9de1
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest9EE.crt b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest9EE.crt
new file mode 100644
index 000000000..6a063a61d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidpathLenConstraintTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/Invalidpre2000CRLnextUpdateTest12EE.crt b/crypto/test/data/PKITS/certs/Invalidpre2000CRLnextUpdateTest12EE.crt
new file mode 100644
index 000000000..634a08e51
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/Invalidpre2000CRLnextUpdateTest12EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt b/crypto/test/data/PKITS/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt
new file mode 100644
index 000000000..88916af6f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/Invalidpre2000UTCEEnotAfterDateTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidrequireExplicitPolicyTest3EE.crt b/crypto/test/data/PKITS/certs/InvalidrequireExplicitPolicyTest3EE.crt
new file mode 100644
index 000000000..38f98e475
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidrequireExplicitPolicyTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/InvalidrequireExplicitPolicyTest5EE.crt b/crypto/test/data/PKITS/certs/InvalidrequireExplicitPolicyTest5EE.crt
new file mode 100644
index 000000000..ca3ea17b8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/InvalidrequireExplicitPolicyTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/LongSerialNumberCACert.crt b/crypto/test/data/PKITS/certs/LongSerialNumberCACert.crt
new file mode 100644
index 000000000..6aaf3d0a4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/LongSerialNumberCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/Mapping1to2CACert.crt b/crypto/test/data/PKITS/certs/Mapping1to2CACert.crt
new file mode 100644
index 000000000..a458115a3
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/Mapping1to2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/MappingFromanyPolicyCACert.crt b/crypto/test/data/PKITS/certs/MappingFromanyPolicyCACert.crt
new file mode 100644
index 000000000..812da596d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/MappingFromanyPolicyCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/MappingToanyPolicyCACert.crt b/crypto/test/data/PKITS/certs/MappingToanyPolicyCACert.crt
new file mode 100644
index 000000000..42effeb79
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/MappingToanyPolicyCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/MissingbasicConstraintsCACert.crt b/crypto/test/data/PKITS/certs/MissingbasicConstraintsCACert.crt
new file mode 100644
index 000000000..17ebf2523
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/MissingbasicConstraintsCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/NameOrderingCACert.crt b/crypto/test/data/PKITS/certs/NameOrderingCACert.crt
new file mode 100644
index 000000000..6b744db06
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/NameOrderingCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/NegativeSerialNumberCACert.crt b/crypto/test/data/PKITS/certs/NegativeSerialNumberCACert.crt
new file mode 100644
index 000000000..57fc93300
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/NegativeSerialNumberCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/NoCRLCACert.crt b/crypto/test/data/PKITS/certs/NoCRLCACert.crt
new file mode 100644
index 000000000..acd908c6f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/NoCRLCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/NoPoliciesCACert.crt b/crypto/test/data/PKITS/certs/NoPoliciesCACert.crt
new file mode 100644
index 000000000..5e2a3fc70
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/NoPoliciesCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/NoissuingDistributionPointCACert.crt b/crypto/test/data/PKITS/certs/NoissuingDistributionPointCACert.crt
new file mode 100644
index 000000000..bf4f8140f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/NoissuingDistributionPointCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/OldCRLnextUpdateCACert.crt b/crypto/test/data/PKITS/certs/OldCRLnextUpdateCACert.crt
new file mode 100644
index 000000000..c9fb043b8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/OldCRLnextUpdateCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/OverlappingPoliciesTest6EE.crt b/crypto/test/data/PKITS/certs/OverlappingPoliciesTest6EE.crt
new file mode 100644
index 000000000..56d136cfd
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/OverlappingPoliciesTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/P12Mapping1to3CACert.crt b/crypto/test/data/PKITS/certs/P12Mapping1to3CACert.crt
new file mode 100644
index 000000000..f9ed7b756
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/P12Mapping1to3CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/P12Mapping1to3subCACert.crt b/crypto/test/data/PKITS/certs/P12Mapping1to3subCACert.crt
new file mode 100644
index 000000000..2029d6ba7
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/P12Mapping1to3subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/P12Mapping1to3subsubCACert.crt b/crypto/test/data/PKITS/certs/P12Mapping1to3subsubCACert.crt
new file mode 100644
index 000000000..50e7fcd26
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/P12Mapping1to3subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/P1Mapping1to234CACert.crt b/crypto/test/data/PKITS/certs/P1Mapping1to234CACert.crt
new file mode 100644
index 000000000..d7b3028d6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/P1Mapping1to234CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/P1Mapping1to234subCACert.crt b/crypto/test/data/PKITS/certs/P1Mapping1to234subCACert.crt
new file mode 100644
index 000000000..8648ddec9
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/P1Mapping1to234subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/P1anyPolicyMapping1to2CACert.crt b/crypto/test/data/PKITS/certs/P1anyPolicyMapping1to2CACert.crt
new file mode 100644
index 000000000..85e39feaa
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/P1anyPolicyMapping1to2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PanyPolicyMapping1to2CACert.crt b/crypto/test/data/PKITS/certs/PanyPolicyMapping1to2CACert.crt
new file mode 100644
index 000000000..5abbb788d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PanyPolicyMapping1to2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP1234CACert.crt b/crypto/test/data/PKITS/certs/PoliciesP1234CACert.crt
new file mode 100644
index 000000000..9a5eb5b73
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP1234CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP1234subCAP123Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP1234subCAP123Cert.crt
new file mode 100644
index 000000000..9b385455d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP1234subCAP123Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP1234subsubCAP123P12Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP1234subsubCAP123P12Cert.crt
new file mode 100644
index 000000000..4990a9b9d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP1234subsubCAP123P12Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP123CACert.crt b/crypto/test/data/PKITS/certs/PoliciesP123CACert.crt
new file mode 100644
index 000000000..03509d172
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP123CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP123subCAP12Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP123subCAP12Cert.crt
new file mode 100644
index 000000000..0009819fa
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP123subCAP12Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP123subsubCAP12P1Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP123subsubCAP12P1Cert.crt
new file mode 100644
index 000000000..669c18190
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP123subsubCAP12P1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP123subsubCAP12P2Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP123subsubCAP12P2Cert.crt
new file mode 100644
index 000000000..faa7516b7
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP123subsubCAP12P2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP123subsubsubCAP12P2P1Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP123subsubsubCAP12P2P1Cert.crt
new file mode 100644
index 000000000..44346d5c2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP123subsubsubCAP12P2P1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP12CACert.crt b/crypto/test/data/PKITS/certs/PoliciesP12CACert.crt
new file mode 100644
index 000000000..27bf52414
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP12CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP12subCAP1Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP12subCAP1Cert.crt
new file mode 100644
index 000000000..9a24328a7
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP12subCAP1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP12subsubCAP1P2Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP12subsubCAP1P2Cert.crt
new file mode 100644
index 000000000..49cc0ed6d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP12subsubCAP1P2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP2subCA2Cert.crt b/crypto/test/data/PKITS/certs/PoliciesP2subCA2Cert.crt
new file mode 100644
index 000000000..ccbedc695
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP2subCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP2subCACert.crt b/crypto/test/data/PKITS/certs/PoliciesP2subCACert.crt
new file mode 100644
index 000000000..ce66a79b5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP2subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/PoliciesP3CACert.crt b/crypto/test/data/PKITS/certs/PoliciesP3CACert.crt
new file mode 100644
index 000000000..90c4d266e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/PoliciesP3CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/RFC3280MandatoryAttributeTypesCACert.crt b/crypto/test/data/PKITS/certs/RFC3280MandatoryAttributeTypesCACert.crt
new file mode 100644
index 000000000..fa0e1c8f4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/RFC3280MandatoryAttributeTypesCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/RFC3280OptionalAttributeTypesCACert.crt b/crypto/test/data/PKITS/certs/RFC3280OptionalAttributeTypesCACert.crt
new file mode 100644
index 000000000..973373b10
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/RFC3280OptionalAttributeTypesCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/RevokedsubCACert.crt b/crypto/test/data/PKITS/certs/RevokedsubCACert.crt
new file mode 100644
index 000000000..edbd547f0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/RevokedsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/RolloverfromPrintableStringtoUTF8StringCACert.crt b/crypto/test/data/PKITS/certs/RolloverfromPrintableStringtoUTF8StringCACert.crt
new file mode 100644
index 000000000..658f20cf5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/RolloverfromPrintableStringtoUTF8StringCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt b/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt
new file mode 100644
index 000000000..67135a6c0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCA2CRLSigningCert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt b/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt
new file mode 100644
index 000000000..c05f92c3b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCA2CertificateSigningCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCRLSigningCert.crt b/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCRLSigningCert.crt
new file mode 100644
index 000000000..8c7200f87
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCRLSigningCert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCertificateSigningCACert.crt b/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCertificateSigningCACert.crt
new file mode 100644
index 000000000..10deedd4f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/SeparateCertificateandCRLKeysCertificateSigningCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/TrustAnchorRootCertificate.crt b/crypto/test/data/PKITS/certs/TrustAnchorRootCertificate.crt
new file mode 100644
index 000000000..21f520ee5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/TrustAnchorRootCertificate.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/TwoCRLsCACert.crt b/crypto/test/data/PKITS/certs/TwoCRLsCACert.crt
new file mode 100644
index 000000000..c6389d36a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/TwoCRLsCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UIDCACert.crt b/crypto/test/data/PKITS/certs/UIDCACert.crt
new file mode 100644
index 000000000..d852bc095
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UIDCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UTF8StringCaseInsensitiveMatchCACert.crt b/crypto/test/data/PKITS/certs/UTF8StringCaseInsensitiveMatchCACert.crt
new file mode 100644
index 000000000..c59715d5e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UTF8StringCaseInsensitiveMatchCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UTF8StringEncodedNamesCACert.crt b/crypto/test/data/PKITS/certs/UTF8StringEncodedNamesCACert.crt
new file mode 100644
index 000000000..68d49e021
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UTF8StringEncodedNamesCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UnknownCRLEntryExtensionCACert.crt b/crypto/test/data/PKITS/certs/UnknownCRLEntryExtensionCACert.crt
new file mode 100644
index 000000000..8c81c3744
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UnknownCRLEntryExtensionCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UnknownCRLExtensionCACert.crt b/crypto/test/data/PKITS/certs/UnknownCRLExtensionCACert.crt
new file mode 100644
index 000000000..db7d39e59
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UnknownCRLExtensionCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UserNoticeQualifierTest15EE.crt b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest15EE.crt
new file mode 100644
index 000000000..e912cdfa9
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest15EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UserNoticeQualifierTest16EE.crt b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest16EE.crt
new file mode 100644
index 000000000..ec04e1f3d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest16EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UserNoticeQualifierTest17EE.crt b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest17EE.crt
new file mode 100644
index 000000000..f78a47d6a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest17EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UserNoticeQualifierTest18EE.crt b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest18EE.crt
new file mode 100644
index 000000000..cc5cf5a77
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest18EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/UserNoticeQualifierTest19EE.crt b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest19EE.crt
new file mode 100644
index 000000000..3df534a98
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/UserNoticeQualifierTest19EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt b/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt
new file mode 100644
index 000000000..034de7fe0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedCRLSigningKeyTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt b/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt
new file mode 100644
index 000000000..199afb768
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedNewWithOldTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt b/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt
new file mode 100644
index 000000000..d4323162e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedNewWithOldTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt b/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt
new file mode 100644
index 000000000..b54a8b0f4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidBasicSelfIssuedOldWithNewTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidCertificatePathTest1EE.crt b/crypto/test/data/PKITS/certs/ValidCertificatePathTest1EE.crt
new file mode 100644
index 000000000..26985c9f6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidCertificatePathTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNSnameConstraintsTest30EE.crt b/crypto/test/data/PKITS/certs/ValidDNSnameConstraintsTest30EE.crt
new file mode 100644
index 000000000..ec7d43d46
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNSnameConstraintsTest30EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNSnameConstraintsTest32EE.crt b/crypto/test/data/PKITS/certs/ValidDNSnameConstraintsTest32EE.crt
new file mode 100644
index 000000000..ed88860ba
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNSnameConstraintsTest32EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNandRFC822nameConstraintsTest27EE.crt b/crypto/test/data/PKITS/certs/ValidDNandRFC822nameConstraintsTest27EE.crt
new file mode 100644
index 000000000..73759dca2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNandRFC822nameConstraintsTest27EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest11EE.crt b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest11EE.crt
new file mode 100644
index 000000000..1af47ba80
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest11EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest14EE.crt b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest14EE.crt
new file mode 100644
index 000000000..ff249f051
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest14EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest18EE.crt b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest18EE.crt
new file mode 100644
index 000000000..b658d671b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest18EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest19EE.crt b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest19EE.crt
new file mode 100644
index 000000000..f4e2b8448
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest19EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest1EE.crt b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest1EE.crt
new file mode 100644
index 000000000..4c86f9b77
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest4EE.crt b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest4EE.crt
new file mode 100644
index 000000000..beb401360
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest5EE.crt b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest5EE.crt
new file mode 100644
index 000000000..b68b6f7ca
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest6EE.crt b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest6EE.crt
new file mode 100644
index 000000000..9aff6e874
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDNnameConstraintsTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDSAParameterInheritanceTest5EE.crt b/crypto/test/data/PKITS/certs/ValidDSAParameterInheritanceTest5EE.crt
new file mode 100644
index 000000000..8fe2af452
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDSAParameterInheritanceTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidDSASignaturesTest4EE.crt b/crypto/test/data/PKITS/certs/ValidDSASignaturesTest4EE.crt
new file mode 100644
index 000000000..5b1cbc827
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidDSASignaturesTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt b/crypto/test/data/PKITS/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt
new file mode 100644
index 000000000..a22f2e6c1
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidGeneralizedTimeCRLnextUpdateTest13EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidGeneralizedTimenotAfterDateTest8EE.crt b/crypto/test/data/PKITS/certs/ValidGeneralizedTimenotAfterDateTest8EE.crt
new file mode 100644
index 000000000..15689c18c
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidGeneralizedTimenotAfterDateTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt b/crypto/test/data/PKITS/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt
new file mode 100644
index 000000000..385bb1eaa
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidGeneralizedTimenotBeforeDateTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest22EE.crt b/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest22EE.crt
new file mode 100644
index 000000000..6706cf1c3
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest22EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest24EE.crt b/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest24EE.crt
new file mode 100644
index 000000000..bea72fe2b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest24EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest25EE.crt b/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest25EE.crt
new file mode 100644
index 000000000..994c90ad6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidIDPwithindirectCRLTest25EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidLongSerialNumberTest16EE.crt b/crypto/test/data/PKITS/certs/ValidLongSerialNumberTest16EE.crt
new file mode 100644
index 000000000..11ba787ab
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidLongSerialNumberTest16EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidLongSerialNumberTest17EE.crt b/crypto/test/data/PKITS/certs/ValidLongSerialNumberTest17EE.crt
new file mode 100644
index 000000000..75504db35
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidLongSerialNumberTest17EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidNameChainingCapitalizationTest5EE.crt b/crypto/test/data/PKITS/certs/ValidNameChainingCapitalizationTest5EE.crt
new file mode 100644
index 000000000..5b633871e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidNameChainingCapitalizationTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidNameChainingWhitespaceTest3EE.crt b/crypto/test/data/PKITS/certs/ValidNameChainingWhitespaceTest3EE.crt
new file mode 100644
index 000000000..2aef73cfc
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidNameChainingWhitespaceTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidNameChainingWhitespaceTest4EE.crt b/crypto/test/data/PKITS/certs/ValidNameChainingWhitespaceTest4EE.crt
new file mode 100644
index 000000000..6890cdd85
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidNameChainingWhitespaceTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidNameUIDsTest6EE.crt b/crypto/test/data/PKITS/certs/ValidNameUIDsTest6EE.crt
new file mode 100644
index 000000000..3cddea4a2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidNameUIDsTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidNegativeSerialNumberTest14EE.crt b/crypto/test/data/PKITS/certs/ValidNegativeSerialNumberTest14EE.crt
new file mode 100644
index 000000000..139a086d8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidNegativeSerialNumberTest14EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidNoissuingDistributionPointTest10EE.crt b/crypto/test/data/PKITS/certs/ValidNoissuingDistributionPointTest10EE.crt
new file mode 100644
index 000000000..bd8ca38b0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidNoissuingDistributionPointTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest11EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest11EE.crt
new file mode 100644
index 000000000..9d19ad192
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest11EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest12EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest12EE.crt
new file mode 100644
index 000000000..76b9fe52c
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest12EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest13EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest13EE.crt
new file mode 100644
index 000000000..7db330523
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest13EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest14EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest14EE.crt
new file mode 100644
index 000000000..57bf42655
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest14EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest1EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest1EE.crt
new file mode 100644
index 000000000..436cb9e02
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest3EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest3EE.crt
new file mode 100644
index 000000000..c835b0b24
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest5EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest5EE.crt
new file mode 100644
index 000000000..faaeb9e46
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest6EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest6EE.crt
new file mode 100644
index 000000000..2cd443323
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidPolicyMappingTest9EE.crt b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest9EE.crt
new file mode 100644
index 000000000..4debc2942
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidPolicyMappingTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt b/crypto/test/data/PKITS/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt
new file mode 100644
index 000000000..c3e977666
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidRFC3280MandatoryAttributeTypesTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt b/crypto/test/data/PKITS/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt
new file mode 100644
index 000000000..f33c9d509
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidRFC3280OptionalAttributeTypesTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest21EE.crt b/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest21EE.crt
new file mode 100644
index 000000000..743e9eb9a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest21EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest23EE.crt b/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest23EE.crt
new file mode 100644
index 000000000..f8703ed8d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest23EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest25EE.crt b/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest25EE.crt
new file mode 100644
index 000000000..e89ae7f80
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidRFC822nameConstraintsTest25EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt b/crypto/test/data/PKITS/certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt
new file mode 100644
index 000000000..924d2f60a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidRolloverfromPrintableStringtoUTF8StringTest10EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt b/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt
new file mode 100644
index 000000000..2e7e99546
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitAnyPolicyTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt b/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt
new file mode 100644
index 000000000..764024716
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitAnyPolicyTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt b/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt
new file mode 100644
index 000000000..b4b282d99
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidSelfIssuedinhibitPolicyMappingTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidSelfIssuedpathLenConstraintTest15EE.crt b/crypto/test/data/PKITS/certs/ValidSelfIssuedpathLenConstraintTest15EE.crt
new file mode 100644
index 000000000..0bad35f76
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidSelfIssuedpathLenConstraintTest15EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidSelfIssuedpathLenConstraintTest17EE.crt b/crypto/test/data/PKITS/certs/ValidSelfIssuedpathLenConstraintTest17EE.crt
new file mode 100644
index 000000000..1535ef864
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidSelfIssuedpathLenConstraintTest17EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt b/crypto/test/data/PKITS/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt
new file mode 100644
index 000000000..781ce0d38
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidSelfIssuedrequireExplicitPolicyTest6EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidSeparateCertificateandCRLKeysTest19EE.crt b/crypto/test/data/PKITS/certs/ValidSeparateCertificateandCRLKeysTest19EE.crt
new file mode 100644
index 000000000..fda18197b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidSeparateCertificateandCRLKeysTest19EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidTwoCRLsTest7EE.crt b/crypto/test/data/PKITS/certs/ValidTwoCRLsTest7EE.crt
new file mode 100644
index 000000000..e04433ad2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidTwoCRLsTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidURInameConstraintsTest34EE.crt b/crypto/test/data/PKITS/certs/ValidURInameConstraintsTest34EE.crt
new file mode 100644
index 000000000..b554f91e6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidURInameConstraintsTest34EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidURInameConstraintsTest36EE.crt b/crypto/test/data/PKITS/certs/ValidURInameConstraintsTest36EE.crt
new file mode 100644
index 000000000..8b1f00f21
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidURInameConstraintsTest36EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt b/crypto/test/data/PKITS/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt
new file mode 100644
index 000000000..8a9d0ca82
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidUTF8StringCaseInsensitiveMatchTest11EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidUTF8StringEncodedNamesTest9EE.crt b/crypto/test/data/PKITS/certs/ValidUTF8StringEncodedNamesTest9EE.crt
new file mode 100644
index 000000000..c901690b8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidUTF8StringEncodedNamesTest9EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt b/crypto/test/data/PKITS/certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
new file mode 100644
index 000000000..6ee8d1e3b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidUnknownNotCriticalCertificateExtensionTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidbasicConstraintsNotCriticalTest4EE.crt b/crypto/test/data/PKITS/certs/ValidbasicConstraintsNotCriticalTest4EE.crt
new file mode 100644
index 000000000..543710fda
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidbasicConstraintsNotCriticalTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidcRLIssuerTest28EE.crt b/crypto/test/data/PKITS/certs/ValidcRLIssuerTest28EE.crt
new file mode 100644
index 000000000..1448aa4a3
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidcRLIssuerTest28EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidcRLIssuerTest29EE.crt b/crypto/test/data/PKITS/certs/ValidcRLIssuerTest29EE.crt
new file mode 100644
index 000000000..ec442e1b1
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidcRLIssuerTest29EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidcRLIssuerTest30EE.crt b/crypto/test/data/PKITS/certs/ValidcRLIssuerTest30EE.crt
new file mode 100644
index 000000000..2dc236766
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidcRLIssuerTest30EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidcRLIssuerTest33EE.crt b/crypto/test/data/PKITS/certs/ValidcRLIssuerTest33EE.crt
new file mode 100644
index 000000000..65b28440d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidcRLIssuerTest33EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValiddeltaCRLTest2EE.crt b/crypto/test/data/PKITS/certs/ValiddeltaCRLTest2EE.crt
new file mode 100644
index 000000000..0d24df052
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValiddeltaCRLTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValiddeltaCRLTest5EE.crt b/crypto/test/data/PKITS/certs/ValiddeltaCRLTest5EE.crt
new file mode 100644
index 000000000..2bdaaf21e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValiddeltaCRLTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValiddeltaCRLTest7EE.crt b/crypto/test/data/PKITS/certs/ValiddeltaCRLTest7EE.crt
new file mode 100644
index 000000000..3f6792194
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValiddeltaCRLTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValiddeltaCRLTest8EE.crt b/crypto/test/data/PKITS/certs/ValiddeltaCRLTest8EE.crt
new file mode 100644
index 000000000..65861281c
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValiddeltaCRLTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValiddistributionPointTest1EE.crt b/crypto/test/data/PKITS/certs/ValiddistributionPointTest1EE.crt
new file mode 100644
index 000000000..487cc2f9a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValiddistributionPointTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValiddistributionPointTest4EE.crt b/crypto/test/data/PKITS/certs/ValiddistributionPointTest4EE.crt
new file mode 100644
index 000000000..3782e79a8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValiddistributionPointTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValiddistributionPointTest5EE.crt b/crypto/test/data/PKITS/certs/ValiddistributionPointTest5EE.crt
new file mode 100644
index 000000000..07a8c494a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValiddistributionPointTest5EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValiddistributionPointTest7EE.crt b/crypto/test/data/PKITS/certs/ValiddistributionPointTest7EE.crt
new file mode 100644
index 000000000..948f37fb9
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValiddistributionPointTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidinhibitAnyPolicyTest2EE.crt b/crypto/test/data/PKITS/certs/ValidinhibitAnyPolicyTest2EE.crt
new file mode 100644
index 000000000..dc61d5231
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidinhibitAnyPolicyTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidinhibitPolicyMappingTest2EE.crt b/crypto/test/data/PKITS/certs/ValidinhibitPolicyMappingTest2EE.crt
new file mode 100644
index 000000000..fc432a1d4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidinhibitPolicyMappingTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidinhibitPolicyMappingTest4EE.crt b/crypto/test/data/PKITS/certs/ValidinhibitPolicyMappingTest4EE.crt
new file mode 100644
index 000000000..dce692769
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidinhibitPolicyMappingTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidkeyUsageNotCriticalTest3EE.crt b/crypto/test/data/PKITS/certs/ValidkeyUsageNotCriticalTest3EE.crt
new file mode 100644
index 000000000..bddbb9a26
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidkeyUsageNotCriticalTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidonlyContainsCACertsTest13EE.crt b/crypto/test/data/PKITS/certs/ValidonlyContainsCACertsTest13EE.crt
new file mode 100644
index 000000000..f35f5de2a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidonlyContainsCACertsTest13EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidonlySomeReasonsTest18EE.crt b/crypto/test/data/PKITS/certs/ValidonlySomeReasonsTest18EE.crt
new file mode 100644
index 000000000..7c0e1dedc
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidonlySomeReasonsTest18EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidonlySomeReasonsTest19EE.crt b/crypto/test/data/PKITS/certs/ValidonlySomeReasonsTest19EE.crt
new file mode 100644
index 000000000..f3a811c1b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidonlySomeReasonsTest19EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest13EE.crt b/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest13EE.crt
new file mode 100644
index 000000000..dcf88340d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest13EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest14EE.crt b/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest14EE.crt
new file mode 100644
index 000000000..66fe25647
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest14EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest7EE.crt b/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest7EE.crt
new file mode 100644
index 000000000..5f689eaf7
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest7EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest8EE.crt b/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest8EE.crt
new file mode 100644
index 000000000..2357bebf1
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidpathLenConstraintTest8EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/Validpre2000UTCnotBeforeDateTest3EE.crt b/crypto/test/data/PKITS/certs/Validpre2000UTCnotBeforeDateTest3EE.crt
new file mode 100644
index 000000000..5a6149927
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/Validpre2000UTCnotBeforeDateTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest1EE.crt b/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest1EE.crt
new file mode 100644
index 000000000..10399269e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest1EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest2EE.crt b/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest2EE.crt
new file mode 100644
index 000000000..451c2d81d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest2EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest4EE.crt b/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest4EE.crt
new file mode 100644
index 000000000..a2fa2f12b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/ValidrequireExplicitPolicyTest4EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/WrongCRLCACert.crt b/crypto/test/data/PKITS/certs/WrongCRLCACert.crt
new file mode 100644
index 000000000..4cc51952a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/WrongCRLCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/anyPolicyCACert.crt b/crypto/test/data/PKITS/certs/anyPolicyCACert.crt
new file mode 100644
index 000000000..4d9fb79b2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/anyPolicyCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/basicConstraintsCriticalcAFalseCACert.crt b/crypto/test/data/PKITS/certs/basicConstraintsCriticalcAFalseCACert.crt
new file mode 100644
index 000000000..12a8b5037
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/basicConstraintsCriticalcAFalseCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/basicConstraintsNotCriticalCACert.crt b/crypto/test/data/PKITS/certs/basicConstraintsNotCriticalCACert.crt
new file mode 100644
index 000000000..8f9da1eb1
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/basicConstraintsNotCriticalCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/basicConstraintsNotCriticalcAFalseCACert.crt b/crypto/test/data/PKITS/certs/basicConstraintsNotCriticalcAFalseCACert.crt
new file mode 100644
index 000000000..ca61262ec
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/basicConstraintsNotCriticalcAFalseCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/deltaCRLCA1Cert.crt b/crypto/test/data/PKITS/certs/deltaCRLCA1Cert.crt
new file mode 100644
index 000000000..47f74eb40
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/deltaCRLCA1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/deltaCRLCA2Cert.crt b/crypto/test/data/PKITS/certs/deltaCRLCA2Cert.crt
new file mode 100644
index 000000000..a99dd4030
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/deltaCRLCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/deltaCRLCA3Cert.crt b/crypto/test/data/PKITS/certs/deltaCRLCA3Cert.crt
new file mode 100644
index 000000000..eeaaa36e4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/deltaCRLCA3Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/deltaCRLIndicatorNoBaseCACert.crt b/crypto/test/data/PKITS/certs/deltaCRLIndicatorNoBaseCACert.crt
new file mode 100644
index 000000000..5ec06b3d6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/deltaCRLIndicatorNoBaseCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/distributionPoint1CACert.crt b/crypto/test/data/PKITS/certs/distributionPoint1CACert.crt
new file mode 100644
index 000000000..1e74bed04
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/distributionPoint1CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/distributionPoint2CACert.crt b/crypto/test/data/PKITS/certs/distributionPoint2CACert.crt
new file mode 100644
index 000000000..a6d37be90
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/distributionPoint2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/indirectCRLCA1Cert.crt b/crypto/test/data/PKITS/certs/indirectCRLCA1Cert.crt
new file mode 100644
index 000000000..ef079f653
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/indirectCRLCA1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/indirectCRLCA2Cert.crt b/crypto/test/data/PKITS/certs/indirectCRLCA2Cert.crt
new file mode 100644
index 000000000..4bfc0b5ed
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/indirectCRLCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/indirectCRLCA3Cert.crt b/crypto/test/data/PKITS/certs/indirectCRLCA3Cert.crt
new file mode 100644
index 000000000..f0787f0c5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/indirectCRLCA3Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/indirectCRLCA3cRLIssuerCert.crt b/crypto/test/data/PKITS/certs/indirectCRLCA3cRLIssuerCert.crt
new file mode 100644
index 000000000..f8089937b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/indirectCRLCA3cRLIssuerCert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/indirectCRLCA4Cert.crt b/crypto/test/data/PKITS/certs/indirectCRLCA4Cert.crt
new file mode 100644
index 000000000..6ebe43ce5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/indirectCRLCA4Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/indirectCRLCA4cRLIssuerCert.crt b/crypto/test/data/PKITS/certs/indirectCRLCA4cRLIssuerCert.crt
new file mode 100644
index 000000000..0468b0866
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/indirectCRLCA4cRLIssuerCert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/indirectCRLCA5Cert.crt b/crypto/test/data/PKITS/certs/indirectCRLCA5Cert.crt
new file mode 100644
index 000000000..90ba7d7e5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/indirectCRLCA5Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/indirectCRLCA6Cert.crt b/crypto/test/data/PKITS/certs/indirectCRLCA6Cert.crt
new file mode 100644
index 000000000..3c5781e96
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/indirectCRLCA6Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy0CACert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy0CACert.crt
new file mode 100644
index 000000000..474968979
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy0CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy1CACert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1CACert.crt
new file mode 100644
index 000000000..8d35b0e67
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy1SelfIssuedCACert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1SelfIssuedCACert.crt
new file mode 100644
index 000000000..0362dde87
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1SelfIssuedCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt
new file mode 100644
index 000000000..1d24bc194
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1SelfIssuedsubCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCA1Cert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCA1Cert.crt
new file mode 100644
index 000000000..af02467cd
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCA1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCA2Cert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCA2Cert.crt
new file mode 100644
index 000000000..e8590f72e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCAIAP5Cert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCAIAP5Cert.crt
new file mode 100644
index 000000000..75bc59e4a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subCAIAP5Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subsubCA2Cert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subsubCA2Cert.crt
new file mode 100644
index 000000000..cbf40ff09
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy1subsubCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy5CACert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy5CACert.crt
new file mode 100644
index 000000000..3765f6e38
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy5CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy5subCACert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy5subCACert.crt
new file mode 100644
index 000000000..f75006d1e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy5subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicy5subsubCACert.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicy5subsubCACert.crt
new file mode 100644
index 000000000..f2898ea06
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicy5subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitAnyPolicyTest3EE.crt b/crypto/test/data/PKITS/certs/inhibitAnyPolicyTest3EE.crt
new file mode 100644
index 000000000..850d6499f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitAnyPolicyTest3EE.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping0CACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping0CACert.crt
new file mode 100644
index 000000000..b4934e898
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping0CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping0subCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping0subCACert.crt
new file mode 100644
index 000000000..79f45b82b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping0subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12CACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12CACert.crt
new file mode 100644
index 000000000..57dd683c6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subCACert.crt
new file mode 100644
index 000000000..1e6bd7006
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt
new file mode 100644
index 000000000..e68346842
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subCAIPM5Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subsubCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subsubCACert.crt
new file mode 100644
index 000000000..f73f4d299
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt
new file mode 100644
index 000000000..fe32edafb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P12subsubCAIPM5Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1CACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1CACert.crt
new file mode 100644
index 000000000..b3bff4667
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt
new file mode 100644
index 000000000..399bd824f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1SelfIssuedCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt
new file mode 100644
index 000000000..cd2ce9448
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1SelfIssuedsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1subCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1subCACert.crt
new file mode 100644
index 000000000..31d9af5dd
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1subsubCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1subsubCACert.crt
new file mode 100644
index 000000000..13e78f0cc
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping1P1subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping5CACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping5CACert.crt
new file mode 100644
index 000000000..86ea42633
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping5CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subCACert.crt
new file mode 100644
index 000000000..788622cb9
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subsubCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subsubCACert.crt
new file mode 100644
index 000000000..d4a025e32
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subsubsubCACert.crt b/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subsubsubCACert.crt
new file mode 100644
index 000000000..2c0e6e888
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/inhibitPolicyMapping5subsubsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/keyUsageCriticalcRLSignFalseCACert.crt b/crypto/test/data/PKITS/certs/keyUsageCriticalcRLSignFalseCACert.crt
new file mode 100644
index 000000000..a50545a1e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/keyUsageCriticalcRLSignFalseCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/keyUsageCriticalkeyCertSignFalseCACert.crt b/crypto/test/data/PKITS/certs/keyUsageCriticalkeyCertSignFalseCACert.crt
new file mode 100644
index 000000000..f6824d3a2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/keyUsageCriticalkeyCertSignFalseCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/keyUsageNotCriticalCACert.crt b/crypto/test/data/PKITS/certs/keyUsageNotCriticalCACert.crt
new file mode 100644
index 000000000..344f7d90a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/keyUsageNotCriticalCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/keyUsageNotCriticalcRLSignFalseCACert.crt b/crypto/test/data/PKITS/certs/keyUsageNotCriticalcRLSignFalseCACert.crt
new file mode 100644
index 000000000..c02d6f491
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/keyUsageNotCriticalcRLSignFalseCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt b/crypto/test/data/PKITS/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
new file mode 100644
index 000000000..b9c46b5b8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/keyUsageNotCriticalkeyCertSignFalseCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN1CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN1CACert.crt
new file mode 100644
index 000000000..5379f1fbb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN1CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN1SelfIssuedCACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN1SelfIssuedCACert.crt
new file mode 100644
index 000000000..75f1f7e60
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN1SelfIssuedCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA1Cert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA1Cert.crt
new file mode 100644
index 000000000..670291b8e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA2Cert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA2Cert.crt
new file mode 100644
index 000000000..a010eee16
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA3Cert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA3Cert.crt
new file mode 100644
index 000000000..b31c28a6f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN1subCA3Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN2CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN2CACert.crt
new file mode 100644
index 000000000..3aab55b46
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN3CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN3CACert.crt
new file mode 100644
index 000000000..f1af18eac
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN3CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN3subCA1Cert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN3subCA1Cert.crt
new file mode 100644
index 000000000..e40c5f06b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN3subCA1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN3subCA2Cert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN3subCA2Cert.crt
new file mode 100644
index 000000000..94247454d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN3subCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN4CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN4CACert.crt
new file mode 100644
index 000000000..141eb7264
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN4CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDN5CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDN5CACert.crt
new file mode 100644
index 000000000..a0d06284a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDN5CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDNS1CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDNS1CACert.crt
new file mode 100644
index 000000000..10f0b35d2
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDNS1CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsDNS2CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsDNS2CACert.crt
new file mode 100644
index 000000000..83fabc569
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsDNS2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA1Cert.crt b/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA1Cert.crt
new file mode 100644
index 000000000..07fcc37a5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA2Cert.crt b/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA2Cert.crt
new file mode 100644
index 000000000..2001bfa39
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA3Cert.crt b/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA3Cert.crt
new file mode 100644
index 000000000..e3723693b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsRFC822CA3Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsURI1CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsURI1CACert.crt
new file mode 100644
index 000000000..d0dbca5ee
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsURI1CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/nameConstraintsURI2CACert.crt b/crypto/test/data/PKITS/certs/nameConstraintsURI2CACert.crt
new file mode 100644
index 000000000..bf988e6d6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/nameConstraintsURI2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/onlyContainsAttributeCertsCACert.crt b/crypto/test/data/PKITS/certs/onlyContainsAttributeCertsCACert.crt
new file mode 100644
index 000000000..6855fbe46
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/onlyContainsAttributeCertsCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/onlyContainsCACertsCACert.crt b/crypto/test/data/PKITS/certs/onlyContainsCACertsCACert.crt
new file mode 100644
index 000000000..055d8aace
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/onlyContainsCACertsCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/onlyContainsUserCertsCACert.crt b/crypto/test/data/PKITS/certs/onlyContainsUserCertsCACert.crt
new file mode 100644
index 000000000..f8fc85e7a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/onlyContainsUserCertsCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/onlySomeReasonsCA1Cert.crt b/crypto/test/data/PKITS/certs/onlySomeReasonsCA1Cert.crt
new file mode 100644
index 000000000..26ee389ad
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/onlySomeReasonsCA1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/onlySomeReasonsCA2Cert.crt b/crypto/test/data/PKITS/certs/onlySomeReasonsCA2Cert.crt
new file mode 100644
index 000000000..3c444e1e6
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/onlySomeReasonsCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/onlySomeReasonsCA3Cert.crt b/crypto/test/data/PKITS/certs/onlySomeReasonsCA3Cert.crt
new file mode 100644
index 000000000..3b0969977
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/onlySomeReasonsCA3Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/onlySomeReasonsCA4Cert.crt b/crypto/test/data/PKITS/certs/onlySomeReasonsCA4Cert.crt
new file mode 100644
index 000000000..4889d5ce8
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/onlySomeReasonsCA4Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint0CACert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint0CACert.crt
new file mode 100644
index 000000000..73c9433c4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint0CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint0SelfIssuedCACert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint0SelfIssuedCACert.crt
new file mode 100644
index 000000000..f66228e11
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint0SelfIssuedCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint0subCA2Cert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint0subCA2Cert.crt
new file mode 100644
index 000000000..c5cdea3df
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint0subCA2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint0subCACert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint0subCACert.crt
new file mode 100644
index 000000000..c51de222e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint0subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint1CACert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint1CACert.crt
new file mode 100644
index 000000000..b1da15b82
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint1CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint1SelfIssuedCACert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint1SelfIssuedCACert.crt
new file mode 100644
index 000000000..02aeffa91
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint1SelfIssuedCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint1SelfIssuedsubCACert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint1SelfIssuedsubCACert.crt
new file mode 100644
index 000000000..0a94f5f4f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint1SelfIssuedsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint1subCACert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint1subCACert.crt
new file mode 100644
index 000000000..a84fb534a
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint1subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6CACert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6CACert.crt
new file mode 100644
index 000000000..d89052bd9
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6subCA0Cert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6subCA0Cert.crt
new file mode 100644
index 000000000..4b220169b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6subCA0Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6subCA1Cert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6subCA1Cert.crt
new file mode 100644
index 000000000..b25ba34cb
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6subCA1Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6subCA4Cert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6subCA4Cert.crt
new file mode 100644
index 000000000..ca87ee8bf
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6subCA4Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA00Cert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA00Cert.crt
new file mode 100644
index 000000000..2b88eb6d7
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA00Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA11Cert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA11Cert.crt
new file mode 100644
index 000000000..de511c4d9
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA11Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA41Cert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA41Cert.crt
new file mode 100644
index 000000000..c6e6096b0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubCA41Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6subsubsubCA11XCert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubsubCA11XCert.crt
new file mode 100644
index 000000000..9c9dc4e15
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubsubCA11XCert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pathLenConstraint6subsubsubCA41XCert.crt b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubsubCA41XCert.crt
new file mode 100644
index 000000000..2729261cc
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pathLenConstraint6subsubsubCA41XCert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/pre2000CRLnextUpdateCACert.crt b/crypto/test/data/PKITS/certs/pre2000CRLnextUpdateCACert.crt
new file mode 100644
index 000000000..1a79b8158
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/pre2000CRLnextUpdateCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy0CACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy0CACert.crt
new file mode 100644
index 000000000..0eb93be3f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy0CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy0subCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy0subCACert.crt
new file mode 100644
index 000000000..f96129ec7
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy0subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy0subsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy0subsubCACert.crt
new file mode 100644
index 000000000..c0d9b49c0
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy0subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy0subsubsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy0subsubsubCACert.crt
new file mode 100644
index 000000000..497d53a8b
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy0subsubsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy10CACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy10CACert.crt
new file mode 100644
index 000000000..b3406b122
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy10CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy10subCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy10subCACert.crt
new file mode 100644
index 000000000..1544bbb75
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy10subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy10subsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy10subsubCACert.crt
new file mode 100644
index 000000000..0166d99f3
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy10subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy10subsubsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy10subsubsubCACert.crt
new file mode 100644
index 000000000..8018f6afa
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy10subsubsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy2CACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy2CACert.crt
new file mode 100644
index 000000000..7ec4e4944
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy2CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy2SelfIssuedCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy2SelfIssuedCACert.crt
new file mode 100644
index 000000000..285a05c72
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy2SelfIssuedCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy2SelfIssuedsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy2SelfIssuedsubCACert.crt
new file mode 100644
index 000000000..f29b37f27
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy2SelfIssuedsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy2subCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy2subCACert.crt
new file mode 100644
index 000000000..a1f20a3a5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy2subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy4CACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy4CACert.crt
new file mode 100644
index 000000000..c2a9c464f
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy4CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy4subCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy4subCACert.crt
new file mode 100644
index 000000000..9f9ea5bff
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy4subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy4subsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy4subsubCACert.crt
new file mode 100644
index 000000000..3d0f27852
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy4subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy4subsubsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy4subsubsubCACert.crt
new file mode 100644
index 000000000..a14f9d474
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy4subsubsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy5CACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy5CACert.crt
new file mode 100644
index 000000000..ef2010b4d
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy5CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy5subCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy5subCACert.crt
new file mode 100644
index 000000000..99d31d162
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy5subCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy5subsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy5subsubCACert.crt
new file mode 100644
index 000000000..99afa4d14
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy5subsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy5subsubsubCACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy5subsubsubCACert.crt
new file mode 100644
index 000000000..9abe48ddd
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy5subsubsubCACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy7CACert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy7CACert.crt
new file mode 100644
index 000000000..cac6bb62e
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy7CACert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy7subCARE2Cert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy7subCARE2Cert.crt
new file mode 100644
index 000000000..d55d884c5
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy7subCARE2Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt
new file mode 100644
index 000000000..1c9aec850
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy7subsubCARE2RE4Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt b/crypto/test/data/PKITS/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt
new file mode 100644
index 000000000..ecd5f45a4
--- /dev/null
+++ b/crypto/test/data/PKITS/certs/requireExplicitPolicy7subsubsubCARE2RE4Cert.crt
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BadCRLIssuerNameCACRL.crl b/crypto/test/data/PKITS/crls/BadCRLIssuerNameCACRL.crl
new file mode 100644
index 000000000..d4871b55f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BadCRLIssuerNameCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BadCRLSignatureCACRL.crl b/crypto/test/data/PKITS/crls/BadCRLSignatureCACRL.crl
new file mode 100644
index 000000000..b1658c34f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BadCRLSignatureCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BadSignedCACRL.crl b/crypto/test/data/PKITS/crls/BadSignedCACRL.crl
new file mode 100644
index 000000000..e0ded9b4c
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BadSignedCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BadnotAfterDateCACRL.crl b/crypto/test/data/PKITS/crls/BadnotAfterDateCACRL.crl
new file mode 100644
index 000000000..1ec2a0e81
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BadnotAfterDateCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BadnotBeforeDateCACRL.crl b/crypto/test/data/PKITS/crls/BadnotBeforeDateCACRL.crl
new file mode 100644
index 000000000..1a96d0f76
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BadnotBeforeDateCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BasicSelfIssuedCRLSigningKeyCACRL.crl b/crypto/test/data/PKITS/crls/BasicSelfIssuedCRLSigningKeyCACRL.crl
new file mode 100644
index 000000000..fed48645b
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BasicSelfIssuedCRLSigningKeyCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl b/crypto/test/data/PKITS/crls/BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl
new file mode 100644
index 000000000..053471f83
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BasicSelfIssuedCRLSigningKeyCRLCertCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BasicSelfIssuedNewKeyCACRL.crl b/crypto/test/data/PKITS/crls/BasicSelfIssuedNewKeyCACRL.crl
new file mode 100644
index 000000000..7370ed295
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BasicSelfIssuedNewKeyCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BasicSelfIssuedOldKeyCACRL.crl b/crypto/test/data/PKITS/crls/BasicSelfIssuedOldKeyCACRL.crl
new file mode 100644
index 000000000..dee61837e
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BasicSelfIssuedOldKeyCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/BasicSelfIssuedOldKeySelfIssuedCertCRL.crl b/crypto/test/data/PKITS/crls/BasicSelfIssuedOldKeySelfIssuedCertCRL.crl
new file mode 100644
index 000000000..4e7e0145b
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/BasicSelfIssuedOldKeySelfIssuedCertCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/DSACACRL.crl b/crypto/test/data/PKITS/crls/DSACACRL.crl
new file mode 100644
index 000000000..46463c8a2
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/DSACACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/DSAParametersInheritedCACRL.crl b/crypto/test/data/PKITS/crls/DSAParametersInheritedCACRL.crl
new file mode 100644
index 000000000..5bf724527
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/DSAParametersInheritedCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/GeneralizedTimeCRLnextUpdateCACRL.crl b/crypto/test/data/PKITS/crls/GeneralizedTimeCRLnextUpdateCACRL.crl
new file mode 100644
index 000000000..40387d3cf
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/GeneralizedTimeCRLnextUpdateCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/GoodCACRL.crl b/crypto/test/data/PKITS/crls/GoodCACRL.crl
new file mode 100644
index 000000000..2fdc3cc1a
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/GoodCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/GoodsubCACRL.crl b/crypto/test/data/PKITS/crls/GoodsubCACRL.crl
new file mode 100644
index 000000000..963d7033b
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/GoodsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/GoodsubCAPanyPolicyMapping1to2CACRL.crl b/crypto/test/data/PKITS/crls/GoodsubCAPanyPolicyMapping1to2CACRL.crl
new file mode 100644
index 000000000..9c5d1b278
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/GoodsubCAPanyPolicyMapping1to2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/LongSerialNumberCACRL.crl b/crypto/test/data/PKITS/crls/LongSerialNumberCACRL.crl
new file mode 100644
index 000000000..55f39b844
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/LongSerialNumberCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/Mapping1to2CACRL.crl b/crypto/test/data/PKITS/crls/Mapping1to2CACRL.crl
new file mode 100644
index 000000000..36e07e1e3
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/Mapping1to2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/MappingFromanyPolicyCACRL.crl b/crypto/test/data/PKITS/crls/MappingFromanyPolicyCACRL.crl
new file mode 100644
index 000000000..025b6bbba
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/MappingFromanyPolicyCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/MappingToanyPolicyCACRL.crl b/crypto/test/data/PKITS/crls/MappingToanyPolicyCACRL.crl
new file mode 100644
index 000000000..99f12535d
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/MappingToanyPolicyCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/MissingbasicConstraintsCACRL.crl b/crypto/test/data/PKITS/crls/MissingbasicConstraintsCACRL.crl
new file mode 100644
index 000000000..f91729cc1
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/MissingbasicConstraintsCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/NameOrderCACRL.crl b/crypto/test/data/PKITS/crls/NameOrderCACRL.crl
new file mode 100644
index 000000000..4cd201583
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/NameOrderCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/NegativeSerialNumberCACRL.crl b/crypto/test/data/PKITS/crls/NegativeSerialNumberCACRL.crl
new file mode 100644
index 000000000..99514d7a4
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/NegativeSerialNumberCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/NoPoliciesCACRL.crl b/crypto/test/data/PKITS/crls/NoPoliciesCACRL.crl
new file mode 100644
index 000000000..b77586bc6
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/NoPoliciesCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/NoissuingDistributionPointCACRL.crl b/crypto/test/data/PKITS/crls/NoissuingDistributionPointCACRL.crl
new file mode 100644
index 000000000..c7d5b1d63
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/NoissuingDistributionPointCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/OldCRLnextUpdateCACRL.crl b/crypto/test/data/PKITS/crls/OldCRLnextUpdateCACRL.crl
new file mode 100644
index 000000000..f121dff3d
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/OldCRLnextUpdateCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/P12Mapping1to3CACRL.crl b/crypto/test/data/PKITS/crls/P12Mapping1to3CACRL.crl
new file mode 100644
index 000000000..451d1986e
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/P12Mapping1to3CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/P12Mapping1to3subCACRL.crl b/crypto/test/data/PKITS/crls/P12Mapping1to3subCACRL.crl
new file mode 100644
index 000000000..b063e6bce
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/P12Mapping1to3subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/P12Mapping1to3subsubCACRL.crl b/crypto/test/data/PKITS/crls/P12Mapping1to3subsubCACRL.crl
new file mode 100644
index 000000000..6dcdf05d9
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/P12Mapping1to3subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/P1Mapping1to234CACRL.crl b/crypto/test/data/PKITS/crls/P1Mapping1to234CACRL.crl
new file mode 100644
index 000000000..70febec74
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/P1Mapping1to234CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/P1Mapping1to234subCACRL.crl b/crypto/test/data/PKITS/crls/P1Mapping1to234subCACRL.crl
new file mode 100644
index 000000000..8ee779929
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/P1Mapping1to234subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/P1anyPolicyMapping1to2CACRL.crl b/crypto/test/data/PKITS/crls/P1anyPolicyMapping1to2CACRL.crl
new file mode 100644
index 000000000..8cf52dc8f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/P1anyPolicyMapping1to2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PanyPolicyMapping1to2CACRL.crl b/crypto/test/data/PKITS/crls/PanyPolicyMapping1to2CACRL.crl
new file mode 100644
index 000000000..51482debf
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PanyPolicyMapping1to2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP1234CACRL.crl b/crypto/test/data/PKITS/crls/PoliciesP1234CACRL.crl
new file mode 100644
index 000000000..48c6b1a6f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP1234CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP1234subCAP123CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP1234subCAP123CRL.crl
new file mode 100644
index 000000000..aa8426312
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP1234subCAP123CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP1234subsubCAP123P12CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP1234subsubCAP123P12CRL.crl
new file mode 100644
index 000000000..ae1a01941
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP1234subsubCAP123P12CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP123CACRL.crl b/crypto/test/data/PKITS/crls/PoliciesP123CACRL.crl
new file mode 100644
index 000000000..deb37062e
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP123CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP123subCAP12CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP123subCAP12CRL.crl
new file mode 100644
index 000000000..ecd65f87b
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP123subCAP12CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP123subsubCAP12P1CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP123subsubCAP12P1CRL.crl
new file mode 100644
index 000000000..51f09f6d7
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP123subsubCAP12P1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP123subsubCAP2P2CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP123subsubCAP2P2CRL.crl
new file mode 100644
index 000000000..5d6fb365d
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP123subsubCAP2P2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP123subsubsubCAP12P2P1CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP123subsubsubCAP12P2P1CRL.crl
new file mode 100644
index 000000000..07908f67d
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP123subsubsubCAP12P2P1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP12CACRL.crl b/crypto/test/data/PKITS/crls/PoliciesP12CACRL.crl
new file mode 100644
index 000000000..5b090b05b
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP12CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP12subCAP1CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP12subCAP1CRL.crl
new file mode 100644
index 000000000..d2f29b792
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP12subCAP1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP12subsubCAP1P2CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP12subsubCAP1P2CRL.crl
new file mode 100644
index 000000000..bd4cf7576
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP12subsubCAP1P2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP2subCA2CRL.crl b/crypto/test/data/PKITS/crls/PoliciesP2subCA2CRL.crl
new file mode 100644
index 000000000..774bc7325
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP2subCA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP2subCACRL.crl b/crypto/test/data/PKITS/crls/PoliciesP2subCACRL.crl
new file mode 100644
index 000000000..7d7ba76b0
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP2subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/PoliciesP3CACRL.crl b/crypto/test/data/PKITS/crls/PoliciesP3CACRL.crl
new file mode 100644
index 000000000..9d81c6da9
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/PoliciesP3CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/RFC3280MandatoryAttributeTypesCACRL.crl b/crypto/test/data/PKITS/crls/RFC3280MandatoryAttributeTypesCACRL.crl
new file mode 100644
index 000000000..63ed6556f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/RFC3280MandatoryAttributeTypesCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/RFC3280OptionalAttributeTypesCACRL.crl b/crypto/test/data/PKITS/crls/RFC3280OptionalAttributeTypesCACRL.crl
new file mode 100644
index 000000000..e088ab148
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/RFC3280OptionalAttributeTypesCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/RevokedsubCACRL.crl b/crypto/test/data/PKITS/crls/RevokedsubCACRL.crl
new file mode 100644
index 000000000..c77ffa358
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/RevokedsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/RolloverfromPrintableStringtoUTF8StringCACRL.crl b/crypto/test/data/PKITS/crls/RolloverfromPrintableStringtoUTF8StringCACRL.crl
new file mode 100644
index 000000000..c7f5c7acd
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/RolloverfromPrintableStringtoUTF8StringCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/SeparateCertificateandCRLKeysCA2CRL.crl b/crypto/test/data/PKITS/crls/SeparateCertificateandCRLKeysCA2CRL.crl
new file mode 100644
index 000000000..a85f99f7c
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/SeparateCertificateandCRLKeysCA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/SeparateCertificateandCRLKeysCRL.crl b/crypto/test/data/PKITS/crls/SeparateCertificateandCRLKeysCRL.crl
new file mode 100644
index 000000000..4d159dd45
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/SeparateCertificateandCRLKeysCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/TrustAnchorRootCRL.crl b/crypto/test/data/PKITS/crls/TrustAnchorRootCRL.crl
new file mode 100644
index 000000000..3ba3df615
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/TrustAnchorRootCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/TwoCRLsCABadCRL.crl b/crypto/test/data/PKITS/crls/TwoCRLsCABadCRL.crl
new file mode 100644
index 000000000..fba92fae4
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/TwoCRLsCABadCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/TwoCRLsCAGoodCRL.crl b/crypto/test/data/PKITS/crls/TwoCRLsCAGoodCRL.crl
new file mode 100644
index 000000000..fcb7488a6
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/TwoCRLsCAGoodCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/UIDCACRL.crl b/crypto/test/data/PKITS/crls/UIDCACRL.crl
new file mode 100644
index 000000000..0da091a66
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/UIDCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/UTF8StringCaseInsensitiveMatchCACRL.crl b/crypto/test/data/PKITS/crls/UTF8StringCaseInsensitiveMatchCACRL.crl
new file mode 100644
index 000000000..9ee2a2354
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/UTF8StringCaseInsensitiveMatchCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/UTF8StringEncodedNamesCACRL.crl b/crypto/test/data/PKITS/crls/UTF8StringEncodedNamesCACRL.crl
new file mode 100644
index 000000000..3d7de0022
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/UTF8StringEncodedNamesCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/UnknownCRLEntryExtensionCACRL.crl b/crypto/test/data/PKITS/crls/UnknownCRLEntryExtensionCACRL.crl
new file mode 100644
index 000000000..efbdae412
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/UnknownCRLEntryExtensionCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/UnknownCRLExtensionCACRL.crl b/crypto/test/data/PKITS/crls/UnknownCRLExtensionCACRL.crl
new file mode 100644
index 000000000..de7111393
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/UnknownCRLExtensionCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/WrongCRLCACRL.crl b/crypto/test/data/PKITS/crls/WrongCRLCACRL.crl
new file mode 100644
index 000000000..3ba3df615
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/WrongCRLCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/anyPolicyCACRL.crl b/crypto/test/data/PKITS/crls/anyPolicyCACRL.crl
new file mode 100644
index 000000000..8506ea112
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/anyPolicyCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/basicConstraintsCriticalcAFalseCACRL.crl b/crypto/test/data/PKITS/crls/basicConstraintsCriticalcAFalseCACRL.crl
new file mode 100644
index 000000000..15a7e3d10
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/basicConstraintsCriticalcAFalseCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/basicConstraintsNotCriticalCACRL.crl b/crypto/test/data/PKITS/crls/basicConstraintsNotCriticalCACRL.crl
new file mode 100644
index 000000000..9e5ac6215
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/basicConstraintsNotCriticalCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/basicConstraintsNotCriticalcAFalseCACRL.crl b/crypto/test/data/PKITS/crls/basicConstraintsNotCriticalcAFalseCACRL.crl
new file mode 100644
index 000000000..dfbbec9f8
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/basicConstraintsNotCriticalcAFalseCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/deltaCRLCA1CRL.crl b/crypto/test/data/PKITS/crls/deltaCRLCA1CRL.crl
new file mode 100644
index 000000000..fb562aaa6
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/deltaCRLCA1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/deltaCRLCA1deltaCRL.crl b/crypto/test/data/PKITS/crls/deltaCRLCA1deltaCRL.crl
new file mode 100644
index 000000000..9a76c5cf1
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/deltaCRLCA1deltaCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/deltaCRLCA2CRL.crl b/crypto/test/data/PKITS/crls/deltaCRLCA2CRL.crl
new file mode 100644
index 000000000..36d66fe6d
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/deltaCRLCA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/deltaCRLCA2deltaCRL.crl b/crypto/test/data/PKITS/crls/deltaCRLCA2deltaCRL.crl
new file mode 100644
index 000000000..713d54a4c
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/deltaCRLCA2deltaCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/deltaCRLCA3CRL.crl b/crypto/test/data/PKITS/crls/deltaCRLCA3CRL.crl
new file mode 100644
index 000000000..4527c9a8f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/deltaCRLCA3CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/deltaCRLCA3deltaCRL.crl b/crypto/test/data/PKITS/crls/deltaCRLCA3deltaCRL.crl
new file mode 100644
index 000000000..bfb3c1d63
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/deltaCRLCA3deltaCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/deltaCRLIndicatorNoBaseCACRL.crl b/crypto/test/data/PKITS/crls/deltaCRLIndicatorNoBaseCACRL.crl
new file mode 100644
index 000000000..b9a591e1a
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/deltaCRLIndicatorNoBaseCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/distributionPoint1CACRL.crl b/crypto/test/data/PKITS/crls/distributionPoint1CACRL.crl
new file mode 100644
index 000000000..1be74de20
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/distributionPoint1CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/distributionPoint2CACRL.crl b/crypto/test/data/PKITS/crls/distributionPoint2CACRL.crl
new file mode 100644
index 000000000..5bdc14914
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/distributionPoint2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/indirectCRLCA1CRL.crl b/crypto/test/data/PKITS/crls/indirectCRLCA1CRL.crl
new file mode 100644
index 000000000..6eed456cb
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/indirectCRLCA1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/indirectCRLCA3CRL.crl b/crypto/test/data/PKITS/crls/indirectCRLCA3CRL.crl
new file mode 100644
index 000000000..02be17931
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/indirectCRLCA3CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/indirectCRLCA3cRLIssuerCRL.crl b/crypto/test/data/PKITS/crls/indirectCRLCA3cRLIssuerCRL.crl
new file mode 100644
index 000000000..166a457ea
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/indirectCRLCA3cRLIssuerCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/indirectCRLCA4cRLIssuerCRL.crl b/crypto/test/data/PKITS/crls/indirectCRLCA4cRLIssuerCRL.crl
new file mode 100644
index 000000000..b870a7fa5
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/indirectCRLCA4cRLIssuerCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/indirectCRLCA5CRL.crl b/crypto/test/data/PKITS/crls/indirectCRLCA5CRL.crl
new file mode 100644
index 000000000..25c2e8145
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/indirectCRLCA5CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy0CACRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy0CACRL.crl
new file mode 100644
index 000000000..301f7456a
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy0CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy1CACRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1CACRL.crl
new file mode 100644
index 000000000..ab1364573
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCA1CRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCA1CRL.crl
new file mode 100644
index 000000000..46c0e0c00
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCA1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCA2CRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCA2CRL.crl
new file mode 100644
index 000000000..1ee4b77ea
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCAIAP5CRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCAIAP5CRL.crl
new file mode 100644
index 000000000..af4fff09e
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subCAIAP5CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subsubCA2CRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subsubCA2CRL.crl
new file mode 100644
index 000000000..3b6b35c33
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy1subsubCA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy5CACRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy5CACRL.crl
new file mode 100644
index 000000000..07f5e3de2
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy5CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy5subCACRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy5subCACRL.crl
new file mode 100644
index 000000000..373bdebbe
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy5subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitAnyPolicy5subsubCACRL.crl b/crypto/test/data/PKITS/crls/inhibitAnyPolicy5subsubCACRL.crl
new file mode 100644
index 000000000..e56b61c9a
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitAnyPolicy5subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping0CACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping0CACRL.crl
new file mode 100644
index 000000000..1ebad7097
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping0CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping0subCACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping0subCACRL.crl
new file mode 100644
index 000000000..e3f4f9712
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping0subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12CACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12CACRL.crl
new file mode 100644
index 000000000..5291d66d1
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subCACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subCACRL.crl
new file mode 100644
index 000000000..9c155a976
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subCAIPM5CRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subCAIPM5CRL.crl
new file mode 100644
index 000000000..dc7fe6836
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subCAIPM5CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subsubCACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subsubCACRL.crl
new file mode 100644
index 000000000..9fcab42c6
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subsubCAIPM5CRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subsubCAIPM5CRL.crl
new file mode 100644
index 000000000..ebcdc5bb7
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P12subsubCAIPM5CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1CACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1CACRL.crl
new file mode 100644
index 000000000..36c2b7918
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1subCACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1subCACRL.crl
new file mode 100644
index 000000000..1fa7ac98f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1subsubCACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1subsubCACRL.crl
new file mode 100644
index 000000000..3b1ac99ff
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping1P1subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping5CACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping5CACRL.crl
new file mode 100644
index 000000000..a19deb75f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping5CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subCACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subCACRL.crl
new file mode 100644
index 000000000..c3ef69116
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subsubCACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subsubCACRL.crl
new file mode 100644
index 000000000..45df218ac
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subsubsubCACRL.crl b/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subsubsubCACRL.crl
new file mode 100644
index 000000000..3ca93d4d0
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/inhibitPolicyMapping5subsubsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/keyUsageCriticalcRLSignFalseCACRL.crl b/crypto/test/data/PKITS/crls/keyUsageCriticalcRLSignFalseCACRL.crl
new file mode 100644
index 000000000..6f02f8089
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/keyUsageCriticalcRLSignFalseCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/keyUsageCriticalkeyCertSignFalseCACRL.crl b/crypto/test/data/PKITS/crls/keyUsageCriticalkeyCertSignFalseCACRL.crl
new file mode 100644
index 000000000..4abda7660
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/keyUsageCriticalkeyCertSignFalseCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/keyUsageNotCriticalCACRL.crl b/crypto/test/data/PKITS/crls/keyUsageNotCriticalCACRL.crl
new file mode 100644
index 000000000..358e4e6a0
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/keyUsageNotCriticalCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/keyUsageNotCriticalcRLSignFalseCACRL.crl b/crypto/test/data/PKITS/crls/keyUsageNotCriticalcRLSignFalseCACRL.crl
new file mode 100644
index 000000000..707c73c2c
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/keyUsageNotCriticalcRLSignFalseCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl b/crypto/test/data/PKITS/crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl
new file mode 100644
index 000000000..5e817b640
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/keyUsageNotCriticalkeyCertSignFalseCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN1CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN1CACRL.crl
new file mode 100644
index 000000000..10c7389ed
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN1CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA1CRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA1CRL.crl
new file mode 100644
index 000000000..9d33b7c9f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA2CRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA2CRL.crl
new file mode 100644
index 000000000..7a3949e5a
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA3CRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA3CRL.crl
new file mode 100644
index 000000000..22aa2f9b1
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN1subCA3CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN2CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN2CACRL.crl
new file mode 100644
index 000000000..da6fe6f80
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN3CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN3CACRL.crl
new file mode 100644
index 000000000..83fd3a5e1
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN3CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN3subCA1CRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN3subCA1CRL.crl
new file mode 100644
index 000000000..8c6fb506d
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN3subCA1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN3subCA2CRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN3subCA2CRL.crl
new file mode 100644
index 000000000..1797663c3
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN3subCA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN4CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN4CACRL.crl
new file mode 100644
index 000000000..ae9f73a86
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN4CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDN5CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDN5CACRL.crl
new file mode 100644
index 000000000..46dbb8812
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDN5CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDNS1CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDNS1CACRL.crl
new file mode 100644
index 000000000..94fa45e45
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDNS1CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsDNS2CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsDNS2CACRL.crl
new file mode 100644
index 000000000..214093179
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsDNS2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA1CRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA1CRL.crl
new file mode 100644
index 000000000..a4b047314
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA2CRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA2CRL.crl
new file mode 100644
index 000000000..2042f6fc8
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA3CRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA3CRL.crl
new file mode 100644
index 000000000..8f207e51e
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsRFC822CA3CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsURI1CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsURI1CACRL.crl
new file mode 100644
index 000000000..b19c9de77
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsURI1CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/nameConstraintsURI2CACRL.crl b/crypto/test/data/PKITS/crls/nameConstraintsURI2CACRL.crl
new file mode 100644
index 000000000..3dbc011d4
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/nameConstraintsURI2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlyContainsAttributeCertsCACRL.crl b/crypto/test/data/PKITS/crls/onlyContainsAttributeCertsCACRL.crl
new file mode 100644
index 000000000..0993754a2
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlyContainsAttributeCertsCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlyContainsCACertsCACRL.crl b/crypto/test/data/PKITS/crls/onlyContainsCACertsCACRL.crl
new file mode 100644
index 000000000..621dfa9bc
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlyContainsCACertsCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlyContainsUserCertsCACRL.crl b/crypto/test/data/PKITS/crls/onlyContainsUserCertsCACRL.crl
new file mode 100644
index 000000000..1aee7c2ba
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlyContainsUserCertsCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlySomeReasonsCA1compromiseCRL.crl b/crypto/test/data/PKITS/crls/onlySomeReasonsCA1compromiseCRL.crl
new file mode 100644
index 000000000..3d5ff65da
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlySomeReasonsCA1compromiseCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlySomeReasonsCA1otherreasonsCRL.crl b/crypto/test/data/PKITS/crls/onlySomeReasonsCA1otherreasonsCRL.crl
new file mode 100644
index 000000000..83cce82f0
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlySomeReasonsCA1otherreasonsCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlySomeReasonsCA2CRL1.crl b/crypto/test/data/PKITS/crls/onlySomeReasonsCA2CRL1.crl
new file mode 100644
index 000000000..eb408f271
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlySomeReasonsCA2CRL1.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlySomeReasonsCA2CRL2.crl b/crypto/test/data/PKITS/crls/onlySomeReasonsCA2CRL2.crl
new file mode 100644
index 000000000..e333d2650
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlySomeReasonsCA2CRL2.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlySomeReasonsCA3compromiseCRL.crl b/crypto/test/data/PKITS/crls/onlySomeReasonsCA3compromiseCRL.crl
new file mode 100644
index 000000000..6837068b2
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlySomeReasonsCA3compromiseCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlySomeReasonsCA3otherreasonsCRL.crl b/crypto/test/data/PKITS/crls/onlySomeReasonsCA3otherreasonsCRL.crl
new file mode 100644
index 000000000..ef4ee3e05
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlySomeReasonsCA3otherreasonsCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlySomeReasonsCA4compromiseCRL.crl b/crypto/test/data/PKITS/crls/onlySomeReasonsCA4compromiseCRL.crl
new file mode 100644
index 000000000..45fcc0bbd
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlySomeReasonsCA4compromiseCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/onlySomeReasonsCA4otherreasonsCRL.crl b/crypto/test/data/PKITS/crls/onlySomeReasonsCA4otherreasonsCRL.crl
new file mode 100644
index 000000000..0fca68195
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/onlySomeReasonsCA4otherreasonsCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint0CACRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint0CACRL.crl
new file mode 100644
index 000000000..1e52e650f
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint0CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint0subCA2CRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint0subCA2CRL.crl
new file mode 100644
index 000000000..69488c7ba
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint0subCA2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint0subCACRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint0subCACRL.crl
new file mode 100644
index 000000000..00295797c
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint0subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint1CACRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint1CACRL.crl
new file mode 100644
index 000000000..9c069801e
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint1CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint1subCACRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint1subCACRL.crl
new file mode 100644
index 000000000..61d007640
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint1subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6CACRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6CACRL.crl
new file mode 100644
index 000000000..779c2b785
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6subCA0CRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6subCA0CRL.crl
new file mode 100644
index 000000000..30fee13e3
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6subCA0CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6subCA1CRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6subCA1CRL.crl
new file mode 100644
index 000000000..71eafbb42
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6subCA1CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6subCA4CRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6subCA4CRL.crl
new file mode 100644
index 000000000..8d14b0c8a
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6subCA4CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA00CRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA00CRL.crl
new file mode 100644
index 000000000..24ecdde93
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA00CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA11CRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA11CRL.crl
new file mode 100644
index 000000000..51b4ab70e
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA11CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA41CRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA41CRL.crl
new file mode 100644
index 000000000..9e4e18181
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubCA41CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6subsubsubCA11XCRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubsubCA11XCRL.crl
new file mode 100644
index 000000000..5891e6308
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubsubCA11XCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pathLenConstraint6subsubsubCA41XCRL.crl b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubsubCA41XCRL.crl
new file mode 100644
index 000000000..217e5e57e
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pathLenConstraint6subsubsubCA41XCRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/pre2000CRLnextUpdateCACRL.crl b/crypto/test/data/PKITS/crls/pre2000CRLnextUpdateCACRL.crl
new file mode 100644
index 000000000..6315186f4
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/pre2000CRLnextUpdateCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy0CACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy0CACRL.crl
new file mode 100644
index 000000000..5ac2d2764
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy0CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy0subCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy0subCACRL.crl
new file mode 100644
index 000000000..569ff3e26
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy0subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy0subsubCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy0subsubCACRL.crl
new file mode 100644
index 000000000..c614cbb1d
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy0subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy0subsubsubCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy0subsubsubCACRL.crl
new file mode 100644
index 000000000..910c035ff
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy0subsubsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy10CACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy10CACRL.crl
new file mode 100644
index 000000000..7bfbf7634
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy10CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy10subCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy10subCACRL.crl
new file mode 100644
index 000000000..bc4845d41
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy10subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy10subsubCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy10subsubCACRL.crl
new file mode 100644
index 000000000..802a6520d
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy10subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy10subsubsubCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy10subsubsubCACRL.crl
new file mode 100644
index 000000000..6f84d3972
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy10subsubsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy2CACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy2CACRL.crl
new file mode 100644
index 000000000..e14cdaa0b
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy2CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy2subCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy2subCACRL.crl
new file mode 100644
index 000000000..883091750
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy2subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy4CACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy4CACRL.crl
new file mode 100644
index 000000000..c6817a34a
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy4CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy4subCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy4subCACRL.crl
new file mode 100644
index 000000000..d1f5ad1e4
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy4subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy4subsubCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy4subsubCACRL.crl
new file mode 100644
index 000000000..7203b19af
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy4subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy4subsubsubCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy4subsubsubCACRL.crl
new file mode 100644
index 000000000..467e00472
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy4subsubsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy5CACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy5CACRL.crl
new file mode 100644
index 000000000..96848db79
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy5CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy5subCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy5subCACRL.crl
new file mode 100644
index 000000000..8bb7c1dbb
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy5subCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy5subsubCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy5subsubCACRL.crl
new file mode 100644
index 000000000..143dab515
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy5subsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy5subsubsubCACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy5subsubsubCACRL.crl
new file mode 100644
index 000000000..8a9c8b363
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy5subsubsubCACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy7CACRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy7CACRL.crl
new file mode 100644
index 000000000..43870fb63
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy7CACRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy7subCARE2CRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy7subCARE2CRL.crl
new file mode 100644
index 000000000..48c70c0fa
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy7subCARE2CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy7subsubCARE2RE4CRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy7subsubCARE2RE4CRL.crl
new file mode 100644
index 000000000..3808af657
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy7subsubCARE2RE4CRL.crl
Binary files differdiff --git a/crypto/test/data/PKITS/crls/requireExplicitPolicy7subsubsubCARE2RE4CRL.crl b/crypto/test/data/PKITS/crls/requireExplicitPolicy7subsubsubCARE2RE4CRL.crl
new file mode 100644
index 000000000..4ed5b0a13
--- /dev/null
+++ b/crypto/test/data/PKITS/crls/requireExplicitPolicy7subsubsubCARE2RE4CRL.crl
Binary files differdiff --git a/crypto/test/data/asn1/masterlist-content.data b/crypto/test/data/asn1/masterlist-content.data
new file mode 100644
index 000000000..d462f0d8d
--- /dev/null
+++ b/crypto/test/data/asn1/masterlist-content.data
Binary files differdiff --git a/crypto/test/data/cms/sigs/PSSSignData.data b/crypto/test/data/cms/sigs/PSSSignData.data
new file mode 100644
index 000000000..ab51e847c
--- /dev/null
+++ b/crypto/test/data/cms/sigs/PSSSignData.data
@@ -0,0 +1 @@
+This is a test message
\ No newline at end of file
diff --git a/crypto/test/data/cms/sigs/PSSSignDataSHA1.sig b/crypto/test/data/cms/sigs/PSSSignDataSHA1.sig
new file mode 100644
index 000000000..1ecfd010c
--- /dev/null
+++ b/crypto/test/data/cms/sigs/PSSSignDataSHA1.sig
Binary files differdiff --git a/crypto/test/data/cms/sigs/PSSSignDataSHA1Enc.sig b/crypto/test/data/cms/sigs/PSSSignDataSHA1Enc.sig
new file mode 100644
index 000000000..2f7e7b677
--- /dev/null
+++ b/crypto/test/data/cms/sigs/PSSSignDataSHA1Enc.sig
Binary files differdiff --git a/crypto/test/data/cms/sigs/PSSSignDataSHA256.sig b/crypto/test/data/cms/sigs/PSSSignDataSHA256.sig
new file mode 100644
index 000000000..114c592d7
--- /dev/null
+++ b/crypto/test/data/cms/sigs/PSSSignDataSHA256.sig
Binary files differdiff --git a/crypto/test/data/cms/sigs/PSSSignDataSHA256Enc.sig b/crypto/test/data/cms/sigs/PSSSignDataSHA256Enc.sig
new file mode 100644
index 000000000..28bb81108
--- /dev/null
+++ b/crypto/test/data/cms/sigs/PSSSignDataSHA256Enc.sig
Binary files differdiff --git a/crypto/test/data/cms/sigs/PSSSignDataSHA512.sig b/crypto/test/data/cms/sigs/PSSSignDataSHA512.sig
new file mode 100644
index 000000000..eb3429ba8
--- /dev/null
+++ b/crypto/test/data/cms/sigs/PSSSignDataSHA512.sig
Binary files differdiff --git a/crypto/test/data/cms/sigs/PSSSignDataSHA512Enc.sig b/crypto/test/data/cms/sigs/PSSSignDataSHA512Enc.sig
new file mode 100644
index 000000000..91556c681
--- /dev/null
+++ b/crypto/test/data/cms/sigs/PSSSignDataSHA512Enc.sig
Binary files differdiff --git a/crypto/test/data/cms/sigs/counterSig.p7m b/crypto/test/data/cms/sigs/counterSig.p7m
new file mode 100644
index 000000000..7d82b99c6
--- /dev/null
+++ b/crypto/test/data/cms/sigs/counterSig.p7m
Binary files differdiff --git a/crypto/test/data/hc256/hc128/ecrypt_HC-128.txt b/crypto/test/data/hc256/hc128/ecrypt_HC-128.txt
new file mode 100644
index 000000000..fbc2fbd38
--- /dev/null
+++ b/crypto/test/data/hc256/hc128/ecrypt_HC-128.txt
@@ -0,0 +1,2337 @@
+********************************************************************************
+*                          ECRYPT Stream Cipher Project                        *
+********************************************************************************
+
+Primitive Name: HC-128
+======================
+Profile: S3___
+Key size: 128 bits
+IV size: 128 bits
+
+Test vectors -- set 1
+=====================
+
+(stream is generated by encrypting 512 zero bytes)
+
+Set 1, vector#  0:
+                         key = 80000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 378602B98F32A74847515654AE0DE7ED
+                               8F72BC34776A065103E51595521FFE47
+                               F9AF0A4CB47999CFA26D33BF80954598
+                               9D53DEBFE7A9EFD8B9109CA6EFADDF83
+            stream[192..255] = E7F8DCC6A1D42ECF6A49651F7C610657
+                               B1DF6E58FBEF6A246D6D4CAA83858839
+                               86325BE2B4185B4D63D4BF766C5F4B73
+                               0B89C3CD66018155DFE9D37B6F5C1251
+            stream[256..319] = 6D21763B2FEBADB212AC71388FF93586
+                               48AA1A0E874D3B6932D7F80A5657F88D
+                               A44BDC16AA21E531E3E473CFE6FCA9EE
+                               20739339CE4F2DAC793210C8CC20897F
+            stream[448..511] = 5BB39DF39C64BFA13F2AAE924D3DF4FA
+                               22899838ADB609806C022C36180A3E46
+                               A547CFF7F4DE1151A81AED3646B2D86E
+                               1F0F3C22C92D3459593ED599D1A535DF
+                  xor-digest = 1EFC3423B31F67D397923613A1169F54
+                               A35193C9A31484D48204A8380D19984A
+                               AB3C53E44D0511C1CA13A3823A0B2C24
+                               7602797C533F0D5251CD5FF60D4A4F5E
+
+Set 1, vector#  9:
+                         key = 00400000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 80978AC0647C7C5E3716B3B3DD9A3FD6
+                               EE0EC133F29A0F2F92E3F7AEFFE8CAD2
+                               789DB433255F7A9F2A9D0873B8932032
+                               A7FD7EE6D07C903738B78E88DC173674
+            stream[192..255] = E314E449A75D8CD4FB0BF8BB133915EF
+                               0471D3824CCB9CF828F2086EED1E09EF
+                               78E510E0D7362275CFECE3F2D79F5B37
+                               8C8F21D3817083098E1D3918DC49EB13
+            stream[256..319] = BD9BD906D4AC9B0A0A68C1371DDD0BAB
+                               7D36784577856634034D9A7BAF3A8B06
+                               1C29904A896A82526CCAED7899FCBCE2
+                               619E6AEDA6D79B55C6EE7C97353486F0
+            stream[448..511] = 163E7EDB8F4A866A0E1C991883B2A966
+                               0DF6C547BA4C3E2D59AC014170872C73
+                               220303B5AB4D7321CA0C25DF3E18D5D9
+                               1D6B52A5C2369F4F764B7E4649674F89
+                  xor-digest = 2F1B2356F1149C6EE7694E217332E4CA
+                               33E47D0DB237E71D542A4BFDE033137D
+                               C8085B39215AF06840E542E501FC0584
+                               257B7F6DCD6297CABF03026A95A6E27D
+
+Set 1, vector# 18:
+                         key = 00002000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 94DAB13AE0D2F9A65283C6AE98733110
+                               1C4EE45EC812AD67DDF3D1F026B51B17
+                               2D366C7E3B2D55E5AE7010A279D35B03
+                               83B77E96C6B2434C3E6DDC2401D64AEC
+            stream[192..255] = 8199B6243A278FA6C07B430B6FFAAD83
+                               C2A40A1115DEB693B446504AD35615CD
+                               C4881D06F2EC1EC5C189BC37C0F6AABC
+                               C349FD461023A1B840C40B7E96A481E4
+            stream[256..319] = A2FF8C499364E1E900EAE72A98399585
+                               6C609132B14C83B191D49BF251E73EE2
+                               0FC48469A1E72416F803CCB7C933A880
+                               F8343A8DE2AB9492190E86194680B21C
+            stream[448..511] = C442F7A0791CCC0F7E8D4CC454829E6C
+                               26811BE74AF8BC70276C4901277753CF
+                               E44FACC0ECB82E9E5803CD08A316D9EE
+                               5B0A016185BEEF9FE94A3E64C8BCB161
+                  xor-digest = 53170F85C0661EBB8E0C595C6405CE21
+                               B9F19433C791DB8A71883E4E6BA31656
+                               2268C2110CCF228AF6634A80599B6A0E
+                               24106DBA30C3098EE57A10B1604511E7
+
+Set 1, vector# 27:
+                         key = 00000010000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0D3549E38106BC69495957DE0722C36F
+                               B3362CB8BB2ECAAB49C99AA5455C4DC7
+                               363E990AE7FCAB1F4648413DDC698D79
+                               294F3FF36FD83C299AEE2772D34D057F
+            stream[192..255] = 3239C047E0DA62024EC64B1D8E8A5E0F
+                               6E89062774AB24D2B69A17FC7F4C6EA8
+                               85F71AEEF1B7A36A559EEE29D422CD4E
+                               98733C99CF47472F1E4A406EC58A80EA
+            stream[256..319] = 1B1F13FBB383683E26371ECB23F49D0D
+                               E3B0A224D96A1A87D63A6737614F0415
+                               DBAA27AE8107DA06E5BB62D96FE4502D
+                               7B92EB6B5AF180CE8C2373920C77292B
+            stream[448..511] = CDA9A705E95B0656600EE8CC654127ED
+                               0A8E362FACAC68B18C0C25CA57929F2B
+                               1761F0706FCB0E066338507BD04C7F62
+                               0FC91BB6AD77D569E30547959578216A
+                  xor-digest = 6D339778DCB212787325D09BA20110C9
+                               A9CAE09E5915DFB1F74BA59E9C610FEC
+                               7989F18AF4CE86AC3D135659F46DB2D3
+                               59C08FC80B14E10AEC6B6701F661E86B
+
+Set 1, vector# 36:
+                         key = 00000000080000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A4E7B46F89DD8205C71F6453B1ED3924
+                               5D7FBB100E7EBE4D1D27E69047AF47DB
+                               3575B3A580FB9591A5F794306CDFA3E1
+                               A0A61905827D5ED980F49932A5ABA561
+            stream[192..255] = 364556E21E20C5816ED375B9C12C0603
+                               B680F2A4972EDA77AF198A2F015ECEA4
+                               7171028016B99EEABE1DAA2131711466
+                               6D3C1558218D95A8068E1780BF738C2D
+            stream[256..319] = 84F5E62E1E8D4AD21DFE9B3537172D6E
+                               3F4539DD15B5A55B38373E9787F0A4DE
+                               5F4D90B0D56C0E1F8A5F9C282A1F5567
+                               342BF864960F27E5311A4FBE3B85CDF8
+            stream[448..511] = FB062A1FD5E64D97489F24A4F12193CA
+                               9C6F4711C993C13742EEF14D88009DCD
+                               FA40D295DB8959D1562DE734ED1AEF4C
+                               90D136852F37A4115757F21F40977025
+                  xor-digest = FB8B62297F1B5E510091057F075AD348
+                               54FD949E9E35712E2F455D25AA7EC559
+                               D55FFCC3D6832865EBDA17EEF34A2CCE
+                               C6758E6449BDE9D70B5071B2A1D5094D
+
+Set 1, vector# 45:
+                         key = 00000000000400000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DFAB6AB2296BDEB8D8B3F6A790F3885F
+                               093BAD3BE4E0BD63E43F69535F5E77CA
+                               DBA06B447471B03D6A47D6BCB5AE4D40
+                               03B8AF7738AB8EB4D5B9C6040A434A71
+            stream[192..255] = 9313979FA86022D65C61D902DC0D4F9F
+                               98C1D026B710B03123812FEABEE5C0ED
+                               8973F8B97CF7E281EEE0A5135A01F0B1
+                               4C6DC27B352CB349273EE5E34541C518
+            stream[256..319] = B53E875AA400CB453C7DBF5CEEEE4D69
+                               31763C844FEDD960E5410FC3A5E51B19
+                               7D252502EDBE71D457461A9D0033E26E
+                               C7F78BD9C39580695914941737645754
+            stream[448..511] = DED32F71701CB0AB10C3062F1A15571A
+                               E70F2E3AC7A533CF7C962B2F4C256A9E
+                               12EA7D7F7DEA955DE6C7CA512A7EB4B1
+                               80CE31FDD1F38BD486EF438D52B791A8
+                  xor-digest = B0EBC9D8BCC2DC7E20BBB7063FA84B6C
+                               109A619BE7EC9DF5C9C6182AD692DED1
+                               0F24329DA2E5C346A659F2DF60BA0F2F
+                               E0169D173C4C75D26363A0D7DB40A195
+
+Set 1, vector# 54:
+                         key = 00000000000002000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 9D5E9AA4795B8B5E97E415BD1F14E697
+                               3D5E1D148EC12743699A48DADD6EF61A
+                               4643E9A7C2D2F88D50A8B9A63E003367
+                               ADDD8DCC464EB1C0FA6C23D244E725C9
+            stream[192..255] = 8DC91C4A6B3E6B88EB7EE1E0F7345718
+                               6C80BCCEED7197FC98CB118EE13D9AE5
+                               3EC8C6917F38FEE09C5C6F08E475E058
+                               51D1E7D4EF0B24AB263F0AB5656E3E82
+            stream[256..319] = BC2875569BEA6623C7E16A6A87C972C1
+                               1EE3782148A48D51F6D9E32CFB42812A
+                               2D20A318F0D699C9E760159F591EB9DC
+                               9EF3429A2613FD30EF2C839FFFAC5D0C
+            stream[448..511] = 6733FAE7B9AE358748DCD6937D494F21
+                               46315B363CC50E362C5F585FD350C462
+                               BD99DD69F2644043100A9E690302CF26
+                               4436B96CC818B659555DE0ABCBCB911F
+                  xor-digest = ECCE54CD5721D18E47CAE60E30741660
+                               1F03D46F90A1110614728849445E66B9
+                               ADA53954F9E8DCB746CC4BCD4D82EA34
+                               30767E2CF9BE6BF81E19382DB5A7677E
+
+Set 1, vector# 63:
+                         key = 00000000000000010000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A88EADE3DE0EB0BA73CE09E995540BF3
+                               B8DF7485F028B1C3C15D1F813E2C5413
+                               5B004E1804EB6FD248505C998B5F2CCD
+                               B3EC043B40FE7A532981F932D107776F
+            stream[192..255] = D81CAE569DEC3E6D22C83F043B64FC88
+                               0B04116A646BBADC38B28848D17028D3
+                               11535C1AE172CD85A9B2D3ED4D728FCD
+                               0A5289DA14D823578E5B8984AEE42671
+            stream[256..319] = 18FF81D6F5D7678998B48A51CF0D024F
+                               5872A5C1084E20182A8C255938339D34
+                               6798356AD957663C089939F896330C12
+                               747C08E2BF752B4103661B98229FB5CF
+            stream[448..511] = 9B797430B254C3F4DDB6AA211254ED75
+                               13A7403B62D5D1E2452E43DBCC7B50C8
+                               266F82A5155D405A5B7E15E921AD8154
+                               362799FFE25F1E7ADE3434B0862E9D10
+                  xor-digest = 983E10E11689266E4569A99855A4F642
+                               9094FAEBEBCD68434BD771C8528FDC62
+                               D357A379A0D6D78B9543E9A4CCAA42CD
+                               DC719C3C880A358B409477D670F55EBF
+
+Set 1, vector# 72:
+                         key = 00000000000000000080000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 7ECBBF2FD6D7E521A15DD022D0988F7E
+                               319AC64A9ED55C72E2817AD91F778221
+                               98A55A9E9BFC9D01C0BF8BCD9828001A
+                               18AED8C48E3F6633FA541B74A1799C62
+            stream[192..255] = 1BC71E27C8EAF24C12E78A4F9FC8E000
+                               625AE2FA2AB74483C8EE3ABB69C77B13
+                               7DF6C9213A1EA8D6557F0C1688154B87
+                               BE22F1B87AEE346AF7AFDE02C4C2C776
+            stream[256..319] = D2AF220214395745FA09AF2FBBCDB112
+                               0A588713476B29479F48B92F278BF39B
+                               3048630F0EC091D1188E7CEFD4C6F8D2
+                               709187581999E5DEE22745D21C03BCA3
+            stream[448..511] = 995534950559F7F3D01A718891ABC639
+                               3D64688DE7FDA76C1DCF2B81F6934EE9
+                               4BE1DE90F720E073DB9E54DC101BF513
+                               5ED06CA4684A73A506553CB8713E4FEC
+                  xor-digest = 2E87F43F3622E1A512D0E540939727EA
+                               A035F7D7C136FFD565BF639C00165F7B
+                               6C33B969DDD106EC9D4CFAB1FA0D5618
+                               FD17C64CC68E94DAF7DB9791B7DE16A9
+
+Set 1, vector# 81:
+                         key = 00000000000000000000400000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 2AAC5C088CC1EC5D579779B7EEEB7F9D
+                               AEC2DF6224B8E39F9E74511E4E8CAD0E
+                               59E0BEFCFCFA73DA661B53350A470887
+                               11B1ADC5304481515256C94204EAD340
+            stream[192..255] = AA9240B5E98DD28D7CC6FDF07C61E536
+                               069C5D4B818A96DFF41939A57DF9FE45
+                               32F384A624B236064C1AFF1A37C8CE01
+                               23B87B7903EBB91D6D83C69C684090B5
+            stream[256..319] = FD816941100F6CCA2EFF27C275753702
+                               8B371BB985E878229621CA3D0B4E6BF9
+                               1F74BAF0C05F661C93B819092CF475E0
+                               C61EE25FC5FF6CC9BE274834E718EDC1
+            stream[448..511] = 0A2B3B21DE9AE621B9DA45091AA26213
+                               EE2E560D32FA4CB8ADC6DD1AF7EA11DE
+                               B4905EAC39580A5A89A68F85BED6CFFE
+                               820A79E20265488FBC9E266ADA0C4CFA
+                  xor-digest = 60ABAD1341AA90112B53568014827D64
+                               A4A39E7CCCD78943018C685D0CC4DEB7
+                               EE7A203B7C88ED8996EA7B2EEBBECC7D
+                               86E53A4B5E0646BA59CA88144B032C9F
+
+Set 1, vector# 90:
+                         key = 00000000000000000000002000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CB3DF6C584DC8826BAD57EC5B98D644D
+                               AFE6C749F0463744EE1CB03EC81DDEC4
+                               4B4948C634552BF4760A0976C67BB2D4
+                               C53F7A7805FDCC68C3ADB7ADBDF9B509
+            stream[192..255] = 0ABC3A02DEDCEE79E8C26D3667B085C5
+                               30FD86A2CAB845CCD323075D7D6FD7A7
+                               05E7532A5F630BDC205B1DE61DC29243
+                               A2DDC2750F9AF32EF0CD794EC074AA83
+            stream[256..319] = FC4AD0FCAB98C2F3379E3A3D1B35DEE3
+                               93B60A327A41BD5147DD17F315DBB5F6
+                               625D67ACCF9A460C2CFDAD84403D4163
+                               EFF59D1356C144E6237A09044BCFF8CB
+            stream[448..511] = EFDAD499C277519887424DBEFAD5DB2C
+                               97C97CE5E512871B5CA81D9408F59B39
+                               9E23B24AA57DC934C2F539CBCC6A9EE9
+                               750B3A5D08ACEAFDED87C325D01CE866
+                  xor-digest = 7D8E173BD06363238A383D72422F5FAB
+                               941BA41199C462C2110E29E62350C9AD
+                               15780C3BC2B9092641A4702B9A696430
+                               E38F7D0F6FFD1AE59B82787A3A69CA0E
+
+Set 1, vector# 99:
+                         key = 00000000000000000000000010000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = EBF5E178FA8E2E45F53B73AB15C2D54F
+                               A48DEAC9529BDA434E857A809CC7C0F9
+                               D8F372BAE323FBF79874EC53EAD3928E
+                               DB203A64C601A99BEE4C07473DDD3B23
+            stream[192..255] = D461188EA8C5F22E8649B6FA7B68274C
+                               D97EF513C81DA77CBAC826D9D20D9968
+                               716FBDA415BBF064DBFCB7D5AE12F72D
+                               4DD1FC3670A553EE6F23CFDA400F6D9A
+            stream[256..319] = 031589CA9A8B0C09BD0CB167D3D49C2F
+                               873AA718E0C9B3A3A515A9D196C5382F
+                               BB6CA5E3190FC20084F5A4D22DD92095
+                               8E3A1883E30F7BFB55B40747B495FD49
+            stream[448..511] = CF106A7EB0FD339B8EB67F09E2A27AFE
+                               A4117C472AA64CF1A41850062266B48F
+                               92CB46600E87E811121959B19999BFE9
+                               1C68A664A4C28ACC8AE5E6EA477D0A2F
+                  xor-digest = 2480D3C1DCD26EE2B05D964B3CD526C8
+                               4E39E6FF48EC793FB82F4AF928073D1D
+                               80887F9AED832951D4AB2FDB518B548F
+                               EB5A42FE6454C19FCC101019B598A808
+
+Set 1, vector#108:
+                         key = 00000000000000000000000000080000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 2EABC4033A51B3901B6340BE32F808EE
+                               A319582F21A7CF6633570E82AC879B60
+                               3E438847D9E3719EAB71F8E3247FEFA5
+                               C07B2282AA2FA80CEFFA8E076304FEBA
+            stream[192..255] = F178E16CCB405A8025FA50215B109BFC
+                               9CE3A655DAD91BCC64D89BE115D4BC84
+                               261DC0E440DAF6028D3AFEA13C9D53B1
+                               C38E2AA48153CCF3DD9791563E45A98C
+            stream[256..319] = 284E211A092241828DB7204310536167
+                               653D66987537E004201DFF6290CD8C37
+                               84AA31D76477908455CD4E1C51F907AC
+                               69893D7FD3D626989526F4E6891E82A0
+            stream[448..511] = 043F1740552381D9A01C882DD0D542B4
+                               8EE86ECF6B5D2A23B8EAECCA55224664
+                               5702B29F7CAB606417CDCCAFD9B63ACB
+                               CEC56E95C945B72DC457103B2C378A28
+                  xor-digest = 1A56CC2BC61F1A802CDF26A84BD37A9C
+                               86F903637E5A1BB21B5829994628B000
+                               2A356A4D150DC529907786BAABD0C733
+                               4500BE0DDC9D487EC6356B2ACD65946E
+
+Set 1, vector#117:
+                         key = 00000000000000000000000000000400
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = BA81D9884075FC9E2F9938392EB10354
+                               1AD1D4A599A6DAC3E33EEC59235C3559
+                               4448E3DAB3B5A5F56DAF7B86B63EF376
+                               3728193CCE74807DC7E26087D87BF7D8
+            stream[192..255] = 1F91ECF0B6E889D6FD6FA97510D2EE3F
+                               91552978AC896D69B10A923F6F5CCA67
+                               8320765AA5CDD2ABB4A5FB3CAF86C76E
+                               12280CABB4E74C8543C9D5B1D9B8268C
+            stream[256..319] = 31BF924BBD38F9FE050E17E50EB66C45
+                               081DC5CF49F0F02610828A91F31D0B29
+                               AAB0D6123D69347ADA5CFB37C8AE5E70
+                               38453B5194EA285F798179A875F75E70
+            stream[448..511] = 78F5C37A21EEBAB00F7A80656D72AE39
+                               5566B8114BA6EC8BCFE8C46D0CEB4C6A
+                               BDE4E4F0F131BAC671F8186821CA01E8
+                               69FAB184E938B93B56D1AA3C1D68D3AB
+                  xor-digest = EFA43D76919EF92EED6AA30B4FD2E37D
+                               461D4377618426C2912493665FBB004E
+                               0C92A654CB660FB709681F460DD61825
+                               C7A7089737F5F5DA10023049A0595DBE
+
+Set 1, vector#126:
+                         key = 00000000000000000000000000000002
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 23C1F447C5496B37512923D74B61CF71
+                               015A25988370C0F4E0E48194E4C3B72D
+                               0C9519F6A88D8AE9DD319A3C9160A6B5
+                               51FFBAF27D374B3E6F624344D06BD06B
+            stream[192..255] = 019E730A2D0DD92CB417B1FCF42D2352
+                               058F3B059E1FA4C489909E0B9B90944D
+                               9816E45E992893244CDEB5EA6AF79703
+                               F70CEC7C3E770D2A8310127B3EEA9026
+            stream[256..319] = 3BA682C375554002E718ECEAE6768648
+                               2442D9643AEB6E4D518A5146263B6BEC
+                               0577A4A0CCD7995F10B7F1312926C613
+                               B4BCFA28D37B85C7FE6CC64A26DBCD47
+            stream[448..511] = 41D18A4275E2E4DBACDD91D3F79A186F
+                               6B2F48BBB64D47186C32910E86914BB8
+                               74688AEE59998D8CF7635DDED58EA9E5
+                               C51DF64956C951C1F9123DC1C97A4027
+                  xor-digest = E7A40A98E52ACDD2CAD780E71312F128
+                               8A73CDDD2CABD28EB767A045871861B7
+                               680C64DE4986F508E8CAA04B49630B3B
+                               DF931CAF478B2C3470E483F3D2EA71A8
+
+Test vectors -- set 2
+=====================
+
+Set 2, vector#  0:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 82001573A003FD3B7FD72FFB0EAF63AA
+                               C62F12DEB629DCA72785A66268EC758B
+                               1EDB36900560898178E0AD009ABF1F49
+                               1330DC1C246E3D6CB264F6900271D59C
+            stream[192..255] = 76F5E28163A6F72F4AB72FCD90C69EED
+                               EF6D5C73539F14E7CA0BF6A9F229F12D
+                               1492EFCFDAD11EE26DE44F0E843178D2
+                               C989D4F21FE9B53C03C12874E83A7026
+            stream[256..319] = 3CDC1D88EDA836767090FB77DAE5ECC0
+                               0F5BF5CA8879733FAC19E8DE5C725636
+                               7E39E8C9C4EFCDD75DFA9660BBBEB584
+                               B5593DFF4566EAC37E857D9B9E21FF06
+            stream[448..511] = 713B389BD7E1651A450C051B77F83A96
+                               DA277A370FCEBC4303A18AB1C5FF5342
+                               B319F0593A67F2BE6DE7D256CEC89F65
+                               61FF60B8AB8621B6720206975269023F
+                  xor-digest = 4943A339E572249ED48A06F45BD60AC5
+                               26F1ED970617DC9DB29EFE99ACEC6C7B
+                               82C8F548503C3DC16E79C4D7D7B7C6C6
+                               08CE84DC170A72286CEA1148D180A7BD
+
+Set 2, vector#  9:
+                         key = 09090909090909090909090909090909
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 4C76978E4BC79261F8608B3E5327AEB4
+                               4F2F0305D5F6B6326E0127F00C50DEDB
+                               85F5915ED2D70C9BECA2866AEBE6D154
+                               A4CCD80AC88588CAF24FC805974C96A7
+            stream[192..255] = 5875CA142FA9AC13170031C71A3619EA
+                               ECC3D6E0692AC276E2CA29864643D364
+                               56DFA39E1782D487F49402AE32CB739F
+                               AE267CFC438495B292D21E6B4A21774B
+            stream[256..319] = 8CEB212AE637E8DE29AD64E7D0719338
+                               F41AFEB1F1022F30BE485B348722B7F5
+                               A57DE6F253C6B0828C6FB1EF6C59EEC5
+                               FAC3D7FCBAB8C6BDAE2310CE77ECA503
+            stream[448..511] = 4810F2AEA6804ED4820E5B9E7ADD1F44
+                               37EF320686F108947B42991ACC7C4887
+                               635E57E9AA90EF29F831D7959936DD95
+                               0F466666BB84280764F5557582FAC149
+                  xor-digest = 7EA2FDE204E339B9C85051F22A46587B
+                               3619F4F9AE11426F5470D9EAA1629476
+                               FF156BF2727CB6306E62BABB4A68E9AF
+                               610D50C8034C5D4E23BCAC487F3DCA03
+
+Set 2, vector# 18:
+                         key = 12121212121212121212121212121212
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 38F35C0172088DC537AE80089719655F
+                               E8671884235DB1F6477D776B8DD158A6
+                               F6914C168E9EDF0B1020C63EA1851D2E
+                               FE1A343C98ED4B4B23E52451B9BDC3D6
+            stream[192..255] = E88226EA0CA8B620A68402F83A1475C2
+                               54C875FD5D27C935130FDE6DCE3EA050
+                               4F121A7EBF6B572D6EB41240A65CD001
+                               5007AFF6C2A8827CC0841A6170C08467
+            stream[256..319] = 0ECB78E446AB9C763315031C95E570B5
+                               5A5D89BA13A228B80D86797BE378D766
+                               59B47D48AF0FDB4C3D439311963B0A0E
+                               1311E6FA792B089EE4797D9AD023FF5A
+            stream[448..511] = 44C71180BEDC7E3CD29F80B9922C1733
+                               5D815207E848FD528572CF61612A42E0
+                               AD4AEC01D042461A8C30ED194940F82F
+                               A442DFD9061C03A1B72592894A0C73BA
+                  xor-digest = 127E8501304A0632B8FA27A23BB97321
+                               BCD67F699D39A35A4324D5E8AD368E0D
+                               CF134D13FBBADE2FA930AFCA7D15FEC0
+                               B2682F0B09AAB3373069F6DAB9EA112C
+
+Set 2, vector# 27:
+                         key = 1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B90DA1C325244BDA08C319AA6B4ED7E8
+                               3DEF56BF03ADFB2A46E9041F4498BE2C
+                               4B9F76E7AF98697B2835F2F4D4585320
+                               36844D8FA3F34121D9BF624556A52BCB
+            stream[192..255] = ED912457955FE3EDB032F4E7C452A13D
+                               52361DAA3154A756B1C00B0079DBF782
+                               AD089F2C090691BF7B66695538402EFF
+                               893D27969913F25177C01F4CA2FF5195
+            stream[256..319] = 0127342854571D0640F2C283104FD6E4
+                               4FF9B9198492414C1803E36F01A2E79E
+                               3EF76F350542EFEA11419692B6A708F2
+                               0A6D938306E9212B8F047207E7C5782D
+            stream[448..511] = B297A467A6D2770B2609C7DC1EA505F8
+                               3A36223731550282001144B4DF3363BD
+                               49802CCDF59D22FC7C2CB7913B4FEFB9
+                               49128A2BED699B55D24E5B26C52BE674
+                  xor-digest = 711ED121D562F49A3D3F66FE95540DC1
+                               A58F5703108A7C484A53EDC9FA7455D0
+                               D356D9EA792AC30009754E94CF63493A
+                               8AA3BEADC0E7D671DAC10390C841F9EE
+
+Set 2, vector# 36:
+                         key = 24242424242424242424242424242424
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 38D294B5B1ED0A38C5430A355A5A5949
+                               0137741305AD7EB6159A1B97A956648F
+                               B27C16F507D5D5FF8E2B779BFF22CFD8
+                               DB4C7CF7FA78CBB20445D2F94518174E
+            stream[192..255] = FE70A06921BC304689079DDFB4CD4BBE
+                               FC64B0C8E014A65F6D84A804E8F8F1A1
+                               371D470977F033ADCA960346B189E848
+                               C899CD90446D5074C3C1EE48DD40F0C9
+            stream[256..319] = C9B90ED55AD83A8DE0547000ABD0A633
+                               653ED5D3B62EB16D2C3E176952786205
+                               AA702C32FC37DCDB714D8BB81E488438
+                               43B805F2FF5ECE2E6C0A4A4BA5746561
+            stream[448..511] = 396490C2E87DDA2FC2F9FD4D2E468A91
+                               A826ED3FB2AEE07DAB6E33EBB5D657B3
+                               2488B38BEE6E316DEA6439979112CC62
+                               0989E9907AD83A9479DF253A75FC6683
+                  xor-digest = 5478F54C1B95FFD16C6C873F900181F4
+                               EE33E5CB58CD28259E19645FF36B4419
+                               FF92A289E9C355E769D0CF6F004BB256
+                               E5134627E4E99459CA3916BC1216312E
+
+Set 2, vector# 45:
+                         key = 2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0188DFBDAB2AA5D4996601E8CBC5AEE1
+                               5254491641DCF5DEB7414FC751D52E56
+                               C253A98157200CE0C142C355AB961015
+                               04991380F77C287212145552C000CFA2
+            stream[192..255] = 6957E2069E8F1042C6A46AC8ECAD2439
+                               0DB5739043E911FB9BBE4A7071A88B14
+                               2867E45971D7C19BAAC4333BC176230A
+                               A67A081EA89728380B00F5173E866B89
+            stream[256..319] = B47E8222962EDF8B3CF7E4DF469C81F0
+                               40431EE27D2CCC1C5D2B048C6E986681
+                               9656F8E23714A227341795A9B881A776
+                               9434923C01D25B4B2D60D0EA89580F82
+            stream[448..511] = 89E48ABDB1A7F5BF17EC7304A951B1E5
+                               D152EA7EE181DD9866ABD782C7FCF238
+                               66871D0B1EA30527CC178D0FBB0E6D8A
+                               C5CDAFB27F01B7B6AA68413B3E7DCA6D
+                  xor-digest = DFB99C93E6B26D2F079414A370EFCA10
+                               5468E93AB8983DE0AAA1AEE3F8FCD068
+                               3C20753931A9B13F48F10C9F71F99638
+                               1AACA39469AD3EC6BC8B2ACB1DB9ECC9
+
+Set 2, vector# 54:
+                         key = 36363636363636363636363636363636
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 6EC768666ADE02892FF522A9422F5B3D
+                               D802727755D64C602C5BE156DCCC690D
+                               D0237CF95B191BD29BEE5E030E1EB4B2
+                               CA981BED69F2F4FEBA39C9658450D21A
+            stream[192..255] = D62AED496AD8BC9EAE570843460EFF9F
+                               8CAA155E3B1619341D43D416A89C85EF
+                               2186E398467C6763C6B38AE8AC642391
+                               39FC7D77C5DE1BF0304237527ECEF79E
+            stream[256..319] = FD2A2505BC2484CD26A953A460D43EB3
+                               500DB0572509C1409AFB25DAF7A08E96
+                               8C45901DD9943AC3558FE2D956045AFA
+                               EC7FE93AFA7AC461E348A6FF67DFD8B9
+            stream[448..511] = 1A9AAF97AD789E4003BF48E9B723EBCE
+                               F2DB13513398FF8161D929F64C5603BE
+                               2D0B89D1B94E2C4A91468EF743C2A745
+                               98093DC6EB5069213A1423FBD5526B80
+                  xor-digest = 93DD39B5F82C8B105C9A1D3CA17AEB09
+                               21E77AF3235E3DC1F626D690D9306698
+                               60DB7382B38C6F3EE0F250DBB67E8001
+                               078938ACC2DCDFE3DC5E2F33FB4EEE51
+
+Set 2, vector# 63:
+                         key = 3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 6D05510EF24AC345594E94F58E6F5024
+                               1B40AA1CD6A62F35BC303CACBB263253
+                               CDDF54462EC606D6969E4CC5FB719A7C
+                               107DB872A5119566BF72FE37363E60E8
+            stream[192..255] = A1626164C36C6AB010B9A2B944ED8839
+                               13A3B9522F66429A75F5E30A03961871
+                               26AF86AEF382E3944B0414B274859B4A
+                               93881386E6A3E780802B0E6894739442
+            stream[256..319] = CBC22EEB532BE4B8B80D7F10A00FFFC6
+                               22A02B7426DBF648AF398444B8F8D2FD
+                               E4265F1B50CB43B003DDB0256D9E0A10
+                               99BCDBDE162E8AA37B107B316B9673C3
+            stream[448..511] = A7F2D829EF3BEADAE6D84CA26C81E618
+                               6F70F3D9DA4E208754EFAA5A0441D87C
+                               7AE36AF993E7225A9C68764C87B5DA4C
+                               C08B54A245A296EBF399B91331A6F286
+                  xor-digest = 55A30CB34036E3A22AAE25981272C8F3
+                               6392347B5FCE8101A66023C5B324867B
+                               783EA103A714E749F14375CE64985A0B
+                               8ACECA137560D12E941228D04A968513
+
+Set 2, vector# 72:
+                         key = 48484848484848484848484848484848
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 89C61A1182BC868BEDA3FE4A76CD679D
+                               A3DF3A656AAD3AF83BB55C0F0455AFCA
+                               1B3FBAD0B91F7B1F209E5F74FDBD700D
+                               9417BF9B4A22BD3B7C94317C20ACCFE6
+            stream[192..255] = 1C312223B46A20BAB52F110E04AB324A
+                               068E6DBDB1EABEA92CDC5063E38B7EB9
+                               A7DB50FC4CC626761CC00B7D821EB0E2
+                               D40F7C8DD10F5A975A14689151B38B77
+            stream[256..319] = B38D45E3CEC551950D662FAE4241E3BC
+                               5FC8FFA67A472B1048F45D594EA0715A
+                               5B1DE277264D72251A3C5024C914A0A8
+                               14747D714F8CC583105013382518A0F5
+            stream[448..511] = 42D47BDA13625C17FC6E972E68F3AA7C
+                               F8F9F12B900AB9E474C0295B48879DCC
+                               0832FD53C3C90B641454AB4BA90DD7D4
+                               1748F4AACC9AB1E1CDA8007B3B18B1F1
+                  xor-digest = 131A1E29ACA16C3A409ED6E201559CF3
+                               3CD05312376DBF6796D39E2877D23255
+                               F3308D3419CBEA800F1F2E9DF7AA36CD
+                               03AC3D6BD228A165A885824941D764C6
+
+Set 2, vector# 81:
+                         key = 51515151515151515151515151515151
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 70977581BC650C5D03F1B3A02672C384
+                               250692C2AC94EA0F4A43723E88FE587C
+                               00B5319F87223F6817C36F21FB852995
+                               5CCCAE243D65792A55D6F047DDE1999E
+            stream[192..255] = C00B41DD0BE80054F46ECE559526ED5F
+                               A87E7196A3A20698F5048183F91ABACC
+                               9E50AB64D437F05375CE78D75469EB7D
+                               478810E1C792CE3BA0C253FB1E549A0C
+            stream[256..319] = C95C6CE222392307CABC95202CE59EEB
+                               160A25C482F4608616C80B50A9D0B771
+                               732262DA67BE8319486F73E4B1FE3DBD
+                               1B7C97516F0ED02F1F4ABE9141329925
+            stream[448..511] = 93984394395B47A34FBEDD96E50A1F67
+                               7DCFB1845CFAFEB7DD83A9A7BFA35C7E
+                               48E44C38F9D33B3CFBB763A79048F6F7
+                               B6F32386329AC979F7EDF8828734A116
+                  xor-digest = DF2A33DFE7C90E76DB4E4F2D9AE2AB69
+                               EA16664B5E0031D800913B6572E1E2C9
+                               AD4A31D6BB088AA082195F8B4DA56605
+                               D32A19916474C042F755AB11EE56F6E1
+
+Set 2, vector# 90:
+                         key = 5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A266B810953284ECAD69E960C9AC8FC7
+                               0B94798E55BF7D2EF54EE50319574C28
+                               7DF798958FD653B5E5BBAC0519D3F40C
+                               4372DB7204A3FFF89F6E70BE245C30B4
+            stream[192..255] = 72979FA8747EC91B68EECED4820CE7F3
+                               8EF0F20240D8E04C5004D10880BBE17F
+                               673A427D0FD62E8331BA633890D062CD
+                               FE584ECEB2884AB4086E3AD04F9C1137
+            stream[256..319] = 77E9FD26E216E6F22D32AA89E4D02C33
+                               482570BE05C0E1FAD59DCDC5A3F1315D
+                               B2FE99C4863DE4512EDBBF45DDF51CB2
+                               EF472481D6BB7EF8C7AA09E45B03F45F
+            stream[448..511] = 0386E999B6EDB2E52F86B3792A8BD15A
+                               FBC40B44D6EAFAA0D562C6FB2BD16BAA
+                               3F77F968925DA020D36A109A67ECEFA1
+                               CC278F022B93169006D79C0F56351DEC
+                  xor-digest = 35BCB2796B3AD76E59C2BDA7EBD7B47D
+                               C99236FAF5F2186188114C1A958185C6
+                               48BA837A3B839CCCF55FBA67B21DB031
+                               D7BAB7AF52A98676CFE3EE4249A530DA
+
+Set 2, vector# 99:
+                         key = 63636363636363636363636363636363
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 14F782FCF5C88052A93AEF40492669AF
+                               7C92F72147C2AB2C18217144055C9868
+                               3E2FBB80775B54D119A9A06AE72EEFAB
+                               999E85F3AE12804FABCAE539A8585492
+            stream[192..255] = 663FFAE38877EF1898973355FA27E9E7
+                               0BC0034A88C1ABBD2847C46335C18113
+                               47F42E18C1295D07D5F75909F0B1C0AB
+                               45EEBED3356A930E018E262655074944
+            stream[256..319] = 6ECB3BB43DC1C4A3FFE0EAECE58B07B7
+                               1CB5C7763DF420859853C7973778F63B
+                               10EB1B854BB8CF1DA0D5DCE6EA0D5816
+                               BA0508E7A1694ABDE04A706A008252D8
+            stream[448..511] = A68ECAAD1CF25C78522FB75D08C8CFEE
+                               561C2CAA9E0D44EEDB121228F4809F50
+                               996B9DB89E2E2F8547578F83015C55F4
+                               ABE82F371A5E02CC97FC35FE7DA49AD3
+                  xor-digest = 83F0BDBDF9A82287A650BC70A0C8F38D
+                               92868DF38D150E4268526A0A51D3A9A6
+                               FDA27D6FDE8A1A55E856DC891B35ECA9
+                               1D583E0470419BAB5C0B9ED4886342B4
+
+Set 2, vector#108:
+                         key = 6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 359B9D751379BECE129238C22647B90F
+                               A849534C9395EDFA5F2121963D2F0B68
+                               D9C6469AC8A192FACBA7C27762B22D8E
+                               39171D3D01D6BB41CC4F2AC318407D65
+            stream[192..255] = BB4795A89BA6AC0869B2BBA5891FC1E6
+                               890F13DCDE5CBBCB22A85014E554BF10
+                               DCB0873D79A79438F39DB467E23EE1E6
+                               2D2A549DC86B89FA3DF53BA5E5195718
+            stream[256..319] = 7AD5CF48C01B51572FFE4E0D23FF158E
+                               46941F1B1BB5D7DED2BFE80BCC48A6CF
+                               3DBB186AD1D3F911ACD8426B2A1219A3
+                               032104E3EE70717FA7D547014FD334AC
+            stream[448..511] = 6320933C389A66B5BD72DD69BA492432
+                               01861F3524C529DC2869127BA41DEEEC
+                               FCA5D5BA7521DED5166E70FCEC72A564
+                               545FE45F29A2DA9DCCD5AB80DFD119D1
+                  xor-digest = 9E1E8A8A4FE661C660DA51134D1C8A65
+                               3824DC5A99715E88F17245436F07E283
+                               E481D9B0A314B2DC9821930C80F8A184
+                               2F33F4219525F3DD063CB9C32D9AAC60
+
+Set 2, vector#117:
+                         key = 75757575757575757575757575757575
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CD479075E614524CA0B4A73BA48632FB
+                               01C8E9DA532912094D14606F08B81C0A
+                               CD7556942CC4FE4900C4419E8F618AED
+                               B53261B5B97603DC21F5FC8D57887F0E
+            stream[192..255] = E69AFA41D5DCC57CEE46FFF86551AE30
+                               D7A4B7CD2082BA8B9F446BA1A8E01B55
+                               D924E0D788A01D7C75B819D8B88C4074
+                               E97E1781061DDB3AF084A45E5A2D67D7
+            stream[256..319] = 27F75AB01FE45DBF6E661D39159A8727
+                               15AB7D7CB1275A11AA3C8CD55708A67A
+                               DCBE98FD8E1DF1F787F099881C87A3C2
+                               A0135088B99B21631AD115A8247BD280
+            stream[448..511] = A75C019250930742A65637B2E60A43E4
+                               1891CE1252082CA86891A684C19304EB
+                               7D57EAA4F8DF4686D05E886C5496C37F
+                               C224455AAE45F071FA654FC88CCBE17D
+                  xor-digest = F5C14A26F22546515005E433E1F825E3
+                               6395F5B59566C11C79F0435389DD7745
+                               793F8C925E68A9836B6E7B03C0639FCC
+                               CCBB3C1758E28E9DBAB1D9F733AEE7DD
+
+Set 2, vector#126:
+                         key = 7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 1AFC41EB0B3A1AE62127B62AE3B7219F
+                               C34C0A9D904D21F071424A7D07A55E4A
+                               69AB9FB401909372445844A367C2ED44
+                               69C12FFED293DE61619AF98FC5F159AC
+            stream[192..255] = 48080F88453788279BEAAD61B24BA5EE
+                               28F0044B5AAEBA5DD6844E2F57A0F3A7
+                               AF19BE8E7F6DF5BA7D74DEEF01CD5B09
+                               C928410B02532F66C19A3E677B04AFEB
+            stream[256..319] = 5D493BE7C17B1D6075F0CFF7C738CDAE
+                               8B5BB6126A1FDD8ED2FAD3A1502BBA0E
+                               CAD26485BD94EC5FA852AC74FBABB070
+                               FBC0604F69C11F5725F644FD14E5D001
+            stream[448..511] = 7D3D74044FEC8DF49C8A505CF1E5413F
+                               A63F53ED43F4B90DB3CAB6EC08E65821
+                               F1384E84490C6E5631B021145565D234
+                               67010AD6C9A5C729C774BFCAE2D43DC0
+                  xor-digest = E2B8D71D68ABBFA49D04DFC8A3DFC390
+                               FAFFCED207BCEB9EC4B6C435A9757AF4
+                               ADAF3E0734268365C82DE978634696B8
+                               D61EF69FAF3EF62CFCE89672F1CA7497
+
+Set 2, vector#135:
+                         key = 87878787878787878787878787878787
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DFD7B8D57A6AE51A401FA8DF38395B37
+                               17507AF28A9A771149C034F3361E0203
+                               ECE88C484F44DEB8370D9E77994EBE6B
+                               E05CA8E05E3DCF545EFBA53859C2FBF3
+            stream[192..255] = 42996981385309DC8884D65CF2103D64
+                               F76567EC51266A6DE5BEBC362529B782
+                               C95D92A17CF4567454422BC72D20BA56
+                               9DBCCA81DCD694B2B3DD88A988004875
+            stream[256..319] = 43C31B1EEAA67D7506A6CAE07CF9EB0C
+                               838C72494C14012F58B80D0F4D159379
+                               68C860E32A029B3B0CA040AAEE262CE2
+                               9C50046E1CE83FF36120D3CE81EA3BB6
+            stream[448..511] = BA8D089901F2F5C83E1CD485BC178F12
+                               88D1B700A7EE749DDA9A96910529EB5F
+                               057BC8FCBCD0D542FC3781E0FA742C3E
+                               C616578C8ED918E8F104EDC142BC7B7B
+                  xor-digest = C9D6AB2D64CC7BDB01F89F08047749AC
+                               38856667B53C87F8B501CBB5F18DDB84
+                               820D409D5A44FBEF505213981D86241D
+                               279C6749D1D0B756BAE39390D754AB21
+
+Set 2, vector#144:
+                         key = 90909090909090909090909090909090
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C60205FE3662A0905EA10CE1D17527A2
+                               7565D227C895A8C9426069A9F0F48894
+                               A96AB80039477BD604762F5F2CB2903C
+                               7642EA714B27B365DFBFAF60A6E249BD
+            stream[192..255] = 88DC912DB28D5A2700EB74CE8011A307
+                               E2A0B8FA2E9B50E38899B4AF1A0F3BA1
+                               79CF4DFE87DA0BCC1E76D9A56DB789FB
+                               18E439849D6B8B6850D0CF8A17726FEF
+            stream[256..319] = 2247A96C32B9BDC5DB41E7670DEC0A51
+                               73EFD83F345DE71CE0A2192354395576
+                               4101D73BCB2051C08DA70CA5100C7194
+                               D22A6C3DADF313369CAF8E545E97E25A
+            stream[448..511] = 83089E1CCDEF294EDAC0006D6CF49475
+                               E93324D10A6EA635B2C19D285B58226F
+                               AE271B6166A5818C6C567CDDE508B9C5
+                               264C2A6D5A8A4C7D6754CD11A58A6588
+                  xor-digest = 2B89AACFAAFFFCC15076A79EA8D983CF
+                               FA2CBE2BBAB4BC70464E9801B585FA23
+                               618864E62E573F51F1119D32E509A507
+                               458DB29422896E0A29E44D2A96FC0B64
+
+Set 2, vector#153:
+                         key = 99999999999999999999999999999999
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A6A3260212BC1A9FCD7336F1DEA05D75
+                               A48B1B1662F61B1CF1589A91AA66EB82
+                               25F58E77BFE7DB10AC31F318ABBDA7B2
+                               FBA88A57CA8AAFB83A3ACD0D78AE9944
+            stream[192..255] = C960FEA579A48D263C514DC4D7173B8C
+                               A325A16B02C87086EFC38F3271087B48
+                               BC51FC4B8FE936BB87336D54D35E8B60
+                               F8300334D0A78B48D2E97751CA571ADC
+            stream[256..319] = DB1859630B7E5D59366E95EE9F680F48
+                               1EEB9B880A3E82C85046552A844E5784
+                               3D4BBBC50923E806A1E2B03499C4F869
+                               9035913D5993757A5CE2A94311A22C17
+            stream[448..511] = 792B3AFBA5A9EC89C8119FB8F1CD552D
+                               6ADFCD61B70481760EB52878CB907367
+                               B2A5082FD963F56ACCD0F5FE6B67ED48
+                               EE81ACCBF066DD4178D39E001A6A2027
+                  xor-digest = 45E67FC4B7FCCEE700CDDE0404160E21
+                               DBFA6280DCFDAD3865FEC930EFF1B3FD
+                               799161C8812EB27F6A24985298994FD6
+                               5605325D0979CD798F0ECE18886C6E8B
+
+Set 2, vector#162:
+                         key = A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 94DF00B66C81CEF99E47BCB9AA6B2E48
+                               CCB408E20D878C56A9328D2422F1436B
+                               CCB7C8B04F8AA12BCF1DEE965EF098F3
+                               F78540213E755C86FA33B6117BE9E81F
+            stream[192..255] = DB745EADFB31EAE7A699A84FCD41EF80
+                               DCDC25334225F7B3E5D49FF58503C60A
+                               2FD73212719EA17F61F60271C9347E19
+                               3A894816DBD39A313AEA33F56311309F
+            stream[256..319] = 75410B6F256D7E9D2C4DEA9F24766E0D
+                               1FC3EBC67A5EEC72BD45140C41C3ACF7
+                               C517E9D8BE1B0AA06668012FB1C388F8
+                               098FA03173EC61CCF0252F793E42B4F5
+            stream[448..511] = E41DEDE3241806F3ACE001D8ABA5C290
+                               8C8D3DCC7E33A4031571D6F5BCAEBDBD
+                               0DA77831AFE34A4300B5677EC615FC18
+                               00A2CA80FEC9CB40AA33DAA1D20D80F6
+                  xor-digest = 8A80F6234BB7430D1EA7C6A6998D03C7
+                               CBBEBEA27F9C329012E19B0B62BC5077
+                               CB64AF18099DFB4113C6430B842BF529
+                               0DDE3BC0DF45CF836D766D03B6CDD43E
+
+Set 2, vector#171:
+                         key = ABABABABABABABABABABABABABABABAB
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 77BAAA833D320DD2E8C8D36D4C1025BA
+                               07DB396F663C2E50CBC43E640EF93977
+                               97ABF342CF471B758DC6A1472C817068
+                               BC7E30B49004DED1F763DE141C33A0BE
+            stream[192..255] = 018E53C65112E8C3CD374B892B21C1EA
+                               80408F1A21AF4EF02AC7CA5A6A55D130
+                               0B947E0A93D8980BC2070B082EFC3125
+                               E37F2A7D1A5BF0A8C8D154B84D6FC933
+            stream[256..319] = 0EA8A2C53BCFCD5350B3CC2CA07C0041
+                               53B4AEC461D18419071470D8F4BC7404
+                               F34FB030DCBC4E01B98DEEFEDAC031A9
+                               41C395538E95867A13EAC71EBCDADBDB
+            stream[448..511] = 1832583CC5A02147E6CB3FC2E5157A83
+                               3BD5513D14333DE552B5E1517527E4BA
+                               7069DE68F47D7A28CD2DD2808DF110AE
+                               1F53353B654E4ADD055032D8323FE829
+                  xor-digest = 14C12CE94857C60659ACC9DB6FFA02AF
+                               11840A7E2859DB05FA6436D7B3E9779F
+                               D21CA43BBDB9F721B5164485FEBE4034
+                               7CA303DF12630D6E967C0DFD7653ABFE
+
+Set 2, vector#180:
+                         key = B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 1C1BA750879B3BC214CB843962A0006F
+                               54E3B0F682FBDD7AECC21EDC208994F7
+                               E738B69FDDE5E90964CCE34D7351188B
+                               B3D788F435747FAA13EE208030893252
+            stream[192..255] = F358238286724199C183D8C960D730C7
+                               2058248249104960DD2899886625C5AB
+                               4844D768FB2594F2CCB751280478364D
+                               C78E631B5ED11343A104338AB8E28958
+            stream[256..319] = 0AF1A0C7A000092FB1CDA9CE6D145DDF
+                               C37D1078C00008392BE73C2F34DC05B9
+                               9FC4954071AAB16AEBA5A0D8498D411B
+                               5C1DAE961DC2A74B8FC992DAEFBAD292
+            stream[448..511] = CF358444795D941D450F2A6F86811CBC
+                               2492263D5964C4A45A26AEE228739BDE
+                               3BC223FE507EB5B9AC6983E213F529D7
+                               86473A4DB0764DCA5A27AB7B011A5393
+                  xor-digest = 78714C06C8C4C206EC238D4E679D96CE
+                               4C258C46C1EAB4E23D2E55A0061CD767
+                               9AFC8C85AB4862D39768DFFB3A0FC583
+                               0BD203F66B03BE4FD491E1FE0DD83FFD
+
+Set 2, vector#189:
+                         key = BDBDBDBDBDBDBDBDBDBDBDBDBDBDBDBD
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = AA10D434183C285709EC2706371DCE5D
+                               5F8C6FF0CA2B01281550AFE875413B25
+                               14D34846E658F9F11BED0F93A427FD96
+                               8C62380A46FE8E3F7E023318E989BF31
+            stream[192..255] = 2AB885D3EA66AEDC476DC5C59C3D4888
+                               2D39907B51878917B7DCF351CDD30963
+                               6AD8614DA701B89EC9B141696F77E815
+                               F95B15AD77B96513E5ED6C7F10EDE616
+            stream[256..319] = 39270D1BAC8A3028E55097217ABAA158
+                               1C0B8874A21E42533720F0F4350CAA8F
+                               1940A83B17D328BF0FD50BF8E62EDBD9
+                               5DF959FA4CEE952B6098D48277968AB0
+            stream[448..511] = 21DD7B64EBEF256536E95403EE0CCD20
+                               B062193EBCD72EDDCB1B0DE9308D048C
+                               B3F3C653DD93D01F3B266252B11F32A1
+                               59AFE3B00369FDA024DBF392921FD1CE
+                  xor-digest = 1A748746F13675F5125F0151D0AD6349
+                               7D23517B99000CB5479645F19889E407
+                               FC770983F7537AF86564F5B323E0DFCB
+                               FAEAA53AF258F151C871C83B5BEB7AE7
+
+Set 2, vector#198:
+                         key = C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = D4CE9B9AB39183E530A347FE5B435895
+                               4899F18A43A1AD9F249522F7B8243359
+                               EB61ACCC30BB40203D3B5730736D38BE
+                               057C15D6A2DCCD005395C16CEF85FADC
+            stream[192..255] = 459CA305A8F73AA0931A56D914A51CCB
+                               3C6B22C1C35392464BD2BCDA1FB37050
+                               E2181510546024C753222E678A7CCDB0
+                               77DC88DD7C947210897021A72E437DBD
+            stream[256..319] = 8537F62AC5AD1CDC7C6C910D45111165
+                               5219E461238002391B54E7A8BD6BF323
+                               1E2CE93AA581D9A8E755B33A382FE56E
+                               9FAC3D9F3370226EFB99701B4D0668B1
+            stream[448..511] = 192691D070C8E3966467F1DAD89D5D8A
+                               E345230E9828C9BECF681DC7AC0B7AE9
+                               88656C7333BE93F103D7EE505F05C5C1
+                               FD8CEA2D27407EE265CD59F6BB5ED7F8
+                  xor-digest = 41A75368279FA64F63FC895FDC49DF18
+                               1EB48E780AAE9C2F548C825BBB276803
+                               A4479CBFF22E79E35701B24B47B45777
+                               26B5455C804E802B62704655B77D20F9
+
+Set 2, vector#207:
+                         key = CFCFCFCFCFCFCFCFCFCFCFCFCFCFCFCF
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 430EEE25DFCA972E12DF2FA3FD1F9A61
+                               CA16B3EA67C5131D701360C9BBF2ABCB
+                               F2431D01590B300CF462A68FEC3C6E9F
+                               1F6A5BBB416EE0A098D2995711C9772C
+            stream[192..255] = 97D49334BC2482B1BEF901BA4A91738C
+                               F6DD9F917862984616DA7C2FA3F9BEE5
+                               1329AAADFD5B88A224C7B4EECF1BDAD2
+                               EE33E2C7060C1EE0E8A4E21D78D08942
+            stream[256..319] = 79C06E2806BB38FE558E926E4A2C11DA
+                               903DC06D384D033984D2F7516ECB2657
+                               4D5B5629B79C8D38E71F9A01B9526EB1
+                               7E3FDB48B37B6338BCCBC914B7804935
+            stream[448..511] = DA2A78E621FE1D105DBD0F7CD45AFD51
+                               366533D03C446005EF100DFCD9789C5A
+                               06A00A7379A4D45AAEC1CC337F61C532
+                               DE26B1D028E72C399097A04FD7FF087C
+                  xor-digest = F3833AF5AD9FF9AC9B227B1C9D0EF385
+                               0B22FF5A0F307EB25654BFB63C61E802
+                               2134A69091E5C5DC1E04C56BA2009B97
+                               DC9D02339578603D8EE4F50D1320247D
+
+Set 2, vector#216:
+                         key = D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 7960EC96803829CE052CCF5B8205D09E
+                               A417C075068FE91982283DA19533A61B
+                               EAB72F7CC93AEB22AF97AA3B4A5B337D
+                               36C96BCBB23A073F57F2F378B7309758
+            stream[192..255] = CABCE57DB1AFA7127A13498FE1FF87BF
+                               DF1C40DC7F8D69D46EF62996C2AADE35
+                               526377F4A09FB10B4260EF7B5E700470
+                               1729CD1F0732748CDAFFC14AB6910617
+            stream[256..319] = 01898230BE3F6E682480C8333700A2C5
+                               1FD38AD27EBBF60CF2DF71B22C827708
+                               3A1476E7FCF3348FD5E4E9EEE6CE61EB
+                               818DED1BA0C09FB96C5B7C799C1656F7
+            stream[448..511] = E49D27417583CC79299ECD18751AA540
+                               C7831C3A0252292EEA8242590714DFF9
+                               4833393BCC56403144E68A6BB08AAF35
+                               2F71C6AEA9256EB5AB5250DED6366AA8
+                  xor-digest = E6D998D7F3BF7EEBE45844EFD7EEA371
+                               4405D07D6EBF2D5F7F5435E4F557AB4F
+                               7571015CEBDC2CE0A199D7FF8B0DCAB2
+                               B9BACAEABE852E667EFD2E82A219FFC3
+
+Set 2, vector#225:
+                         key = E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E9AB7EE17B4734823A1522F5D78EBFC7
+                               2F8112F67325BC5C12778C6F8302ED9F
+                               BB545EF47EBF2B12380935AD8048B90D
+                               4B7DBC7759E27C205C94202EB64F8E0A
+            stream[192..255] = 5B775277917681D67800B3249E7A82EF
+                               C5500F49E7507CFA0696D94FFB021CF4
+                               EC6955663CC37F9B2FF7A0345A71FEFF
+                               3712836C66A05C3C6FB9A03EC3D52260
+            stream[256..319] = 11ECB0057615CC8244B2251E87449CCF
+                               0CE7805F669C762F46EF54E8E992737A
+                               BC668204D49ADA49E51E592B79B34BEE
+                               248CE41C72E8A60366C9951B74986FA2
+            stream[448..511] = 3BD82780875577B7ED9C603A240F1944
+                               5C3090E36926793F769B11E3C6C8C993
+                               697E2A0C1793AC4F39DEC882DACE3375
+                               D17B72FE40B82FB95575F9B7A17B24A0
+                  xor-digest = 996E394453A2CDE7CF809216337D1ECA
+                               FF5FFA7414AAACEFFFFFD30CCDA5E424
+                               2223AD119B3EA56D50248E7E7C0BE002
+                               9640304D08A2B3D44386CEA0098D6738
+
+Set 2, vector#234:
+                         key = EAEAEAEAEAEAEAEAEAEAEAEAEAEAEAEA
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 79D2D1270B77A586ED9C3897C2875842
+                               16498EA183465A96FA1D783BF1B1B070
+                               B46091CC3879E9ABF97ED22A72FBFF2F
+                               F8C72DF9A3832C927FFDE6FD43D6C1BB
+            stream[192..255] = 4CB1C6953204F5F279F9F334AE8BE696
+                               26201C8EBD488E6204DCC9823E022A15
+                               23DADDA98E6A1A19BD42B37047A2906D
+                               19EF12702530DF4B7E597367B4463DA3
+            stream[256..319] = 51500A31B349274BBF9A6E324773E5A4
+                               2E91DA8482D306C7F13EE3E1975F7BC0
+                               D9006964367F4D8B28B389652455951C
+                               402AB51A4ABD06262E0E3A7A8FA3A7AE
+            stream[448..511] = 01F28C4729556AE8227B306930175707
+                               C75BF589B3711AACAD836615D666A66D
+                               255B40302E0DD5021EC4A15BCCAACA95
+                               565BF3FB68BCF02D265F911ACDF6BA0E
+                  xor-digest = 3B5FF103A75AFD640DEA7B686359CBBB
+                               A888AB60348CE2FDF301267E415129BE
+                               46D088D9222139E96DA8D804DA3691FC
+                               C546981BF65265FE04366053229BD030
+
+Set 2, vector#243:
+                         key = F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = D8AA78A091BFB8D90FCA94705DD86B4D
+                               FBB2673A5ACCBDC4F69A21C3B06A0594
+                               F470F70DCCA273A2A72C167659B7E0A2
+                               76CC3BCC20AB889E682D4E2B70BEC4A9
+            stream[192..255] = FD6974FE135C1E11DDC82F2DCF5CBB27
+                               AF0A8A55084407C3315B47FA41D2C240
+                               372C7C4B03F8F90C3201B2269D18CFF4
+                               C70A13722F46FFC34727779CEDD17FA8
+            stream[256..319] = 6433E61D5773ECF30ECF8DA06F8F11BB
+                               717B268E2C283FDC7B2F7841040EEEF8
+                               29216193392BA5D99405A744FB571B6A
+                               71A6EA188B3BF5CDF9D601ABE3312FA6
+            stream[448..511] = B238D39267ED812D37AC81E6D2B29D21
+                               45F9337A6E2CB426C8B43BC795832FA7
+                               8D94B5E1E83C19D40D3C2B4B670F3C1A
+                               D504DA82D6E83A71BC5E431152B485EC
+                  xor-digest = DE1C9B7BAE92989BCDC7AD0D527CC6D9
+                               4F138C8C2A1A06C1AE28405C867191CF
+                               444F45770CC216226ACB13D2A0A2B8DF
+                               FD81B93AAB20EE7C19E631D9635AD0B9
+
+Set 2, vector#252:
+                         key = FCFCFCFCFCFCFCFCFCFCFCFCFCFCFCFC
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F61BEE71B1353E8E198E9300CC720C88
+                               977F23274ABF7F9DEF298B97EF43FFA5
+                               CDFEB51DAC7224EE6DE64CE0966B358C
+                               9786762BE880BF00BD48FB1D3D1FCB99
+            stream[192..255] = 019B52D05CEC5CFC74F2D26ADA3D2F18
+                               B4B44D3EC9359A132AE18B33510C249E
+                               D56D0AA2BE16C6213BE2ED47514B70A4
+                               DD5FB07C317757F5981009F70EEDCF39
+            stream[256..319] = 4221E9421F2C68EC8B59660512EA0442
+                               64FF35D22DEC65E1ED18E3D8BA359A78
+                               92FB5566DA0DA25CD5A3409EF6A6F020
+                               59DD632A793886C0032864F16D827A36
+            stream[448..511] = 71330EEACEE6E27994023E212D1B8A42
+                               045C29F141E4C696F74A0E7500B45E82
+                               A0ED1F4DF8C78A93D8D6033B780BC22A
+                               F4D8029B82AB447E0D5EEE3405EB0D22
+                  xor-digest = AB84F0A0D9D1E8D810E76517E5A0B80D
+                               0B2832EE12AEC48B5DA48B78DC4D2278
+                               710DF7664ADD91B1FAF3F14F3951344F
+                               08515E7D43F8EB677B5CF18C487A697F
+
+Test vectors -- set 3
+=====================
+
+Set 3, vector#  0:
+                         key = 000102030405060708090A0B0C0D0E0F
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CCF2DFC47B94B1C67DA07BE50ECBEBE5
+                               9F470BFA68058E55529EC8041EAA2107
+                               A15DBCFF20B1E54B36ADEDB49356FE2D
+                               4BA86FA2C6FE08DD1E260D7D20A3D93C
+            stream[192..255] = E5EE7048E8EC8C7904138C6E355D3956
+                               1D8A1B824D62DD5267918237E9225416
+                               2A192BD543327B9D786F973479F88DDF
+                               152974B2FCD44DF9B77E1E9D8595F29E
+            stream[256..319] = ABEDDC8F46C83EF0B3D159B3A1BC6E1A
+                               4535744E20D82A2013A3013F864D4B43
+                               01C54F2BB0F03C775738875C1116642F
+                               4E6BC1D551145D40A8F978207F44BF89
+            stream[448..511] = 804C09F0973A24FAD6B4E7398C57B11D
+                               E670AB2AEAA63822D70C7109E2E1CA58
+                               42E2251424C23525980A7E7132BA889C
+                               C2604FCD9F443A1A194646730FE349E7
+                  xor-digest = ADBA33559432364C670A33CBBDA0C0D6
+                               D75C6C986D073C473C96286F5058ECB9
+                               5B78052C26C5BCDD6138334201B05458
+                               135B363B8ADA8CDB3AE0C565C9235646
+
+Set 3, vector#  9:
+                         key = 090A0B0C0D0E0F101112131415161718
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 759D5A8381CB183CB0A01B4A85FBD793
+                               EC9580339CECC9BDF7DC52F67D8D635F
+                               1F590575EFB26F906424962D99880E45
+                               AF25D68181C9652EFA590E8B1E0FA578
+            stream[192..255] = 3FA014E6416459F15B5527380E5B513A
+                               CC38193B9A26CC24C59CD6866EFE8010
+                               30C950DC2D55B70495D4C11296D9609D
+                               670E41CCC20EA01349E28A2651318A1E
+            stream[256..319] = 675B1A11D7F20A18C137EEEB2D3593F1
+                               7D1A284A076E4E18BF8B622738962236
+                               C3F07D4AB453EB4FF0E3A0BD89E21AE5
+                               CD17432F149B386CD29011D6864B3B83
+            stream[448..511] = C2C4385B74B6A38A18590A5A596DBDA7
+                               294C4DE7B15EE36F4481E275AE2C11A8
+                               17181DA10309BE5B366852035C227BBB
+                               C61F001560F03F2B361B5B8E0FADE6F9
+                  xor-digest = 26A33A713972455A92FF0E6D65C7A7C8
+                               537BD0D9F8EEC96E03C3B39C5F9307FE
+                               F8956D1EC10BEAF467BA86A26E846ECE
+                               F4F330FBD9D6DAF5306DE538F0F76C0E
+
+Set 3, vector# 18:
+                         key = 12131415161718191A1B1C1D1E1F2021
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 27D21507A4F5E2C39050B1D752574ECD
+                               5BDC31D6E8708D1AD950E3E48C53A059
+                               9FE6F7B5CD7A6AB95AB9C3FE0EF154E9
+                               68882B10A2613A283C9310579F444F19
+            stream[192..255] = CFD6E486D72760DD5FD1D246C5C150BD
+                               622052B7F1938C3EA510F3D0EE47B494
+                               FE8854A833EBB2C7E579EE3925B19AE9
+                               EED77434CF7B7AA00833904A78AED517
+            stream[256..319] = C6FDE37C40A1FF7B4EA3A8DD64E7A1D0
+                               7C4F25C04CE05A3C09F6EE012B458A9F
+                               93FF21C9EDE67FF06918CA541DD24C87
+                               19931323F1C87EBC38F56308A2F5E076
+            stream[448..511] = 1E9D3E112C8CCCE11ABA19E941E48173
+                               EAC5840A3025A88EE79DF2514EDCFBD1
+                               3A581C507EA3769FC0498EFC7447C0D8
+                               9135E602E06512D25EC773A20C4D1F2B
+                  xor-digest = 122C8ABB06E644953AE81EF78CF4EF6C
+                               A1322AF81186B8C27EB199B5EA7814EF
+                               E6F0C6EF98781CC12FF7A988F135F3C3
+                               28BB53B6D2612B1786D4B24D63BCAD01
+
+Set 3, vector# 27:
+                         key = 1B1C1D1E1F202122232425262728292A
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B98764C4BEE54B7CE1722955D29F7265
+                               74D3B6D2A7F51847A8A5F2BD78218DD4
+                               13BAE5A9B76EB7C2140E6D728D430CE3
+                               EE77FA5446B53D887A600B8C2A954DFC
+            stream[192..255] = CA3AD141894C09B6DF333C6C42729339
+                               45AA6F7F13EA64C1E3043F2AB64FA18B
+                               A3CF16B35E853FC98A67DEB1A9A60B1F
+                               EFF93767C87E583C8B50BA0B80B69AEF
+            stream[256..319] = 0D03AEE4BC0E4260B48C43614AE1327B
+                               4FAA2F0813F188DA28C3CF15C433EE59
+                               881DD500A53768C5A1231991386E1470
+                               2295243CF3E18638B60CCC4513C83077
+            stream[448..511] = 4E190889B78B6CECDDCC675FCD336592
+                               8D01D945C8B9737CEDC144005A7E2E6C
+                               921256F89098BB560D39BEAF700CA5DA
+                               4F4535ACCE3439D9223E357DAD2983A5
+                  xor-digest = 2261129A59B37D3C9FA15E35B9DA02E8
+                               B6044084F0EEDA1A62641BD8BEAE9293
+                               A57E89120CEF2CBE5594C47F96E46C5A
+                               E6FADA330126A4EDE047E40153D5A182
+
+Set 3, vector# 36:
+                         key = 2425262728292A2B2C2D2E2F30313233
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F8088D4E53936A40E21B3AAC1E6D975F
+                               13BCA7E4D6CF7D926F6B9AAC562790D8
+                               E2B66C05A075737B75F8E171C70E1507
+                               94437B818F59052FE5ED87BBADFAD509
+            stream[192..255] = 19686CA73474C6F626390DA198824970
+                               9FE43AD003953D102437DFE11DFDBC64
+                               432929F934A0758B2964EC3B7CFB8C1A
+                               BE23C6B12132B155D3922719DF28ACC6
+            stream[256..319] = 55EA041FDC9CD8438EB7B9C2C5381785
+                               57E53ACC75CA512B88D8531E07DF4C15
+                               35F60851AC242CD46F56DD35241D51AC
+                               6DA52A3BEF555E2844DD4EAFAFE3CE63
+            stream[448..511] = FDFB1D76CEA5E3FD0C5EE1FDA1717684
+                               2120C48956F28A583B291712DEFC158E
+                               FA26FC4A833D31B0EB59F61D942E99D4
+                               AF4BB42D0C0448CF8CDDBEB336738414
+                  xor-digest = E49BAC9E963F83F3AE70026DA7DA496A
+                               0764267F7F5A8A23F7AB32EA0F54D459
+                               32367E47527DF738F7255CC890F15FF5
+                               8160EC0C1A27260856A822810AE63F2C
+
+Set 3, vector# 45:
+                         key = 2D2E2F303132333435363738393A3B3C
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 67F1B4269C402D69FFB8B84559E60033
+                               07B153631D650E01A3B265739130F184
+                               4F6126FA1F957C7FF5AAD71C2E3BDE25
+                               94DB87780773B4A4DB3E44D231D46AE2
+            stream[192..255] = 5BF80BBE842FA08B4B2EDEEE74626A19
+                               69CDEF41D1E731FDCFC906F320A2CAC2
+                               8B79B585B0F70A5AB48CBC5C9478E5EC
+                               B14A387D5DB8E60E4EFC86785274E437
+            stream[256..319] = 5DC02CB76EAE6800980E204AD9A315F7
+                               A65C57E2F38DEFCC29FB1153E7A4586B
+                               E9FB7FEA650E326A5593568957BCD278
+                               A93FEC168D48372068B9A2E41EE10C61
+            stream[448..511] = 61D55EB5278689230193C990EC5E65A1
+                               DDA93955026C14BC32E80036055A31BA
+                               118911DAFA9FA9160D4C37524F5EFFD1
+                               2D575FF005967C3EACFDCC9D8889A198
+                  xor-digest = 9B327699C5FB098D15CFF2AAE321D095
+                               A569B6D87AB1BD20FC8FD94AABFCDF2C
+                               521D3D5657857A6E197B55F371351525
+                               171D23F4DC242408730057CE67BE8E58
+
+Set 3, vector# 54:
+                         key = 363738393A3B3C3D3E3F404142434445
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = D9B96EA262807FB3F5A8675D81B1A006
+                               1D717D345EB2B91F607B853A5A38DB2B
+                               ECDD26626A33477BF07BF9C57FE95100
+                               A1F142F70DA7DC86E063A58AEB090B2A
+            stream[192..255] = 597883FB531AA34A2EDB6D83AB2A304A
+                               FE522A9EA6914C556618B3094874E021
+                               2316FA67BEAF7ECE4BCF350A817DEA50
+                               FEF5B76E72E2596A149D99B6971B069B
+            stream[256..319] = 6090A1AF397F2BC3ED551450EF28472A
+                               F60EE5F2B4BEC18A8B1ADF21A6A476F6
+                               8C11F76405ED62ABB7BC585BEA4B0A47
+                               988A09A1D93CE2CE95B82C9C1B60E650
+            stream[448..511] = 49F88E9C5E53BF43EA422682ECA42968
+                               6D794754E65DCE9306D3D9FF206BDAC6
+                               442655D27EF6166CB095DA4C301FB7EE
+                               F1F5FA0225EB84CE61BF3856062A4EF1
+                  xor-digest = A71B962E13E66A678C5B56E19099CED2
+                               A15480838832FA6361C3C0B5BF47C1C0
+                               DC954A7CA8D7484D7889FC760227B418
+                               73EB611B5AD62FB622F5FB75FE412A44
+
+Set 3, vector# 63:
+                         key = 3F404142434445464748494A4B4C4D4E
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CF11B1510C81A296CB185B1BA6436112
+                               832AD2EB68B70E52CD68F9D394F5165B
+                               94DE467FFDE4EBAB6AFB180EE7A2116A
+                               1E73AB81AE4528273D0D93DD05025D70
+            stream[192..255] = 26E9F1C007EA49793D701F21696FDE8D
+                               B72D317BB958F86A35E7BBAC80D62CE7
+                               0879213503B04FEB1FBF3987847745F9
+                               DDA9310DB36AB8F485FEBE9FA6C1C7FB
+            stream[256..319] = 25C98B6441F90615C6078D82B5D72F61
+                               828ACCFC365CD5EC17D5CEE488A51192
+                               8826B334A1D7BEFAD7528BC5CFD32B82
+                               87F4EC603E21F528B51999F222817DF0
+            stream[448..511] = E2CB68B1CFB640B76DBFC5CDFD192AD0
+                               A7E8BE14ECDF6E20F1C8FD444D073108
+                               6932BFEF0EFBCB7F64E5CE79CA4AAD15
+                               846081CB229C74013CA0D498DDC69703
+                  xor-digest = 4BB7025AEEE0FC3ADE977F13A0853FBD
+                               9F43393A6A0B7C91534F5F2A47009D63
+                               79D0B9440D5A36A82974EE70BCF3634D
+                               131E754FC6BFB8DA62A05B3F4D1E9FED
+
+Set 3, vector# 72:
+                         key = 48494A4B4C4D4E4F5051525354555657
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0CD34EBF2677F222A589B77FC7284567
+                               C3CD391D85E3CBD04F43DCCFF830F0D9
+                               5C9C97371376B180AC2235DE4EF2E377
+                               8242ECD6A257FA02F2055CC7116A006E
+            stream[192..255] = 0CEA97153979B13DFBFC3F04D311D677
+                               9380FCA517161003A82CF5E00CAD8438
+                               18341CAF98A5BB7CC4D4E487A5878A3E
+                               F0D490EFD4834ACB92EE0FBAA3144270
+            stream[256..319] = 700797B741FF36DD80F72A889696436B
+                               A900033C957BEBA6BB3EE71AE3D79A83
+                               FB4EF28F39B0B3A0E36719059774E6AB
+                               CDB4447CB3CE6CF78E30EE239F537140
+            stream[448..511] = 44EE572970D5AB8C094D434DF6489171
+                               B657A51C610D370EE9517370780D81CF
+                               47A666A1556AC7B254DBFCB2D1352365
+                               F62B950D9457E4E364EA980C3832AF75
+                  xor-digest = C794C46A6A1C155D6922A7CCF4327038
+                               B48618EE29326A7555AC2A00122D4E83
+                               A4F17AB72F9A133F48750BF43344D561
+                               E71C69844840FE83889B542FC83D5132
+
+Set 3, vector# 81:
+                         key = 5152535455565758595A5B5C5D5E5F60
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = AA9A1800F63A3D6EE6FAAE48B615175F
+                               F4EC441EFAADB6273B38087417E9528E
+                               BB3E9A8D9E81C6B7863D26C24CACF50D
+                               BAE956DD15EE335C99CDC981B4182545
+            stream[192..255] = 6F8CB1506073F5BF7E656C25BB46A689
+                               73EFED2E87229204BDB09910180C279F
+                               23341A1FBB0C40705C1EDCDE8E1BD8D5
+                               AF9F503901071A857F8315ED2F963114
+            stream[256..319] = 3EB29DC8A63E3B61A6EB1062F189BD53
+                               54A7DDBB22A6C3B7857D80E5A761836C
+                               4A91EC1C994FBAF781AC65B1840DD892
+                               2A82AF4D6DCE1004B3FDCDE790018C31
+            stream[448..511] = 00A6E02F4DCAEEE2FC77318AB9619246
+                               64E1DF835DD62629D035C44A1E147D6B
+                               809D6C60983B9767B92A10E35A651786
+                               B0B0E1B8FE8BCBBEF4D02BC625E5B402
+                  xor-digest = CBF02F452CCC84F5D8D3556876B7902F
+                               324BB22F3C676D3D5C5FEA182A4582EC
+                               57BB18419D8F82CC8C43737F3B356C73
+                               CC9452557FDE07F9CB3BCC06041C4279
+
+Set 3, vector# 90:
+                         key = 5A5B5C5D5E5F60616263646566676869
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E5605A67C46B013408F53D1D8A583699
+                               389267A63163901506FDB6150CAB719E
+                               D591787D8CEEBF1EB13E73F6A5D3DBCA
+                               CC916D41738008C5453132A472931D9D
+            stream[192..255] = 0D04AC34DE63ACD3D554E568B4E423D9
+                               76B22FD4C32464BBA143163B225AE996
+                               4658EF46C19E5C95CA14D9677098C303
+                               7C37E77446E8878A5F8794E00FD2E0F8
+            stream[256..319] = 1915755636B9E8CFDF50F532F6FD6C66
+                               60CA7E53C6037A532A39E56E61C6067F
+                               99C864B32049F95CC142B019BAA37720
+                               1A0C28D747CAAB42E81073F14818EF1E
+            stream[448..511] = 820E743AC49AF76E030EACE4D0BD568E
+                               781B2AB82257DF8C407C159CFFC13D12
+                               7B869E6E48C5A6BE72A5F1A9877564E3
+                               CE22D770D9FFE839BA4BFB8D297D3795
+                  xor-digest = F98873945A95030C43B22CE430D520EE
+                               F6E4F2FF30F2545693C7765D5EB19AC7
+                               A096799EDB90D661B1379264D5B42729
+                               E2CB5479FE63BA9B8D409AB98696248C
+
+Set 3, vector# 99:
+                         key = 636465666768696A6B6C6D6E6F707172
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 2ACCA4B94538608F318E142FA9DA9DAE
+                               F2DA0FE10DC27C804C0DCEA927CBFBFC
+                               4F9AF87F67D962130A2DE073D4CBD1C2
+                               70A836BE81FF2EFA6CF910E6F558485A
+            stream[192..255] = 586AC09D4C7285B3CC8A49BBF978D086
+                               C628229659DA298476EBED38C7FCD86B
+                               59FEE45D41F480258A44C0615DBA2DA5
+                               E64B178A2E7EE3B02A316245152F72CE
+            stream[256..319] = 1988E499CFD61EC2699181A520C1C829
+                               3F0AE76B30C4BD0279C937D53054F646
+                               B318B13703EA193F63BC83BCD501C083
+                               D31B8E2DCBCAA5CB4B9ACF15EE740010
+            stream[448..511] = 797DB54E1E718B6ECAB6F928C3CF507A
+                               A8E58832933F404CE1331FD469643E78
+                               3F8BC3004AC7AFC5EF036F8B5D4DB5EE
+                               16BA7F94C39A39237EF93BAE10E427D1
+                  xor-digest = 75197D3AF308890C381051938649CF93
+                               157F5E1200E87F7A0CCE920B1A378415
+                               F1DBF671C49324EF517ACDE52BDDA9DB
+                               BACFB24EB2DDA3582DFF0F0DA9A7CC8D
+
+Set 3, vector#108:
+                         key = 6C6D6E6F707172737475767778797A7B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 5B1C1C98D5EC2E066FE163A010AB06CB
+                               D81E8E237F4486C3C57C7DDFE9CC4E2B
+                               6C0C016EB38630B09823CFE1804D969B
+                               3CF93666F785BF5EED450D6CCAA1ECAC
+            stream[192..255] = 5519D71CA1AD10191586664DDFF26BCA
+                               7CEE6FA4C728BC0487FFF71236DD947C
+                               C7F84A9ADE9ACBDDB04CA4576AA11CD1
+                               19F676BC908335BE454957280423AB9C
+            stream[256..319] = BCBAFB8D31351D748DAEB21A4927FCC0
+                               D206C0DFD1EF6CE6425808BCBEAEE26D
+                               DF29CD37EF61A6C186E33E432298CB7E
+                               94A598588A7649C3639D3EEA43A4EFD9
+            stream[448..511] = 6FED1CDB9C109AC353D8F0A92B8DE388
+                               EF089BB8805D6622CBF93F4E70939039
+                               536C12BB7952550B4A9F62B8F99A3522
+                               FE12D79D52456E5E2B58D899CCC0A683
+                  xor-digest = 9A528A131B2DC7999743397DD1191EF6
+                               306AC8B7D333276AA11FC5F952DA12C4
+                               890509B6B3324B57117736A2FE462B97
+                               3676D4AB0F9EC5F40389BD1631DA30C2
+
+Set 3, vector#117:
+                         key = 75767778797A7B7C7D7E7F8081828384
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 19DD8D2D6FED84E4C8983761323019B5
+                               6EFBFDDE9D0DD65ACF8EA7064D876159
+                               34CA7A8690CD9B688A3A7E2739C0DD40
+                               87E931669B47FAE65582F217B703F744
+            stream[192..255] = 118247263D78B35C87001EE80D0855A5
+                               4BB82A2538BDC4CE4E0508BA9C1AFF2D
+                               F6E3BD124EE8EBBE9C5F8CFF809B22C7
+                               EC14FADC932266458D049847E4BBDA57
+            stream[256..319] = 3ED5D1F9FC223FAF7C35165CB00DC41A
+                               948089FE364B824970DB5C8EEB277D5F
+                               E1D7EBE4133BC0B5C9AA277360AB3D59
+                               D990F5F7F8FB2D4839F8DF8F91BC8CD5
+            stream[448..511] = CA652B9B5179E5FD45CDD84F778BCA9F
+                               A5E029B0D5F8F8DC9F6848EC6FB90CB8
+                               B5D6D1F65BAF94B02FAD8F432901B2C8
+                               1DF0A7BE680810CBAC3FAEA492EB49C7
+                  xor-digest = 1D54E85686E20E556FF40B2C310505C8
+                               B3E341EE7DB6BEE6761CF0FF87D56DE0
+                               3C08007AC388112D542875E0F56BC435
+                               EF698DE5F550B2E6DADB7CF899C670C7
+
+Set 3, vector#126:
+                         key = 7E7F808182838485868788898A8B8C8D
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A865C1EC58AEB098342D771FD9DC8CC6
+                               257144135060E17F794154163B5B50E0
+                               C175DADFE996D8D9EDC24F528B403EBD
+                               31B181DA7621E80465F5609656D2F6BE
+            stream[192..255] = 6E369A08D533239B1813FB1E64FE4016
+                               D5A168E7B082AC17782FD536B1614EEF
+                               9B96114431A8A20901442B17D359AA8A
+                               616CDFF610EB376A01A5424443724BC5
+            stream[256..319] = A6A4AAC9510367507B3ACD133FF4621F
+                               EF8117A2F74CE892273D852801F6B788
+                               3B4CFA27124C42D424131AFFF2890AF9
+                               B7EB6F70917407991169997C9014C6B8
+            stream[448..511] = 54DA1A3C64310F07888F043684AC5081
+                               B35962F34CF46D8B1BF8CB9079A0CB7C
+                               3AE2998F6A247D758D7C435F2A509E9A
+                               164A0CB7F1D9FCF1DFF99D2C7074198C
+                  xor-digest = 44F37D188FB59A4BB0BBD69BE1592797
+                               65135A26C7EC258CB2FFCA9BCCFDC005
+                               E9971F4128215E73D9EAD8C6B0465C98
+                               DFB9065DCD07E83DEC0001A737CF8DFD
+
+Set 3, vector#135:
+                         key = 8788898A8B8C8D8E8F90919293949596
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0707B0C6C7CFDB502FBA27A9179AC77A
+                               8EC79404E4DF30E46B0512EAE40876BA
+                               A0129C7C6A7D61A264654AD3C7822B68
+                               80AAEF7CEAB7CDC898F11F217BF705BE
+            stream[192..255] = FE4ED3B451213FDF4847305FEB8E9FE1
+                               2C359E24DC7AC0957DF2558D300FB0CE
+                               D38A9983F6CA936514983BD48F80A596
+                               A2CE35993ACA48ABC500BE4E766699FD
+            stream[256..319] = C5BF4DC95100E2D7F6792F6AF5F31371
+                               53D418611ED358EB8646CC359FF18770
+                               93C18CF26FC4DD646ECA8C4A199539C6
+                               64C92D30F2F3D652DD2E4CF66A6F1725
+            stream[448..511] = 588425C16BD8DDA6D1D34950A40E35C1
+                               2CBC1F62542B3D3F6AE4069DA42CFE09
+                               8B36BAFC94356A4EFFA655EF8DFC281D
+                               F47FA499717D95FF7CA81EA175E2D6FE
+                  xor-digest = 4F543EF4ACADF04EDCEAB6841B794C70
+                               B9CA52B336CA4D6696E5AF632271367C
+                               29815CA30CB0528546FAB08A6AF9016A
+                               9B25460BD71FC1D00C516961D3A0B448
+
+Set 3, vector#144:
+                         key = 909192939495969798999A9B9C9D9E9F
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C95BF1BBEAC136B08DB163D8A12CC5D1
+                               53D2C485C257E16BB5EAD3B93BA84D32
+                               352DD608CE457C3BBC55864B1FAE0296
+                               1180FA7063C3E9AA05A471F89E9E8C92
+            stream[192..255] = 112D3B048885FE87290E91C2288A605C
+                               669795CAB3F78FE8C6E15204E0FEFB5C
+                               9D0C690C2CC57882AA3C276E94414DE9
+                               376531151D9BE1DAC6D784E95FB196B5
+            stream[256..319] = A073295F2907C05C3CC3A17B8E404338
+                               0BC74C10864FE1EC6F043DDEA356CB48
+                               4159EF66A944668B55131F4BE61D7F4B
+                               4EDA1CCC0CDFBDFFD79B9A37D4E0DD01
+            stream[448..511] = 42834D089F1518A4E6167174E844E51F
+                               C31BE2238B7C2F306F1DCC3FF7DD30E6
+                               E9B0CD089B9F9280EE40D3416339E1D3
+                               47F0E29593168593203825261191D02E
+                  xor-digest = 86960034091CFB6A6767B53B66713632
+                               C6272B95347CB92D8D084E8794984516
+                               4AA48669D26826E2C84907C2CEA78727
+                               B0D3C9E240A361FFA661F00670C3060D
+
+Set 3, vector#153:
+                         key = 999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = FB01986DB035CCE47390DB060C6A31D8
+                               3C9E93F728E785ECECE34E41D81133A2
+                               69C5917545B1FF479F4C45BD1F6AA46F
+                               3F9591C54F3D67A8BA7AB6DD9D7D07FC
+            stream[192..255] = A056ECB565EEEE24B5C42C501D78882D
+                               A9AF1A9B5BE4DAD286E695A23D516D52
+                               CA83FEDE7CA0853C01D8043CDEE992FA
+                               1F71C90DD5C3C95ADD5FED24575A4DDC
+            stream[256..319] = FBDC6515174B6E51F3A9804AA2C34DD6
+                               C03F0EB5202CC36D5602D58A2630390B
+                               C9D7A452680F152767F4558B3160BFBC
+                               EFD49175AB0FCF62D2FCB8E78E1CECA6
+            stream[448..511] = 774009D68AE972386F6F4D0467963670
+                               3E08B4CA05B801C5FC84376343B505F3
+                               37B9052F7280733BDCC026529F48BDA4
+                               765D1FB436CDB3DA0FB69F148894E8A9
+                  xor-digest = 41CCA3720EF5CE5F8EFABE447C3BEC9E
+                               DA338E5ED14ED24B21F66BC010077475
+                               16C61E91AC9E3501F2E8D9DE2E619ECD
+                               F995AFBA554A8AF21E89EAAD9FBE9913
+
+Set 3, vector#162:
+                         key = A2A3A4A5A6A7A8A9AAABACADAEAFB0B1
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0DB9C95EF6FA9E4F256789098C2F589E
+                               F5F2C63E8F38F81661A22842C4058E42
+                               D62675CF0F435C6441A905C46A5E2B55
+                               98D87AA7483D5036DBC6DA6F795B95F6
+            stream[192..255] = A195496ABF83B1EA9BAC8FD119F0514D
+                               5C01B2A262090DC52DD00AE0689DA3E7
+                               D9AD502FA2F3740EA254E8542296A3C9
+                               DD4D7ED40EBDAF2237157BB197887DCC
+            stream[256..319] = D5E1BC7E5C9B1F47FE69662C94D2C83A
+                               8B92217E877379F8BAB56CDBD5406CF8
+                               C18E1E2F223226EB9ED272BB66F7AD60
+                               ECEE3CA6C84A5E1BBA1DA733066C0D6F
+            stream[448..511] = C79F97FE9EEC3023430857F95A1541EC
+                               BEEA487C1C072F81736CF02AE97D1A77
+                               2C81A69FD2C58D85976DE47F09958BCD
+                               4382435A952C27B45EC6E387EB0A0333
+                  xor-digest = 65E3A3C2314794333A620A28C23D5EBE
+                               884D04CCEC9F7EC8892535B5E937C9F1
+                               D2B993451DC35047872F562C9ED5EBA8
+                               AD36B8B67325032A2C135495CF8A1683
+
+Set 3, vector#171:
+                         key = ABACADAEAFB0B1B2B3B4B5B6B7B8B9BA
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 505F4C9084D6F5C640C214EFED9E2DF0
+                               8EEF8241ACAE98072B5B3EDB72F1687D
+                               586B2569DC7F58DED2C2BCD134CB6CF3
+                               D80A7A879D7878C080A5BAD5ABA1DCCF
+            stream[192..255] = F38E694DB538EA115B3F765694B7F647
+                               BD16B1E50C927528B13FA2EB811E8E8A
+                               B7A56FCACD80B1E7861733E0F8289E5B
+                               3C461080A858FCAFC85748DC11CA007B
+            stream[256..319] = DEE9825C69B6F6210381ED04A152A029
+                               A7ABC8D6C23D2895B968142E3A9C4D16
+                               8059A067F309C2E9491426BD0953E4B5
+                               A6E545EE62D4E9363205FA50ADECE92E
+            stream[448..511] = E2C07AC69B0D646D013AB6129A979A80
+                               0977C0B2E3505CD4DB4CCB4C2D02A936
+                               DDE87099B8F69301CB8A441A1CE6EEB7
+                               9EB73A32F54D1B3AA1A5FAFAAEB0BFF5
+                  xor-digest = 58B7C17AF5B37A6806E8019BBC243F2F
+                               779B2961C0FF27B78EA54587FDA31F4D
+                               43AA70643AEB9BA547F814C57107B760
+                               8D3DD6B06C6CA5BC0FE55A31274B4B5B
+
+Set 3, vector#180:
+                         key = B4B5B6B7B8B9BABBBCBDBEBFC0C1C2C3
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F43EB3DC7366C02A6EAA1BA286589786
+                               3A2221D8679C3F0399B2119FB09D2717
+                               8C262A1CAA0711E961209288EB03BC19
+                               FF9FF74773B10AC28295FF3BEF1E2B70
+            stream[192..255] = 453BA5A1529349A29B1CC75B9835E642
+                               9587A1E06F96A5E575BEDFC7CB6E6C79
+                               C7174D10F908C1688E9CDF6973971A89
+                               2764D7412F054D772BF3B97B194717B0
+            stream[256..319] = B2353310A194E71847B541FA5A301E56
+                               6678FF7148960C4C2EE2139A338EDC4F
+                               082A79EC59E094AE01E3D9585033350F
+                               7E7255838EA448658ACD1D1B56546188
+            stream[448..511] = 647B02009ED90BB30849D5136432AD33
+                               759097A5BB30DAA7D768FD7F7F5FFCE8
+                               513975CE19501ECD4E194A1C172F7A01
+                               E75BE6598CB0BBE4DEE6E1C364BF9C36
+                  xor-digest = 890A2D288B3BDE3AB9B9214DDFA6BB03
+                               390FDC8925358A0C99C44543C8EAF224
+                               64635D46AE1FCE0CA494A6BC7F127F23
+                               2B8EC742C518A73F6B2DE22F2F564749
+
+Set 3, vector#189:
+                         key = BDBEBFC0C1C2C3C4C5C6C7C8C9CACBCC
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 17638771CE9C92633C8820B9FF9A7D20
+                               C0BB3ADE5D49E16EE463A6F768D0191F
+                               F624A8E1E36DBE1F35EDB6EBA4587DA0
+                               AD633F1E6CA8072A3871C580037F202C
+            stream[192..255] = 36358F7049F57244EEF847ECC80803B4
+                               A9EDB8B97CF098F87B047D02FAE2043A
+                               B4370B7C4E87777E049A79CA833A2F40
+                               DF221E8B34B710591A24937D19F39BDA
+            stream[256..319] = EC6A73C4A816CA1C3D1DC0B2A1AE5409
+                               AFEA32DD3B961BCE9F27FDF8B46E8300
+                               28C2C75C0596D1394E579BB4239FBAD7
+                               258C7BC7FB9E1C5465439177E454FA6E
+            stream[448..511] = 1A5ED8E740246F0744218C31668F081D
+                               333CB2C4416504584CA1AB6E7C56C82C
+                               AEACD22E01CCC23C1A9E8BE94AF90C7E
+                               DEEE590D8F75C9A1EB2134CC1A44AE0A
+                  xor-digest = 2D664EC9400F9864BFB1CECE43DF3971
+                               B8EEECEFE3507CE09F6572A9C9743EB8
+                               58B433A6FD2DF24605BB505B4D732050
+                               8C89F38BAD818FB3893383DE2C1ABE08
+
+Set 3, vector#198:
+                         key = C6C7C8C9CACBCCCDCECFD0D1D2D3D4D5
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = AECDF83CEAFC62A35AAE0B56DB5E6608
+                               3ED8144A470316E5768F898741181B39
+                               BE1B44248B79446A2B8551A7F71009F3
+                               4BA3799E8967A961169A2949979698BF
+            stream[192..255] = 1162529D235C48CBA87E0FAED1209825
+                               4F0C650835F5A0C44B01FC1AB0A53ACE
+                               496709D34D632E42A98CDA3A14E033AC
+                               F01E869A8263D0921619C26D3EC150EA
+            stream[256..319] = 30F569D183A30142A2C85002A7768DB1
+                               1B12025C41B0331458BE45DC53608B11
+                               63E130EC0D6940C2DA7BCB40881270F1
+                               1D79B941B6DBD4B53A093CDB9DC3BB08
+            stream[448..511] = 6170D203CCDDB9E93F3BBA8E195214E2
+                               485BCD5E96031B5848C433D2BAF4AD4E
+                               2050902F0E6F0D71D034909B58EF6E3A
+                               D8D72DFF40449A96F9DB8A2691FA02ED
+                  xor-digest = 8D8C29A1126A2C135938D456B61C1C22
+                               88F42EA3CC4AE32C2D9AF46A3393EA9D
+                               13719D95D2EE3F62D261807FBD4B504A
+                               A189EF6CEDF6DE1CBD0C9223DC485044
+
+Set 3, vector#207:
+                         key = CFD0D1D2D3D4D5D6D7D8D9DADBDCDDDE
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 03FA3028E50F89A3A26FE0C9A59D4D8F
+                               CD4F6664621464876D0DD0070C3C4A4F
+                               BEA73FCF1858F583277C9A8AB098DBD2
+                               CE9DC0BD491A0069D48812B45D99BF6D
+            stream[192..255] = 4BFA1D3877F91E02E7B59C2BA54E80EE
+                               88FD0217E82EDB379B54F8AAD1B87308
+                               E908A3740DD0A6BED98D95A89579E18D
+                               B12960A3E8C2DCF39F84BFE48CD9D8EF
+            stream[256..319] = DF87530FE64F198DE0F5685C24E6F752
+                               776A64B5355FDCC7A734A195350A05EF
+                               A9BCBDC50D12A81CB89F49F330EB2796
+                               F3C0EC3A2AA823AB1787B4AE2E9F4B84
+            stream[448..511] = B62D2660AF636D037FF77CB2DA14EEED
+                               1DA4C10E4C34C3A170F00753256F021C
+                               6B8058A71680B8AC68F0E7B73D491E77
+                               21CB13DA097FBA6630DC814920993501
+                  xor-digest = BFCA05D3C5A76AF3016B56245C890022
+                               F173D207ABFA1355C4AC75CD44440227
+                               40BDF92FA07711FFFB49C3FE49F63375
+                               F242014728E308CE8261AB6971D82EBD
+
+Set 3, vector#216:
+                         key = D8D9DADBDCDDDEDFE0E1E2E3E4E5E6E7
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3FF2373E4F64EA27FD8C86D971D6C497
+                               9AA558C47B291B686BA3EB4C848320B4
+                               C2614E739FC890F78FBAF82DDD01EFE8
+                               D93CF5A5068A0BCC4FE41F87B4FE82D7
+            stream[192..255] = 7BD47D4550A516BA255A572D948C143F
+                               8B46F2FDEE81E80D21E9A64A27A89FC6
+                               B00BF842251F5094326BA41055D83D75
+                               3A7A4DC88643BB8D8207CF4E6B5D6360
+            stream[256..319] = 9EC176E21634E97E52F5D8D42BEC590A
+                               5F4A6D0671BE640B7AC3C790AC521911
+                               3862151C7EE904BBA1B1254CA5FF8A72
+                               83EE9F0A3CBA3A0A38F3CBCECA7AC751
+            stream[448..511] = B87FC33D6F13852603A069DD88143790
+                               4922F8B3B98D383B7082257077DCDD01
+                               1B2B0390F6B680719D91B815A0421DBD
+                               5F3687097C63BD0AB1B59EBC12441A43
+                  xor-digest = 819FEAE72A30198453E6B7E0566459FA
+                               3A325C59B0B1BEC7B1311FEABEFAFD0A
+                               F7EA6A01603CD81DE8E338740573C01D
+                               94D57B04AC8F4D5CF26DDCFB7A9A85CA
+
+Set 3, vector#225:
+                         key = E1E2E3E4E5E6E7E8E9EAEBECEDEEEFF0
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B378200C66DABE0FB33FFC336DB91F9F
+                               25F65CE152EC1D11738AE1DFA2B419AC
+                               31AA2F559A63CE39B8829E2E880437F5
+                               7D83E3680EB41CF262A6F8025EC8E733
+            stream[192..255] = 739C9F273A1A8312214B4B3FFD58615D
+                               AF751344F8D36BBD79A11BBA93BD0AA3
+                               34CA56667A6B4A98B6209F0765D9E4A5
+                               163756D6AC6861A8DE65777B9B5F4950
+            stream[256..319] = E7C1F35E0596EAAF7954E0C7F0423C54
+                               60E23A0106FEC3F1C4EBC571AE016BD4
+                               B232C2E0A8C079EA1A5DE6A2D18B1B79
+                               5E69ED4DE32AE2011805A439493223DC
+            stream[448..511] = 91D8B977B8BD9F8E84C097AB9454FFE7
+                               794908D3B1D98729036CF2DB77056F10
+                               582C1D1EB084EC97943117FA428C5B9A
+                               7ED1736E05BCBB55E9E0ED1FD0113860
+                  xor-digest = B05B91E712072C9FE4AE5C4BCFF3AAFC
+                               954380E58A9F264458EE46ACE1194032
+                               2B1CAAF21117E26A6B490A1C93761A49
+                               92982F4277E36ED3C4B74D31D3BB2ABA
+
+Set 3, vector#234:
+                         key = EAEBECEDEEEFF0F1F2F3F4F5F6F7F8F9
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 77D958F664235976A8696CDBF0A3362C
+                               BCF3EA19D524F379B02D403F79F9A067
+                               BBE8F1365B0BCE68699E0A0DA273F117
+                               2EDA63B4558B062EF10743740825665C
+            stream[192..255] = 99B50E13CEA45209DB8FF0F3FFDB568C
+                               7EFDB1E021435065668313F23A57DD75
+                               0676F550EB7C5C5FDD65EBA84B00AA02
+                               E41039EBCB5AF806339054EC8E9C9567
+            stream[256..319] = 64CAF7DF8BDAA26D9BC8B49F99CAA94A
+                               0ABCD947E23AD676E3CFC95B4461CA78
+                               C17DF55D2ED805AF80B24BB57E3372A5
+                               4F7BD4B4A1A0F65581BF0D409198199F
+            stream[448..511] = 98595F685F9884606A085383B2437A8F
+                               8D8B7536D30C693B13FDE9F19DB847E5
+                               22B1C305A9BBDBB1F0D402A7794460E8
+                               DF5A4E719CDF48986C7E0B91A801742F
+                  xor-digest = 54D02F27FFB007DF1686027BFE0F4978
+                               01C265DAFA66F72EA530F37F82E8F25B
+                               35B6D7E2BBEB36F4DCB98C7526A727F1
+                               452296BB074B8BCFB878A5299E052B9B
+
+Set 3, vector#243:
+                         key = F3F4F5F6F7F8F9FAFBFCFDFEFF000102
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CCFFAD20ADF1C4B744BC6B2EC9CB29B9
+                               12F5577164F188BEAD1B8F5884619756
+                               350C6514969354F92C33DBEB3553E546
+                               D00B7321409CF15C2B1BF1D30E1B808E
+            stream[192..255] = 5D2AB87447F536F42DC3423A3F5E0C3D
+                               354B648D49A1D613E741FCA61E450D7F
+                               4777CB7F19557AFB0E3A49E8005255A3
+                               EF71C5389A5455AAD803CAA30C75E263
+            stream[256..319] = 53764B5DDEF40B7C66414E2855FB5D70
+                               BCE612CB71A7478D3C8D6B42918BB8E1
+                               4B12B5D48BF8C464B60214CE96E1CB2B
+                               6055A167B6BC4BEC2FE87B4C31441CAC
+            stream[448..511] = 2E4FCCA6545573B051885454D384B365
+                               546DE212F89E14DFF2B27A97FA3D5CD3
+                               BA797DAE4815E8E01629F4A95321E1B1
+                               ACAE5AFBB2E1FF74D0FA5A31E09A76BF
+                  xor-digest = 4DCE3E84B2FB36C6A268933805F307D3
+                               6B9F8B2ED75BDFA9528F14E96CDCD7EF
+                               77AD88BB08CD19BEA854C1F66216EB4F
+                               CF23FEC02A128FFBE7219244A72FF66C
+
+Set 3, vector#252:
+                         key = FCFDFEFF000102030405060708090A0B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 87E3FC12C86A001AD83DC4B364F49F3A
+                               331C286890826198B6D4937E6804F17E
+                               A9701A1AE8BD09185C1803649959AF65
+                               1726A25C54533924E6112F923056F09E
+            stream[192..255] = D6E5A2371EC564FD24213259599665D7
+                               9A31404C3493E005F611116C7F7B48FA
+                               CC6A949BB1746BC5EFE93D6114A1AD5D
+                               444A9A0391368106BEC2D5DAB96343D2
+            stream[256..319] = DBB63AE5E1B11D8A014CDECDE7B03DE9
+                               D59A473563285D52DBAD3E7E4C1E99BE
+                               C455E7CAE251B3AF52234CD9DE49BA55
+                               2B19E5A721C994EA57AFF2239B42C0F1
+            stream[448..511] = 339B85580D35BA903A85D2B45249FC31
+                               182D7E1B894DE9584906C2E210319EA1
+                               168E2E9C582CEBFCD96BEAD69E22CAD1
+                               E9C5AD2D5E3B708DC1F6B7E36F6E65EE
+                  xor-digest = B3DA36B9D7E12E6761A1C7F8533370F1
+                               E1D4C4EBA89ACFCE4F24FAC989A7BA87
+                               A1E0E61BD5A89895C04513D4813FE066
+                               6542738B77319BC7282D3209CE08CEF0
+
+Test vectors -- set 4
+=====================
+
+Set 4, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B1B7CB35C1FFBE7A34E645B05C98501F
+                               2364C719BD94186DCD66351EDEDB5179
+                               169D2EFD6BF03AE1B149DA229BE5C961
+                               37C10C3210F8FF34B51A366E437DE0F3
+        stream[65472..65535] = 5610AC7C3006ABADD3E0AB13B3D7E945
+                               586A00964AD6DF9939835FD46D8B2327
+                               15E447AA5D5CC4BAD03A495DC38BBF1A
+                               5C86A7D608D397694BCCCB029ACD1883
+        stream[65536..65599] = 1D7469F8EC3D021C5FB418A0D46A19C4
+                               A632A7C1BF298B500ACC2D5C39384F5E
+                               7837C964465FBF3990602BE3381FF556
+                               38114E41DC091B0AC1BC51FC6E70F98E
+      stream[131008..131071] = 5F1A8DD0D98D377C1378785F9EA7A3E4
+                               B17C9625EFE2650D845A4BAC7723B193
+                               A3AAC199A1950D7CB1D66380A566A8BE
+                               BBCEB0DD7A700C5ED74E55E29933FC6F
+                  xor-digest = 3E9A70E4A49AE98473313B957F781F09
+                               237A172CEFC9068D4F95CABB57358B7F
+                               40839FFF4258C8BEB466A975B4261753
+                               02BD1F4B9D4621436213703A3B99A719
+
+Set 4, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 54182309BD782DEE44FB59B0EC694920
+                               2B372AF8D715271A96D87867E65A067F
+                               A5E52B455B76D400537B5D47C4AC318E
+                               EE4C2ABE29F56107C213071C85828605
+        stream[65472..65535] = F7D1475B3FA625D86467D4C24915038C
+                               43D9B81A13E7A08B333B8232D7F849B3
+                               1442C014F49EC5814E15B607F11A73A9
+                               61C04D305B2F71B7B22DB9D6055B7371
+        stream[65536..65599] = CA286F0F05CD6C3BDDDE6108C8A0AECB
+                               F6ED3FE2A39A976D7970FD100A242464
+                               42D867162B87DF26EC2B04A990AA7305
+                               94C8072994E80B2D6426B90AD0873B61
+      stream[131008..131071] = B1FE56B55C9BB460B8EF4F9157B227DE
+                               AACACFAE9009C61C16754EDC913AE3D0
+                               BEB00C99095C48A12F4485E9AD56BE6A
+                               6F9C214ED11E94086F32F945C0C3F6EF
+                  xor-digest = 4667B465D4CD7E215B6594B648B05EE4
+                               7D2770A69F5FB3A49AD66C1C823F2E6A
+                               AAEAF0680A232F35EA7CAE919F477301
+                               0AE66193179E51600ED840D5047F5493
+
+Set 4, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 203C7A9050F5E4F98CB72D913B8E7FB9
+                               BB2635F8ECCDBFCD231B4EDCA96A24A9
+                               9F71BDD76CE42B982228ADCF9385C702
+                               C2A767488DF42D5DBD8DF2884225367B
+        stream[65472..65535] = 94E590E29B3A371E5638E55DA4AAA1D2
+                               F2369CF9EF69EAA0331B4AB01FC1D7E4
+                               D27A41EEF2C15C51256EA111933BB71B
+                               5E948DE575258966A03ADC426A3AE9E1
+        stream[65536..65599] = BCE13EAD9E39CCB67374B7D845B1B347
+                               DAF7C440162CEA622CCA3E34E9BFE35E
+                               10828358DB1F595C19A0A0CD16C127AC
+                               D49903A5159564038BDA4EF156F9D004
+      stream[131008..131071] = A4300187C3E146EC1C0F3568C147D668
+                               D00BAF2EF5E1F71686DC491745C6FC68
+                               27F54AFEF7B2DBF9F65D5FE549B96919
+                               4BDA10595556840647DD2A4BA22EAB63
+                  xor-digest = C575DB999E785911A2AEAEA074EA0CD9
+                               2BA978DA488A3657341572F1B33E8009
+                               07977C738874012CE18E487514FBBFFC
+                               A2E645EB4632862812B7596ABAF1ACE6
+
+Set 4, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 4A82E7937D7C52907515CDDDC1E8445F
+                               D0ECAD783B25079AEDF9D694CE70B723
+                               792E33F6FFFD438EECFD3DF933AB48CA
+                               7EFBB13A31C1E3E86249B8F9D188B7A3
+        stream[65472..65535] = FD302A0A44AE5D3BD5554C508BD70D8C
+                               A1803BE72ED426B8D57CC13F899A846E
+                               5A7A326AB25645EE27A84973BDDB82EC
+                               103AB97C16080C5FB117E10A8E252A4A
+        stream[65536..65599] = FAF43B81BC56F7E44BF5FD5F49581FC3
+                               51244ED84492382D28A591C022073350
+                               4F7B0267105D68566E9FCE5B52B7EC5F
+                               12A9131FACDC489279F8AA8E9E8E0A2A
+      stream[131008..131071] = 37C98A0BB719D5E166BF79AD35EBA109
+                               9560BFD07144560F4BB91C88B34C008D
+                               E7665BCA98D7B65562B57CED509684C2
+                               6AE9011D0A9D674F30E7F9DC37E680D1
+                  xor-digest = 7139AAF66BE2A8CF28852D9FEDDF47AE
+                               E1E229905F11F191AD60CDD2E1C9433F
+                               41F1D4BC92B10C8B988824C86B04100A
+                               EFF77A48980691C5636814E04F1A656E
+
+Test vectors -- set 5
+=====================
+
+Set 5, vector#  0:
+                         key = 00000000000000000000000000000000
+                          IV = 80000000000000000000000000000000
+               stream[0..63] = 337F8611C6ED615FC2E7D28C6DAAAF1B
+                               2382AE24592D1E61218220A3775F529A
+                               7F050B7D4262E3600940F167742FBE4C
+                               B0C147B3C0592523B890E76F59AFA3A8
+            stream[192..255] = 47B4B94D6032E42E28BA280B06863134
+                               0E65EF25AAE97BCFF5CA83096477B186
+                               352757FAF40E7DC007FAF51484B54651
+                               2B089A7BD3359258F3E8C0E3DE07C316
+            stream[256..319] = CAC4ED541686A3BA14A68CAE81C0B1D0
+                               D973129F8FD712F1E344CC7815614B23
+                               4412F351202D4FC7B622D905B8AC50D6
+                               59613FD8799443F89A8E403EB46F7492
+            stream[448..511] = 5C4ED1241AB7210EF543DC2732594AD5
+                               CC5A18AA3AB2CCB9B2BF17CAC28F6105
+                               1152291EB8674493A12C0B3CC2C7EE09
+                               F1A258C5E078080F5EA70F3F587BEC5A
+                  xor-digest = 4EF4B4DCF35FB72D210AE0546DD4A3FD
+                               9FE632736122E80559A32FC165E9166B
+                               59E2BB15A066307C88DD32611EC849E2
+                               A54DA4B47C5E52AC26375D2585EBE798
+
+Set 5, vector#  9:
+                         key = 00000000000000000000000000000000
+                          IV = 00400000000000000000000000000000
+               stream[0..63] = 982727CC7FECD8C15B09E6967B624366
+                               FC902BBFBF9C608B240626B735C6009B
+                               B6969A8D40EFD0546B056B181561034F
+                               B51A6D7C7BCB34447CF5CC560824BAA3
+            stream[192..255] = E8E61B734A6EC0DDCB4DF3248749B14B
+                               6CCCDADB8F24A090B7E5A49603C475AE
+                               8B6F8353E12FE7D8CB3EDA81E6DE9778
+                               2C52BDA59FCF4CFB2BBAB2D196E08C85
+            stream[256..319] = 06594AA97EDE3ABCD9458DEF29A7FEEE
+                               91965BACFA6A272B31BB644596DC5C66
+                               8F93AAF38F1EFA50D88A9517DFB4B409
+                               9E91F5A1B07C9CA8F36330840A6FCF76
+            stream[448..511] = 32784F6FB85DB3ECA696DD98D75A5031
+                               B3ACD087ABEB6489F20429EBBADF8D87
+                               B0D7C4D54A8A80FA835B5FCDB901CF32
+                               E60269C5DE89409A61ABAAB00B7D8B79
+                  xor-digest = D696A18B23B0927FCA5B766F8C19CE2D
+                               C98F40963485D0A77D92D0096334B9F3
+                               834491F8FB7C5D8BEC499F28A37B7DB3
+                               8E8A6291C1A6F73938B7AF2B74425996
+
+Set 5, vector# 18:
+                         key = 00000000000000000000000000000000
+                          IV = 00002000000000000000000000000000
+               stream[0..63] = B3EC726B0BD04F969BB34A0DFB1AF9A0
+                               880ED66663BC845BEC2CEA9BDDCB0E3C
+                               E6FD6CFE389D544D863AD6B55F45F4BB
+                               14BA866A72D63E4FA83246498EF685FE
+            stream[192..255] = 549E7B93702F139AA76FFF7CBB04EAD4
+                               C091015E6455A9855E3EBE4AB1A80737
+                               9E3E9C9418B909CC26E53470CD323FCD
+                               ECE6BAF53D45BA80C4F03A412FF160C6
+            stream[256..319] = 9599223B02F81DF5D31CE7FC6FD92D70
+                               71ADB8985B61709E6769EF5065905E46
+                               B0AE83DEF7EAEEF01A49D5D855035AF8
+                               6AC78AF9C14A3F8409773252EAC28D4D
+            stream[448..511] = 2C58AF08679A8AE28AF30688B33C417A
+                               392A6E8D6658D262EE24B479CBC4BA4A
+                               C5DCA537CCE7B110489817F9D2858D95
+                               E006D338BA92D7FD664F9CC773AB67D3
+                  xor-digest = E52013C82C2088C5B76988031F0A0930
+                               6322244F357700E3D3BDC71A2385B4BA
+                               F6894A2B177F7BA78D5935521CDB5689
+                               31F7706AE3413B10128CB903D7E27160
+
+Set 5, vector# 27:
+                         key = 00000000000000000000000000000000
+                          IV = 00000010000000000000000000000000
+               stream[0..63] = 6727DB24106CABD6C3A14001BC9E3B5F
+                               90A47B78181576CF5398D8F190CEFC10
+                               6615BDE30159225DD3E14A2F827DA07D
+                               C230D11AFEE96855EE06FB02D23998D9
+            stream[192..255] = 7B9AD4C2472D5816B963BC168F725083
+                               0E900C4E4994711DF7FA494A04A7CB58
+                               C9CAD5513E8C554B47060D9256B4F276
+                               2CD9790666A3C831FE1A9250C2C1F1B2
+            stream[256..319] = F8B0EF0C84EC8375A17C8C36B9F75690
+                               30D6D04687514709215F79B102304807
+                               3FA3F284155CD677B30FEDE6EE33DA7E
+                               5B35636C0F8E981AACF01CFA4E7B00C8
+            stream[448..511] = 023E93B9B5A526DA400CA8A818E506A9
+                               F5B0438F91264727C4FD5CA2FD4A845F
+                               3F2A6E0617A5619CCB0B691C2AE2F459
+                               A7F4764CFEBB22D8FC6AE8E28B08DD4E
+                  xor-digest = A6BB0A1FA9D79299B2FCD3AB9DFE04C7
+                               9BD7B88BB1A49AA7227E9BBD0A211677
+                               283EE5CF808DB24D05227305E67915E8
+                               74CB03402736AC8FFCD746B5AA4DD032
+
+Set 5, vector# 36:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000080000000000000000000000
+               stream[0..63] = 4BBA6A59AD3C1A7298CB38F244AEB7AB
+                               431AC1FEC2D091C4952794AAE9DA762B
+                               0873BEBD04FE1CD68D08654F1DFDD956
+                               59EF5E09238984D834F2631D67E16EB1
+            stream[192..255] = 945C61BFC21691064FDA05A6162869E6
+                               82800A1DB8E19818C2AB13A9280C8CCD
+                               BF9508894CCDE69ABC8A3F0CB2BA545D
+                               3A6D6E7D6E8B5E53683DC3E0018BE954
+            stream[256..319] = CD87390C68404079BCE794A554FC4DE9
+                               695AA78E626CF79094CF0374765C1ADF
+                               8C4054AD4B76535008F8466C806D1775
+                               1987361A852DB77F2CDDDDB34D00A15B
+            stream[448..511] = 319081F4D93C649E6D1D8C4999E0A03C
+                               F4AB23E4EB796B337C84898D6D9F083E
+                               70038515611FA040E686B893D89E28DB
+                               862C6D36F791F27EE05ED97AC636E836
+                  xor-digest = 1B86F56D5C6DDA97E2909873A042A48A
+                               C3C102D22F88E8648C0A7DAB5C34C98F
+                               CDF03CD03B6106095E3BA34969B67886
+                               8AB4D93CF24042F52DB659591D72D0C7
+
+Set 5, vector# 45:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000400000000000000000000
+               stream[0..63] = 2DD3C3CF5E6965EA02C31ED6FC539EEC
+                               E0B8D48345113E978230ACFE35089F9C
+                               D8EC821843DBC90E54010C16A8AEB245
+                               5881FC16B5CC21032958DAD18EF55469
+            stream[192..255] = B9299DC95D2F192F1C53FF23432158DC
+                               2746F64242CF9368D90FA217289BF31E
+                               6F08692251CCF86B2DEB7ADDD14D8E37
+                               0E4D877637A2D499924146D89CB77F44
+            stream[256..319] = A6F9EDFBA2E22CEF8E14BFE5B31ECD14
+                               4114A045BAAF0458BF149F073DF191E7
+                               022A9E518212876F7D6C99F1DDFACCD7
+                               8E0DE69FD43FFD26EBB7E240B5F4B864
+            stream[448..511] = AD29FD814401DB358AC8B2A911E743A7
+                               A594C9781D4F6560E29D8B67AB38D8E1
+                               67AC71AA3855D5BE67998E0B797A64BB
+                               1B26558FD861B845E9B08FA071DDCD75
+                  xor-digest = 2DE49729E28C8B4585BAFB291E77B7FA
+                               6CA9E489C437133EABC613D0893822FD
+                               70A8F88BF6A3D29BA6503F17F055A003
+                               A42605780A79501BB62C35C922DFB1C5
+
+Set 5, vector# 54:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000002000000000000000000
+               stream[0..63] = 8D3CF6CD521B43CF76A6ACA2A036B791
+                               7E06F44E8DE525306C6508C1FE2E3C29
+                               50A53F63B11B57596B76E97C1EB01612
+                               3D33B57CF93E839A169AC49207BB42A2
+            stream[192..255] = C009E0DECD6948B8F29A72F1A2BCAAFF
+                               04043B6B76B623CF977679D74186BB4A
+                               B1C3529D94A5DD5CCDC20AAEC056492E
+                               7B9F9A9EE087187C52C7651F890A0DBA
+            stream[256..319] = DF5DAAFC6D650B0A47AFDD7BEF56634D
+                               13AC2D1442AA1F082715882F9D303170
+                               8D338A7CFB14B100E3D3C645334C5D4C
+                               BA9534475D4BA687956B00E8EAB587AA
+            stream[448..511] = FB2CB04310DC73C7B7312C840123FB0A
+                               783F10FB63F507EEBB012E19A0FBEA30
+                               C324904C02E301F4CE2CC2A1198C0C14
+                               A725FAB705C5176CF19EB2184DF9825A
+                  xor-digest = 3B3136B100FF460D92A0FDEFE864662B
+                               324D7B8C7C3DAA46EBF02F8BD0960345
+                               A1FA8F9B7AB8DF16BC7FDF6B6AA0C61F
+                               FB1C7A599A6474A916A8BB9E4FAB9856
+
+Set 5, vector# 63:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000010000000000000000
+               stream[0..63] = CF1667BC6BF8ECCC72ED756D4623E979
+                               6A8E559E27ECE3DE4FD85DAA60757C33
+                               0C33EE95AFEE6A53D730671F695C0B04
+                               B5968DC2501F48D9A2DB7E20CCEEF297
+            stream[192..255] = BE8163A51FB1FD786E1E5197B5F3FA74
+                               900AE8111592D24733B562187D399B95
+                               79D5F751D722784832AA471C4445FA5E
+                               F2725E23A251EDAE66D60203CB862095
+            stream[256..319] = 8592AA7309D37B63AC539BE5B997AD26
+                               3F6C38DD169535E7BFB1C19965919F55
+                               F4502C5995FF7DEF3021D07A37B9E7C0
+                               FA5E8AD9AECF2B072EE1DE2F2E26DB1A
+            stream[448..511] = F05E64D5CF14CF99154EF83E27CFA2F9
+                               2B269E8E164F1B563F4AFC48C40B5FF8
+                               F40BFC7E59EF0F0B923F7474F30AC114
+                               95EBE3EE8630A214776286D01A20DA23
+                  xor-digest = 46136E7DE5C7186F1F3D04FAA100B991
+                               8FE7E8E02B36C72A92E5650F93F5D936
+                               5675B0D3BD84E5C3E7F5CA7E70ED55FD
+                               027C83E1CB1AF8BDBD1FF1905A6EB596
+
+Set 5, vector# 72:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000080000000000000
+               stream[0..63] = 583E7BA16D617DAD9F2A4A6A7BCB630E
+                               4248E8368A6F45F6BE8CF22C65964D34
+                               49A7AC0EDE8957127CDCCD3AFD666426
+                               B8BD2391698525CD3620558076F61EC5
+            stream[192..255] = 8CE8D0EAF9944E68D7EEA0F83ED86CBF
+                               F87B99C8D87C40FBDA48E777976FB669
+                               CF6A68533BA7875DAD0BCDEEDBD4D136
+                               DCA8A9C9C1C6B30C5CB7B7C5846755BE
+            stream[256..319] = 534AD0B12F8CD7797CAC9E23B1618AA1
+                               B707F28D000422CA73196498C86D51FD
+                               A63DFC791446094F4E146EA451F60B3B
+                               C2711F81B137FF4C0521F94447A486E7
+            stream[448..511] = 540F0CF1CAA5D5CA270FB71BE97FCF9F
+                               F1F30C2F454BA29561F7B7C2D8ABF189
+                               30D107F71560B26CB7E9E416F90604E8
+                               510D29FC0AAFD94EEF254F0F4C0C43C8
+                  xor-digest = 0986B6D195197767683FB8221A50BCA4
+                               A375BC5989C24422855F465CE537FDB3
+                               3894E7383CE580D8204694DD1E82D623
+                               774AD356957E36042735848BBA9649A8
+
+Set 5, vector# 81:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000400000000000
+               stream[0..63] = FF9484C54337D0F0CB2342A7E73B21E8
+                               BA933A679CAA5549AE6218B7E0FCC88F
+                               CEB6CF2158E19C1D30F4E0B0A2D5E052
+                               E4C73F2F2FF423417E67F49F45BEA7C2
+            stream[192..255] = 6AA4E5586B608D3F0E4A394AC7818949
+                               E538604293010925AB3D69AFCD1979C8
+                               A8289CC46776E762452246B54C6C7D3F
+                               E7BA43B8D901D2B55F2F7CE520DF99DB
+            stream[256..319] = AF841581E66BCB36AEEE07534A83B519
+                               60D0DE9740D320D1ED3C542B64FB122F
+                               506B6F573F40AF29A61DC42FE183EEB3
+                               A5D55D0272659028B9B5B353A6292105
+            stream[448..511] = 3E463ED75242C21811F9C2492A71D6B3
+                               E5B2BE3E50151A990F841EF0350259B6
+                               9C727194154288C62DF02075AEEB2598
+                               577A5C0B134EC1206F66AA96233D1BF0
+                  xor-digest = 0C45BDB39F8C038AC8E2E3C41A80FBF7
+                               7B74C948861E7D58F7A89ACCCB4A2D04
+                               7D370BD42B65DE42293C58BDFBC003EE
+                               58D71CA3D01313E8A74C7BEF66CAAC76
+
+Set 5, vector# 90:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000002000000000
+               stream[0..63] = 8C4921B72A3D11BE4DF4E326B9BF85C7
+                               351CF85FE98039D5BFDB889DC5721B17
+                               C02EFE07FACD2F43E95D6EC63F4001EC
+                               FE7355EB565B6E2CEAC64A995324DABC
+            stream[192..255] = 933FFDF78D118A083FB7CE405D042D3F
+                               9173B28879BF4A37A878EF2351622F42
+                               80D218DE417B8503954E991A31BDF73E
+                               B26903D1F7C7361F34D7F01656243B58
+            stream[256..319] = 88E77D9A5FA78C7E348DFE0A66AF1B92
+                               FF564670DCEC867E24AC78CAC005DAF1
+                               5953DEAEAF2C476C2DA514CF79A474DC
+                               D4E68AAA0D52394762953A8A63A0B3A1
+            stream[448..511] = 5FF4F24F6BC7585D16582944166C453D
+                               59A3CA9F9625A5946EE81F561CA183F4
+                               F6D5258F138E994DF848F532F613092E
+                               89FD262FA4899091596A1031913C6C5E
+                  xor-digest = 4770E4B7DB5C5FF7F64BAB6334A13E4F
+                               9DA6686EB2945463852513C770ED64DA
+                               4A0C3D96403F4CD1E96B7FA6495BE23E
+                               15506374CE556E7B50D3ED8A92A643E6
+
+Set 5, vector# 99:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000010000000
+               stream[0..63] = A59AA0661087A6F3498D18BA156FD4EC
+                               E5709F5CF1FF25B006382B250E4481FD
+                               050F68B95D56E1EAF77C619914F30269
+                               4FC8C2461200D9AD357F21E9DA08F489
+            stream[192..255] = 941E849E313B8E214DD6CD1C10FD8D18
+                               05C1892B15623CE0724A3028F978215F
+                               7B6264D4D5CBBEFE12920BCCFD204134
+                               1AF60D460B73D9493BA2AE7B314CAA41
+            stream[256..319] = 2F27FA6FC61D2D84C008DE836B0CDB1A
+                               EB0E62D5E327F88B8A62BFBE70789189
+                               9E1335D20E495D2181253647B0333CA6
+                               6833552B89571E3BC25190C791341940
+            stream[448..511] = 9DACDBDBC8258B52C41788ABA3A7D08E
+                               5D7919C0B583F6AE89036A4EBFFB3AC9
+                               7CD9E9B15E8C811EB6F2BDC7713115A4
+                               5291C4BCA5DE179ECC779093B30870A0
+                  xor-digest = 2C7C5D79F8BC2D8E7B62DCE74340120A
+                               EAEFEA33114403A970F1A51AD9EC9F9F
+                               63F630E74DD83AE5C6824089982685E4
+                               28FF20C49689DAA995D7AF2E80502425
+
+Set 5, vector#108:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000080000
+               stream[0..63] = 869923A0917A8FBD8F45FF074E83FA79
+                               D665A9A44C769CC200A66C254B2D4B98
+                               7D34D66E52EF7A9C7ABFDD7548F08631
+                               49C7CE742F6CA599ECD0BFEB55CC8B6A
+            stream[192..255] = 75386882B941CDA70FDB6D02F165B3C3
+                               B0C7B0A8E4ECB161BBC745EA1AFBF382
+                               C0C09725D0DAE6316C7B956577EE7F97
+                               C4A102B04437F24D2090FDB00B78523F
+            stream[256..319] = 04FBECD2FDE606BC32E46FD0B9950F93
+                               A742DC2534886A3B17C8EEC5CDD28B04
+                               5A03E7C5764EC92C1DC8AAC5F9D5483E
+                               A9890C7322739BC7C73CF8158619F669
+            stream[448..511] = FC322AC5E5635C8DC56895BAFD43A01D
+                               77807CC8CE57DAA306E7DDCC58B24309
+                               4497AFBA51F8EA62922C697FC2EE8945
+                               4926D4975219A40B2D6C9A9620634741
+                  xor-digest = D2E239BDF9A2E04082567893D06DCFB0
+                               4FE50753793F21380F6A91354836C508
+                               837A15527F914190F6F97BA87510180D
+                               67B13994803013B2E4D4A307D80E8EC0
+
+Set 5, vector#117:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000400
+               stream[0..63] = F350AB2F8E1B96AC93F1FAAED04BFB0A
+                               59EC1F7B95383E44878AFFBC5CA7D4AF
+                               2EE76CEFB67906469C9FAA59F4DDD24E
+                               D16796DCAE66011584E8A4B139E016ED
+            stream[192..255] = 48D1D8F4583937C77BDC1757C3DFF07F
+                               D0CD430F3667E37A6D4CE89217729AA5
+                               E480DEF30227A363C800A3153617B04B
+                               50322B06B795B0EEEA039A796C7B6664
+            stream[256..319] = 4DE5C06008FBF0D54EE2E2052AF4EFB1
+                               94AEE33EE7F133F225CDCF2C504AD2AE
+                               AFBB2A2AC50D7F27022DA8D83D6B44F8
+                               4545E8BD15E33CE531C3A7E076B39BED
+            stream[448..511] = 837C91FB8773A4DE4FE79D163FFBD186
+                               2A361B96D79AADDE5AE964A62B3D9CCD
+                               1DDF29D845EB581C33E3ECF1CAC4AE15
+                               3C75E0C5ABAA960389FF0C92205CF575
+                  xor-digest = 29B708C591EA72969C5EAF624B943D55
+                               3A55CD66F13E5E762D6808F5A58D77E8
+                               8CE91C0A7EABDEE8F30C05F4D48C0257
+                               9B38612376DB9E26AE70591760E395AB
+
+Set 5, vector#126:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000002
+               stream[0..63] = 073CD91D0183F07259608257E8267FA7
+                               8799B748A5FEDA25FD40B463F15639E4
+                               CBA06A504C5D4E80A542366DDFDA8EEE
+                               B21BE97CC2FFDFD5FC93792A7CF1C2F7
+            stream[192..255] = D310A845416E7E187D3404B763B46BFA
+                               7EB62B04A06DFD0AC6E9871EB8D74F32
+                               73D7488C8D2197515DBF84ED8EBD3F24
+                               A4B3B69DABB27A3CDA6DEECF2F58EEB7
+            stream[256..319] = A8058C140D6692480614EAEE7AD97DA5
+                               F4423B249C2F0413DF35530CDC40417D
+                               FA6D5007FB9488A073F0631AEC501E15
+                               A94EEF50A2744693EDF07273C5621056
+            stream[448..511] = 44220A7B36E147C5C3F41FD72FD88F50
+                               ECCC2364563085D3409C5508DEE719CE
+                               327EBEEF70917036C37A534B764A4DBB
+                               39B77EDE8C115448096C7E2BF2EC6720
+                  xor-digest = 07C9AF7BD2DBDE982D011798BCF014FE
+                               F9334DAF537AF14589BF2328C45D327A
+                               755F902A389BE04970AF515D5718C891
+                               A77AA50A46D1DD737489E298182BA245
+
+Test vectors -- set 6
+=====================
+
+Set 6, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                          IV = 0D74DB42A91077DE45AC137AE148AF16
+               stream[0..63] = 2E1ED12A8551C05AF41FF39D8F9DF933
+                               122B5235D48FC2A6F20037E69BDBBCE8
+                               05782EFC16C455A4B3FF06142317535E
+                               F876104C32445138CB26EBC2F88A684C
+        stream[65472..65535] = 1D92C4EBF6A256F0D0B0365160D72E90
+                               CA10D7086C58BE13E9325A5088F447D1
+                               572466248CD275A736B83674739899CA
+                               3146963E00E170C6B9DC8B2BE912A5C2
+        stream[65536..65599] = 878A21CA440BA0D659F24A5C986D6CF0
+                               3EA0DD962337935BA0932FAD9599EF61
+                               D805800038AFE4208394C73AA044262C
+                               18490F742A2B7424ED56EF3D1B0F53AF
+      stream[131008..131071] = 99387AFF42EE8C9D4D8400808322114C
+                               F4DF77CDAA363B0E4AFD0D8FF17D3D2C
+                               3303984867021922368A76F7CBD20266
+                               5A962140C8E6C1336CC4071B38ABB957
+                  xor-digest = 0FF8DA8AE74C2F194FE35FEA66F69380
+                               BF1D368CC0282F6E570477EB426F1858
+                               204DD9752E48E32C1F40A2ED3BE10FF6
+                               B5C80216884D0357AFA002E01B7B5FE8
+
+Set 6, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                          IV = 167DE44BB21980E74EB51C83EA51B81F
+               stream[0..63] = 4F864BF3C96D0363B1903F0739189138
+                               F6ED2BC0AF583FEEA0CEA66BA7E06E63
+                               FB28BF8B3CA0031D24ABB511C57DD17B
+                               FC2861C32400072CB680DF2E58A5CECC
+        stream[65472..65535] = A27D9CFEEBB098C44E94F477A5AA9FB6
+                               286339533CF62E2781B574B9CCC53619
+                               CA27303E83FF9D986EFDB5D0AECC93C2
+                               F249325A37779D894549C0408B6A47E1
+        stream[65536..65599] = 36893EF2C9173CABEA2B5BB027938EA6
+                               0004121DDD27E79DB469B6402B4C23AB
+                               C08066B24EF0242234F9439019DADF4D
+                               000A8B68FD539F2B6C8087AAF89C76C6
+      stream[131008..131071] = 8FD0EB93722FCD5093AD826167F0F158
+                               E2A7B86751E85D796D5269866FD317B9
+                               523032CBB52F6978DC7E0933A2312E40
+                               57E0C9B1366C98941867D2EB0CD8CAF9
+                  xor-digest = 63DCDFC74EE1C446705C01CF185C7F23
+                               E083DDD7A70E2685DC1E051F2AAC63EC
+                               7E64399369B7D1CE49A732F594B6A587
+                               3B89E848F70A3AA9B04D219BAF14807F
+
+Set 6, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                          IV = 1F86ED54BB2289F057BE258CF35AC128
+               stream[0..63] = 82168AB0023B79AAF1E6B4D823855E14
+                               A7084378036A951B1CFEF35173875ED8
+                               6CB66AB8410491A08582BE40080C3102
+                               193BA567F9E95D096C3CC60927DD7901
+        stream[65472..65535] = 2A30BFDE279B750D56B0B10A79BDA0DB
+                               21C246D133F4B91E4ECAF80DA7AAC425
+                               646523F6BB762D688BFE2DB1852B77E7
+                               733BC1005CF3D7CFAEC4BD966DCA6773
+        stream[65536..65599] = 991EC57DE1BDFFE2C70A0196A8902C91
+                               D3CE6C63E4B8D81C83AABE7BF370D1B5
+                               4D0B72B0C3C857621A7BBE2B72EBD81F
+                               50B25E08A9D492AFDDD37B983E9E2E4A
+      stream[131008..131071] = BC301B9FD7C554C592EFD092A435C2C6
+                               E74CBBF905CE424FE5872EEFE8DC62BF
+                               F93C3917BD37D142CFCA623B84C2652E
+                               0E61BB5C5D5387AD95EBA7A5ADF16F81
+                  xor-digest = F8F5AA473428C00F7F71E4D1BF1976DC
+                               2856619D2E1CD79BDE2FA1FCE880E816
+                               09B8D5AC28691FB90718E0981C3BB2BF
+                               A7E5888E44A0FEDAE7D481AA3AA684AA
+
+Set 6, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                          IV = 288FF65DC42B92F960C72E95FC63CA31
+               stream[0..63] = 1CD8AEDDFE52E217E835D0B7E84E2922
+                               D04B1ADBCA53C4522B1AA604C42856A9
+                               0AF83E2614BCE65C0AECABDD8975B557
+                               00D6A26D52FFF0888DA38F1DE20B77B7
+        stream[65472..65535] = BB599F93F4F244D717CA9818212B06D5
+                               6D99AD4CA1F78725DBA89EA1D1F05B27
+                               093A17D745396D8CFD0256CD50674046
+                               13108E2200A8F1C49075B376A7460515
+        stream[65536..65599] = 996C074A7C7C524F539037A8A9F3D193
+                               3BC311B548BD567F8AE1B4325C51C5F3
+                               4B0DE1B4A4651829108CA92AE23D57C7
+                               0EAFA766097DB0539BE77E6500703746
+      stream[131008..131071] = 43EF1ADFE8265C46FF7FBA43B78F899F
+                               22C3B9F069B786982145D601627CDC49
+                               2D27BB8D70FF6DA908F2606A0C44690C
+                               8502F9CFB3BD6CBFC9205470E3ABA387
+                  xor-digest = B097BF56D79F1A343F61F7B66AC405AA
+                               6242493ECECBA06876276B36ABDDBFC3
+                               76D8C370503A8B8FF6D121D2FFC4959C
+                               6A96721616782688FFCBC748C9A168A1
+
+
+
+End of test vectors
diff --git a/crypto/test/data/hc256/hc256/ecrypt_HC-256_128K_128IV.txt b/crypto/test/data/hc256/hc256/ecrypt_HC-256_128K_128IV.txt
new file mode 100644
index 000000000..6460df61f
--- /dev/null
+++ b/crypto/test/data/hc256/hc256/ecrypt_HC-256_128K_128IV.txt
@@ -0,0 +1,2337 @@
+********************************************************************************
+*                          ECRYPT Stream Cipher Project                        *
+********************************************************************************
+
+Primitive Name: HC-256
+======================
+Profile: S3___
+Key size: 128 bits
+IV size: 128 bits
+
+Test vectors -- set 1
+=====================
+
+(stream is generated by encrypting 512 zero bytes)
+
+Set 1, vector#  0:
+                         key = 80000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F1B055D7BF34DE7E524D23B5556B743A
+                               EAF06AE9076FD2F48389039C4B24C38D
+                               DFC3AC63A148755FB3CF0CB8FB1EDEEA
+                               63CD484036FFAC3F5F99FC7A10335060
+            stream[192..255] = 2541F0EDA5633B4F47C6B74CDCC612AE
+                               CD27E46B2C8FC9036A09C6FFB5891168
+                               7A8FAEDC225E34C45B6E081EF5279FE7
+                               3271CED417549740EAEC6616C2B6A57F
+            stream[256..319] = 0C8C0567803E2537804BFA15742D3E08
+                               A29985688DF3D6B4C3044464C1D1F2CD
+                               4CBBC470C9A0FB05665CDED63C58E466
+                               896F80ACC020F134CB622487D40E0AF8
+            stream[448..511] = 1FD448C788A21BD30D4B6BC5D8AEF296
+                               2772940557B9434E0FAF636D576B0737
+                               1FF3AC12884BB431F396CF7C189D9AAE
+                               D42797128CE645FE841A4CAABA429324
+                  xor-digest = A3F66A36C20A496A0D4D537B6106662A
+                               DEB5AE1E35FD1486EAB6039F443E5D8A
+                               C6A2D4A2C2E2A9F335E2E468AD8BA51E
+                               550E41533332E6929EC18CE35BBF741A
+
+Set 1, vector#  9:
+                         key = 00400000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 9244D2B190FE8C4BD0E17247C4F1D282
+                               3FECA8DBE546637E34BCA99236D09F79
+                               5A8905A1E0FA94E6C51F7DC0C90FFAE1
+                               A8EBD4C99CC96FB3252DE0A0FB03F971
+            stream[192..255] = BC0ADD787A5EA52E28B45192399DDDE5
+                               CEC4E283181408E554FC714586FB641E
+                               B36F3727358BDD8223B5ADC9B9EF1044
+                               0F7CD97FCF2ABA75AA9972B277CD6656
+            stream[256..319] = C9F6315DA3CBAE23D32685C5549274E6
+                               9C17FB2E46746C5D3260FF2E00FB234A
+                               A460776CB0E7AC3AF0D297825C1796AC
+                               0B689DB219443BF4C0D4D19CD70A49E5
+            stream[448..511] = FBFDF6D40BF2DA0EBB04D52C117E9EBD
+                               6FEF88D39B8EF8B31082EE9B19D50219
+                               183DC962391FA4F602A2510BB476EF4A
+                               A44439F61D589933A1F3F633C96E56FA
+                  xor-digest = 49B435E6FA51A0AF8DC94CF1DE09F8D9
+                               AD76E08C061B54CCD62EF98ABE85969F
+                               3FC41DB934AF9DBC5F32748623639D3E
+                               B15124F13DA8B008CA5016ED61917563
+
+Set 1, vector# 18:
+                         key = 00002000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 9D74BE686C2DE8B207E8D82E49236A3D
+                               E86F5A7EE231B4239080FC9A55FA44ED
+                               7737FA7472B318A4F36FB788E863247F
+                               7067C20DCA632FF051789E9EB99CF409
+            stream[192..255] = 4876774DBB886B72E54EE8160D8BA8DF
+                               6DB032B2A9BA0B79CF82426CEADE421F
+                               EF5ABE9976E909DBADA0442FFC7BBA2B
+                               009F7240941F0C209853A514B0BE9062
+            stream[256..319] = F2499CCE5D3268F4C5515C365D2F4411
+                               B0AA99ED01E7D5328BF0672584AC65CB
+                               E47BCA14C3EB1F838ABDB7C611677BC3
+                               7382E84D05848B9838A166A42E96B016
+            stream[448..511] = C855EF5D1CC991D2DDC892AD8319E39B
+                               734E43E443F5910D03BB79CCEBE70569
+                               F92BBC63363943BEF88BFA5809B3759E
+                               6BA4ECA1FAAC572228458A229DD5BA06
+                  xor-digest = F125B88E0B5F143B836AFD7AC822E027
+                               FF44B736E32627D90FA05F3DB98576E1
+                               9EC41AAF9D61ADE2BF00E38CA4EC2A54
+                               49EE0655FEAE777D67EE127E8A5F8CD8
+
+Set 1, vector# 27:
+                         key = 00000010000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CC447BF1B5D138025BEA2B269E625C4A
+                               D4451F3851F04F118499040C6E564E38
+                               5C5FE17FA7AFAE9FA559CA4835AC1F40
+                               1C045AD439B400BB41984DFE7E4D4CC4
+            stream[192..255] = EEC14B65E027BC2A96E566BB89218A89
+                               31C4AE0BA5C444929EF852EF7E400AC5
+                               D8B3CFC62DEBBC2B20A7B32E350E3839
+                               2953B7839AACC06B2018280770F84B65
+            stream[256..319] = 8870B4F9A62B37A1929973D3975D7ED0
+                               505AA43002B14B55A541EAE00148651A
+                               111D6E5A1581F85FFBC2304783EBF5AC
+                               E924CD8111056B1069F13100DE15EB13
+            stream[448..511] = 1513F3B7A2458674CBA2B566F3AD6169
+                               2BA4EE30687A07AF2FD0D340D92384F5
+                               F5BFD9B8DF2F7098A209C280F6D5AEFF
+                               BC07D167720DB47B4B649C8593E6F40C
+                  xor-digest = FB5EE30BAE44FDFDF105796FB8A66F69
+                               64D502230C191FF9AAF5A4447533D02F
+                               05A3772B99F9FA2A075DBB8BA59D8D5F
+                               F819784D487C305280DF2F19EEA8BD47
+
+Set 1, vector# 36:
+                         key = 00000000080000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 831F1DAB278C6226785209C0AD34759B
+                               9F205B7BC6B987DD145B949336A8FA0E
+                               4550BC1737DAE7DD7D12E2C062BF9693
+                               F08C2FB808A1F0A5887A06B93D132BBC
+            stream[192..255] = 76631E9D4A673D09B9769251433D5EFF
+                               3114AA59E1A9B7E21B4123DE3E34FBF8
+                               4ED6E80EC29B4F75B53A63902C373EB3
+                               D644B8823789743CA407FFEBA4A1AA75
+            stream[256..319] = ABD84B2A5479CDBC5587FB9EEC5DC661
+                               5A3CC6136314F67AD2C96803E8E4BE92
+                               E33DC35F0DBF3C401AA5D7A9F46E54CA
+                               A7ECD68E561BC08E6A5B847A82777E4B
+            stream[448..511] = 9ED1D44510201727B2E92B55DBE06BA1
+                               46762AB34937364B2157292CE68B9D78
+                               3D3C3FFD1FDCA836E4C4FEC750B10668
+                               600C26AC05B4DED64F8CC2EAA0D22052
+                  xor-digest = 843D7B97B3316595111DCBDE3DC13DA4
+                               C14402936D68035CDAF9A1C168120B34
+                               0EBA1FC47E957C5F69F369B4C2ADC4AE
+                               37E743226D72A9F122EC8E00BCAAA126
+
+Set 1, vector# 45:
+                         key = 00000000000400000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = D2D629E84843638274ACB79FA257DD9C
+                               D48A08B823DC9F175CD92C5236B9D230
+                               5931FDEC5A8F531B1ADF30DE0527AD2D
+                               0D2B253D008913558E0FECCA7D7BEA4F
+            stream[192..255] = 6F9322E84D69CFD6A1E589283CD028D1
+                               E2A114B719FB2E18E732B97629313772
+                               CD2F2F8AF77EDB5B4360E4B679441346
+                               03C59E88C042713C3E403E5D93F9BBC2
+            stream[256..319] = EE7BED6C85B20E0A39C103D0B6949F4F
+                               5F6FE0DF2BCE315CCCEF6E537C488525
+                               BFC27FD249A6D36548C558153661861A
+                               78422A563166BBD0D72D6D7876FB4DB4
+            stream[448..511] = D2CFFCD4185EB1D8E15B629225B9C278
+                               6E7BFEACBFE29D7AF396B3D5917A8038
+                               7263018C7E98F49A1D5FA4B64B8E2AA0
+                               7192ADE0376388E8295AE5B54CC51389
+                  xor-digest = A26BEFF2FD72BE47175C1B6F3D749CEB
+                               0E3472FB0FD5E173DE66A5BB60357565
+                               505E3AA44A67651DCA75DFB6F0AFCFE3
+                               F4C89F064FC42D7C2953694B0CD47832
+
+Set 1, vector# 54:
+                         key = 00000000000002000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DD1649517BE76EFF747658F0ACF5D354
+                               2C7FFD52F09FF7DDDFBC48487450607B
+                               CB90ACC3406D0302E84450FC0BFEC660
+                               9BD44C7FFF670D69C9B19FA50C62EBE3
+            stream[192..255] = EEACF8ABD7D48E285A6658C255A6196B
+                               66B091773A9F81807A119DC24023D5C9
+                               041AF75F2C078C5246BC5F50B622A678
+                               64EB7A07DA6A8764437E20C7E1E0E579
+            stream[256..319] = BF55E777AC644A0938D438FA374360ED
+                               F842BECB027FA3A0F364B9150FFBEB47
+                               09FE2D2056A6CD5A7076172152484BEF
+                               A86EC7DDE657307580BC6F9ACEDA4C73
+            stream[448..511] = AB4CF968EC00E7F08553A10270A7D439
+                               68B0BC79C2DAE278AF1CB81FD516CCA6
+                               F5B8A47271FAAC3223F02DB4D0D5945F
+                               9C13A47906B03B80878CB0596D37CC47
+                  xor-digest = 76ADECA36B9401DDD5CBDEE821B70FD6
+                               65EB9CDB1E3F25C0BE90DEC49C03A9CF
+                               4049CD34F9550B28E0187B0AD47D86D4
+                               88DE4617EDB5F03C67FA2E7B9D20AA25
+
+Set 1, vector# 63:
+                         key = 00000000000000010000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C0CEF6E3CA9F0D523587FF47973FE896
+                               9FEB08773E3C694FBAC4804B37121B31
+                               06B99ECC2A08603EBA72EB3DC650E8F3
+                               462119F4685EF4CEA18D5765A6F22765
+            stream[192..255] = 79E92E248BA61D72C610876D3078F1CC
+                               CAD662F2423E7EECA813133136A64E54
+                               A1B6A151BECD2B815EAD959DE8E8DC62
+                               8F388D366103296A058CF60F525D6467
+            stream[256..319] = 03BD62A0892D939C1C28C4EB490F87B2
+                               527536AD6790AAA6C3CC50013E2BB883
+                               5710EAB7916FD89896B7983B326AE271
+                               AF9ECF975CDBBB968D076685BAA3343D
+            stream[448..511] = 98762E306A2B9D488FFB671D3975551E
+                               A06A6CFC5DB719B888E3164387EC922F
+                               12BC31A8DCAB8AC0CD6E12212CDA3B13
+                               4CF7F870221D6CDAC2B222AF4FD93DEE
+                  xor-digest = 606FA49585621E34BCC3748C06B51FE5
+                               A8AF320BFB83A4D1D3AEC6373519B28F
+                               2048A975732BA8DEBDFC5F85B84E7C3A
+                               EC0FCC9B1FA9EBB9D79D6B18BA2D70B7
+
+Set 1, vector# 72:
+                         key = 00000000000000000080000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 33A81D48866B04388451BC2730A2980B
+                               5F5BE248369911340E6C024A1F94D4FE
+                               ACFB246F7C0B9E27A40772D68DB36DE1
+                               7E87AEF19C8A68854A46B3F654E0AEC8
+            stream[192..255] = F67C60413B25FF7CB8647D1E9C361696
+                               3B23ECE23A9DBFEC644E855AEC5212F2
+                               D336E6F074EEC8FF5F8D4FC6398AEB9D
+                               BCAF6C29FDFE6E69A03D906C527FB0B5
+            stream[256..319] = 263D512137BAB758F646C71058D02B20
+                               3920965D84E52A99B50FFE79305E491C
+                               E0D61EF71F7A07937CEC8590B758F63E
+                               B3EB5890E8678F170C2E95B827FD8DDE
+            stream[448..511] = 023AD00A87D3D9441D4E8CB603F5CDDD
+                               AE8F3EBFEFB9C5435B72B9B8D03ACDF1
+                               E4A0FB796FF8401854998015905B878C
+                               99B3EDC7DD33A86AD4EA6AD208440C5D
+                  xor-digest = 5DAC8E3446BB3B0DCFB3F0A3A3E788C6
+                               07FA7436C63BF7AC9FAFCF4A231AFAC7
+                               75A3A810EA0FD4E5E6A5B8FE5D165A80
+                               798A9F58EE1AD27016E867D2E774507A
+
+Set 1, vector# 81:
+                         key = 00000000000000000000400000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B33EA681CA88C80EAD8F2D57C87EA42B
+                               742550FF8AD2B01BDF945BF160AF763B
+                               15D6B3BD92E6CF3E6A2B61A7D4BB94AC
+                               E3DAB365E4EA50EBFD2654E60CE849BE
+            stream[192..255] = E97318BDF61934188A94BCFB4441809D
+                               36C37D1A43BDBB3EB06FFE143B6153FE
+                               C8453A13387923F434CFC7AAF8CBA097
+                               7D796DE95EEFED3B2126B611F477619F
+            stream[256..319] = 4183971367E71731111D2212520306E1
+                               1CBEB05BE6FDB338414C826A8E359C7E
+                               CC680F317C12C6EDE6B443E68B4767AB
+                               4190E95E1AE4E4FFE61707BE742775C1
+            stream[448..511] = 56841724B7D7F95809456EDC1D3A532F
+                               E1C6BA252017DA90EEC71FEE9A639A89
+                               4CB7E1575494BC8B44FE4C5DAF90FF4C
+                               A32E03D6399BCB3D9D25B62764A4977D
+                  xor-digest = 3E80587D70A53AFFB96A62F6493B9BE0
+                               1C25339CBFF7784F5100A7922EE3E6B9
+                               9D17B026C0EE69C5383F63E0E5AEE9DB
+                               5814E2C526192AEFE17004AAA1996280
+
+Set 1, vector# 90:
+                         key = 00000000000000000000002000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 51A7510726D12FE9574095633A3710E6
+                               3EB8196622BC808B8A18800E208648C9
+                               F7031F8171B71F37613753A5E49B37C1
+                               CBC7933A52CAD48601E91CA198EC19EB
+            stream[192..255] = 286EF1C4F74C993A7D783E86527CDFE5
+                               213CE4DF7EC72544685291D8108C7621
+                               50D488AEF761D819781814F4501553CC
+                               B45EDDA85828C33C4D0608169AD20B2A
+            stream[256..319] = 89DF5C916612EF0ACC1035EB75752239
+                               ADE08E0D63B622EA52CC997DC8178C4C
+                               4E57951FC8C6659A225E88502742B888
+                               1F300FC9F278AA3D9C1063A83CF33C44
+            stream[448..511] = B2DE3AE2941AFBDB21D80ABB0EB852D3
+                               A076D98C696F886C302D96D6AD226CA3
+                               7B3213B3E641632B728A0AC7131B74FE
+                               F733D1B18666D36A02C148FC98AD2E89
+                  xor-digest = 01090125BA6C43AAA3910B650D046F37
+                               E04896E9D2BC276D969A10C1B26FAD48
+                               8A2CA5E59044ADDF698588A561557669
+                               A4EF25E1BB85C0A9D63F69FBB2924F83
+
+Set 1, vector# 99:
+                         key = 00000000000000000000000010000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 545E2C75365948B40FFF042EB6919907
+                               6E63EE636CB343C51AF6C17BA24E1BF5
+                               C045B0893B8CBDF6A4068F8574513676
+                               80000B10BA11666A546D8DC75374F5BB
+            stream[192..255] = 9805DCB5596FADF01224553F3A8DCC5C
+                               909D1A5EC2C29BA0DB86A46ABF70BAF4
+                               4A171739309A923428EA7BA8EFCA5CB0
+                               B0B8A5EFE9A4A39BE0EA6CEA782DD862
+            stream[256..319] = 531EE320A584EE1E4E0701400F86DC29
+                               69531C2BB1BC922CFA9E0919A05B84C2
+                               46495A7C358015724B62A986220DFA17
+                               6BF39FE4263A9D27D93F3737CC1D5C59
+            stream[448..511] = 92CC0D63772783AF62E642A5849CE7AF
+                               4D21EC815D644F88887242F4F5F7E1DC
+                               55E241D72691ED50D59CB3E2FE68A856
+                               7696F8B8E3099642D70EC3945B8BA656
+                  xor-digest = 855CFA62E449250845472BCE9453BA45
+                               F91601ABA6BB715B079D407E05D94CF5
+                               93B5A1E2C12C04C78AB719339AFC11C5
+                               213E17ED9DC2B0B9CCF751E0613D4F2C
+
+Set 1, vector#108:
+                         key = 00000000000000000000000000080000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F9748DADA2741A7CA30EFA167ED09978
+                               71619682AB68CB400A74BFD642180CC7
+                               F3499CE2CC86AB7727786DD01AB8D08E
+                               8774C5A3CFB4738FF1E3243DECF720FD
+            stream[192..255] = 5AA20B305F5D6363180CDCD4E16427E7
+                               2E3DFD73D2C4E2498008F6E0FA9CE3BB
+                               D751F6EB8DD5F48EB42B994688601E3D
+                               2CEB3DE19BF16C4BD7FD4B331FC93473
+            stream[256..319] = 81E3D9BB421CB09A9139534C6E430668
+                               FCFCB87E48CFA085D4FA1AB316CD5AB6
+                               35294E434852C1509C1023A85B26622C
+                               68BE19944CA3233A4D3272710A791E3D
+            stream[448..511] = A499D228204BC22C32047DF550E2CCC0
+                               260ECB7BA32E8F5CBA2C1D9A09D1F38D
+                               FB30815BA3C9A8D3243CFE7AC4A14B1A
+                               D6AA67D3EC0A5CB617FAD57E41A2A0DF
+                  xor-digest = 0324B7F1BD990F8DBF19C021CCDF741A
+                               1B4A9C3C3940CC59CD715F0B2CC31C08
+                               82E5B93721AC98B00F7B45FCCF19FFA9
+                               782B7D7FC048F0756A29B066B472B394
+
+Set 1, vector#117:
+                         key = 00000000000000000000000000000400
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 7EA95775329E2D1163E30F429FECAEF4
+                               CA177BB4D3C4D1AEFA6B5A01904266F7
+                               7D7B7243B9DB1490245EC05129CA2DBE
+                               E3A98885DAD0B43B0E725DDA39B444EB
+            stream[192..255] = 78ED15A7B4A8151F384C740B844115CF
+                               D4FA31F9BC16E22158B0F896E70C0F73
+                               F74AA5EF024F6B386ED71239CBD57996
+                               4583C37104AD8C7E5C812C378AF00F98
+            stream[256..319] = 292FF21E49659AF99AB21753BA2A2B28
+                               25DDB156D4F7AFC1888FBE8376AE4C6B
+                               905D5916121E9F9D76C83FB146ADA735
+                               2AAAB6E89CE9398C484D69D1A33F0C97
+            stream[448..511] = A50FF5FC20C57F8297C9CE2599A3E6CE
+                               3193746E8C45FD9AECA0C5A0FB3BF70F
+                               5981B5BA8D2FA57677EF65B535FC3E65
+                               405BECF0A508445E36A7B6DE2BB56106
+                  xor-digest = D9650FA5D128620134828E1C99D9678C
+                               CFD5BDFADC46A5E79D47AC5967B8A1CF
+                               32F7DB65B949C88CCEE0D96D960A110E
+                               FF1D09EF5549B88D5B53ED46D4C2F296
+
+Set 1, vector#126:
+                         key = 00000000000000000000000000000002
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 25874CF64ABA4536844F815F486F9DEF
+                               927E325CFF2FAC48134A4D30824C5BF1
+                               EC75F8FEFC624AFCC717BF2C8EAAE374
+                               0AF399C2653389DBE31F9FF5D451D362
+            stream[192..255] = B151A1EDCCB8B4A3CA9BC98F19EFE637
+                               BE2D6A97A8F794091E7FFF06E7B4E574
+                               46B81E8C787BB77E461592160C44B5AB
+                               49329142D01A1CD5CFC6681F93DF1E33
+            stream[256..319] = 29B2B0C04E07D33EC3146E60AA305F0C
+                               2288913B55DDC18FC17EE836B39193DB
+                               87089DF2BAC4185A57E910331864E25B
+                               540BBC968099900F7BF18645A28A419B
+            stream[448..511] = 286FCC98B40EA26BFCBE5CDEE52B30F5
+                               810CFB26E756C628B56B3B5ACDA49E07
+                               192592CA2241C6C5193221EDA36CB0E7
+                               B5C3132F08087DF0673D3101FC559962
+                  xor-digest = DBF1D7E0AC062FE6BA9834F0AE41ABA2
+                               B28B41FDFEF914F070007B0A48EE9D9F
+                               E69DB8395BECDBA7B545201318177A49
+                               7D343A317B5A37A9DF98DD25C84DF948
+
+Test vectors -- set 2
+=====================
+
+Set 2, vector#  0:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 5B078985D8F6F30D42C5C02FA6B67951
+                               53F06534801F89F24E74248B720B4818
+                               CD9227ECEBCF4DBF8DBF6977E4AE14FA
+                               E8504C7BC8A9F3EA6C0106F5327E6981
+            stream[192..255] = 30DA9453A90909A5675D6B691CB0990F
+                               C423CDD8222EB47245BBB67BCA2B9C10
+                               8D1F016DF0CF8CEAF6829910916DBC1E
+                               113D11E91BEC3D85C47E3042EC865658
+            stream[256..319] = CAFED71B892EDBE13388CEF6A3365797
+                               E0D88C0D3A5B91BE4CBAF5162F69558F
+                               DBB45CA6F8C8D4C371D62736EC244584
+                               60131F54854F3EC804AA9A38E6ADE281
+            stream[448..511] = 531A0ED5D2A51DDC6499FE1BB6E2295F
+                               2C3EA0F56AF46ED93DFAA4E16F5F0831
+                               2D77BD0E9122043CD6A202CBA9351F6A
+                               0E8E6263F4017355136A0C551E6FD0F8
+                  xor-digest = 023D719F61C193E4CCD87755C87F9604
+                               C5A29DD7E31637B3DD70D43441D48CC7
+                               D474013C85EEAB1897C80ED0A0272543
+                               F951C72E3954616CB5D6B51FC24F4B0F
+
+Set 2, vector#  9:
+                         key = 09090909090909090909090909090909
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F5C2926651AEED9AF1A9C2F04C03D081
+                               2145B56AEA46EB283A25A4C9E3D8BEB4
+                               821B418F06F2B9DCDF1A85AB8C02CD14
+                               62E1BBCAEC9AB0E99AA6AFF918BA627C
+            stream[192..255] = 3B3C6E78A8F381EE2C159FAE1C487C58
+                               11FA9BB02CECF7440239FBB0497347EF
+                               D8F1A8AA71AFC70ECCD64E81388E6E87
+                               9521C2B47AD84F9CFD9E240D8D2F3001
+            stream[256..319] = DB04FD01BC18D91E2D31237AD0FE26AD
+                               3C8D6A2EFDAA9CC11BFCC61D94F6104A
+                               4091B3634FA57AB0AB9B209F22DA5529
+                               75C3C322DEBE4AE68623BFE1B2BB7F0A
+            stream[448..511] = 35B290F85EBA78A978750690C4747E8F
+                               72621951483772E8B89876CC5D55F3AB
+                               02D9B8FB35C741279FF9B5B571B26329
+                               4D011F813CB5B209CA1A22D532BF09B7
+                  xor-digest = EA9BB65E87C987EA64BC3F4E710CCC34
+                               F6CD0A795B8347E1441CEBEE35540D41
+                               64FC2B95D71FD47A2C4ADF732261EE52
+                               8125BE374FA4A90132CC1063971A2862
+
+Set 2, vector# 18:
+                         key = 12121212121212121212121212121212
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 397F8EC015ED573967938D1CEAFE9BBD
+                               BD8853C329B3A881B489090853FE0F43
+                               89DA105F0ADFA9CF51DA2521C40FD2B8
+                               FB0BF80B93E3F2B3D8A8EB1C615E0FA6
+            stream[192..255] = 68E7DBF465E3C6994D58B9937A866E4D
+                               43A82A80DAEDBF29C048639BA38B690B
+                               7ED11323E3C0A8E77A16356705431EC9
+                               9F2CB7F7E1ED3B83EAF2CAEC00B00755
+            stream[256..319] = DA51CF3A07EBE7E86E9DDDE5A47E7417
+                               376F334E6AEF9C187012C8AD2B94BE7C
+                               00A876756EB232510FD0798E72EEC87F
+                               75EC1467C07B3A1EFB0D51A5FA65E382
+            stream[448..511] = 0BF3C6FF6794887F2776FD632B83682B
+                               AAFD131432CFD7D2F675E03320395313
+                               AD4ED96E9052FE6B2D2A17428660A25E
+                               EE642B712800BE3F7E44F21A1E6A03AC
+                  xor-digest = EF4E84DBD66497B142EEAC56B830FF78
+                               0465CEE20B9CFAF5727D4B3A588F4D00
+                               AAF718330CFF35508C44C1ADB8476625
+                               2CC3AA6AAAE74F8BF1DDB6D4AADA425E
+
+Set 2, vector# 27:
+                         key = 1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 72BC8A6E1E61E704B142AA00812EE676
+                               263C1CB9AB941119B19D15EBA3462F56
+                               2F69220595DE5E0E7C595FA40F1F06B2
+                               6EC32252AF05310809DDDFAE2E24B170
+            stream[192..255] = B29A740B51B4EA1080666337D5551484
+                               FFED6860A5125DC0573C8F90F23A98E0
+                               BA7B3E4C28C2CEFB1C33D2C36D1B7625
+                               64B9A67240CF174347A4C8D868F00F6F
+            stream[256..319] = 555ABD5577A8909797FBA9769C03A0F6
+                               537C06AFB23354F054E25457B729B534
+                               CD10B2ABD45BE3E38DAF1B7A9103268F
+                               4FDB4C0FC9A80A003FCB907E8F249AE0
+            stream[448..511] = 3B29A43D9C795DAF1760CA9EB57C0B39
+                               F62D54311207B617B727FCCE1B2E762A
+                               060810C4DEF672E7D76083E3E4BED0D1
+                               0BAFD27CDFD2C937E660190D36B3FD7B
+                  xor-digest = 0B3B0B3C69F2E4BDA22E25AEF352234C
+                               18CC5E1E3F6A317ED7257887446EF734
+                               65CA15F51AF5E077B7915062391D8497
+                               8F437985DD08F5FA3A8D74B3227A6EEF
+
+Set 2, vector# 36:
+                         key = 24242424242424242424242424242424
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C845BA29D542FBED2D021C85188E119F
+                               D34967B79D9F44635DD45D2E41DC5AFB
+                               B237AD2FA0E4CF4202D83DF3073C578D
+                               2AA8A32D30FB45DE28F23CEB85E50FBF
+            stream[192..255] = 15C910FDD3C590AED1ED7DA2A7969297
+                               FD12081B4B23F0A32CE5B3196173C7CA
+                               7EDD03F9637E08CA501C4850C15B207D
+                               7AA724377396CED2357B572BBF9E69AA
+            stream[256..319] = E484AF567EF80BAE77461855294E9280
+                               EF57E7366605785034D639D6DE3EBB0D
+                               E21886D0E1E0679BC2E2C9C2D9201484
+                               4A452B6AD3F1AC8B7762FF3C0E405B3B
+            stream[448..511] = 595D9855200786BB575FF7977509F395
+                               7879CA1F19619A99174BF013CB62F85B
+                               FF2C3C4FE724E26DD0C10D7635A2491A
+                               9E7E868D9DAD9201465AA178184D06AC
+                  xor-digest = 08737B82505F46F4FF282EF42F387AA8
+                               0450058F5314389BB73733BC163D75D5
+                               D32FC6408F8DE5F6ED2050027D605FAC
+                               A7119FC2DC1B6D3E84E8048DCC42FBD2
+
+Set 2, vector# 45:
+                         key = 2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CA82A689535CA8BAE01BAFEBA6504B3E
+                               6E6320101999BCE5550C2BBC9BC65D91
+                               FAA2D72FA4BF46B6EE916244048B1D09
+                               A115E3AB6C00BAC8EE382B58859E8157
+            stream[192..255] = DE787B1CE01B0BC09801D78D1FFA3A82
+                               0C18B867C561E96DF4ADADC5A4375E44
+                               5A34F9457E5F8C9A337A0C88DF0F723A
+                               D4509F1449DF2C6AEC0EADF4C7A8139A
+            stream[256..319] = 7E1854FA15DF9D5827F1555F12B292C8
+                               452A1A893EF034C51750388D294947EE
+                               3F505839C69C1708E8323C449C39A96B
+                               FC9EC91B0E1CAA8112057EB0389FDFD2
+            stream[448..511] = C85B42B838FB9C3D4956C9E22FBD8FBC
+                               EDD92C4461EFBA5CF1664B9AF54857BE
+                               C3D00319E5E8A89A8322831151EE1D52
+                               D8585AC79CB60B61ED2C852D04BB0FB1
+                  xor-digest = C65A6BEBC4FE898DB8D6B8F6E8F3680D
+                               2363BC12259B0FDB2BD8F052A572ECA8
+                               D1EF62AA9A48497805A413742B5AF5A2
+                               6DC9FF624B49E5D6FE58BBE5251B4983
+
+Set 2, vector# 54:
+                         key = 36363636363636363636363636363636
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 9F6BCFDE566A1B67C608F11B8461E340
+                               42D4F07DA4D5EB05554CB7426D65C5EC
+                               A93C2D321175B6F72FCBEBA6E38CB098
+                               B72534F7D534B1AADD97B77E8513B482
+            stream[192..255] = B2466A173F436C8433F264CBF125B8E4
+                               C10BC81BD46B5C21FA161CB2AE07D27B
+                               F66812A2C2FCB2B14C23E413CEF4E591
+                               AD52EF810A000B42E5C1B76EEBB17739
+            stream[256..319] = ECBED2058DC50223614EB8635B834C3B
+                               B176719C18CA5E3D087A93E5CDF81123
+                               C6FB819CCAFB5042AADFED5E3C33116A
+                               FD92AA21031165A22F4751C423B8B945
+            stream[448..511] = 758BD9435DE607867DA256064C304C8E
+                               DDDF5B64173CF2C98B2842992F8C5FE1
+                               A37C3227B7F37D49A39F9FF929A883FD
+                               56DB8B1A174E1E55FCB21C9E1164C20B
+                  xor-digest = 31761A49503946701D35306FBCBE10E2
+                               02967E7EC14A328B4DB19FE79F03553F
+                               13A012B7297B2D02F18A216AD24A682B
+                               299518C3769123EE86A4937DAA9FC39B
+
+Set 2, vector# 63:
+                         key = 3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 85C7FF83641ECF1C91B2D996D4EAFF6B
+                               26A4E7E34C0CA9CB9399F655E566383E
+                               246143F57776C8E08951E87F76091FE7
+                               2356CC901F09A07895A890AECF047B3F
+            stream[192..255] = 4CE0C6606195F7562D485E32E8E105AF
+                               C862100A07E55FB449BCFA2D9BD48658
+                               958B37B3EA3565FA66824102A14B5770
+                               5E3914E0680E116ED58212CBF61028E3
+            stream[256..319] = 3BB772A5A8DE2AB14CAC1ACBF45B1701
+                               057710F24C01E680F58090B8E949AF01
+                               8970A43A698A04C0C8639FAA665DA3AA
+                               562B2C5C3A03BCC38FE75DC1821ED718
+            stream[448..511] = C73DEA1F7BFE42DF75EA2681BEB31948
+                               821FBB049DAD15B988A77C0247868A38
+                               2056B66F47B0195FA30C9DB5A2334A9D
+                               CD7C0D22E479FAE1BBCDFFE60F261C7F
+                  xor-digest = 94D41CCAD940CED3C854DA0796DC62E5
+                               6B566A980E34F353CFFD0F53AE9E34FF
+                               A6A057645FE66D86BE30F93805D9E2B5
+                               D78C68EEBF61CE387277A51EB2EF835B
+
+Set 2, vector# 72:
+                         key = 48484848484848484848484848484848
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E45194379659D1D8904DB3698AF8B245
+                               762910B7FBD019AD1AA20A6C433B4C80
+                               308A9EA68697631646BF3A2107C4E7FE
+                               2235E8F3262A9DFD3F5CC23FEB0B2DAB
+            stream[192..255] = 012611EBCFF9F839DDABF99D9D4757DA
+                               4E947598C4757976F6F61DA5F0DAC8BC
+                               DDF72F08BA2F446FA37F9A490F6A2B6D
+                               79227C93271D6B763DA7B2A907220A42
+            stream[256..319] = DDE54F9170D6A4702CAF45CC6F799F74
+                               A43D83AB8ECBAC5206D108F869561D70
+                               F151A0037F8E28951B5026643F8B2D6D
+                               56A62E259F04A5EA304791A9468E66AF
+            stream[448..511] = F70794C084E6EDC07BA0347413B05FC9
+                               FC46994CA820CE4FC037ADBA50EAA9AD
+                               55064ACB7308CFCE3F35AD5C7C628362
+                               F4210FBC2D3264F734728626BABF5356
+                  xor-digest = 31815B36BA034BB1941DB1E45A941A59
+                               7C3882F34BD3BF441CAE8A9790B05BCA
+                               72049FD10C09A14AC9DB867A82C38A5F
+                               524C72F783DFD16980DBCDEB486FAE96
+
+Set 2, vector# 81:
+                         key = 51515151515151515151515151515151
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3C04E21F6937C4EF472BFDDA89F9CAF6
+                               FF53889A9979ABA8F23AA51DB1EDB8E9
+                               D08F696C1100799A7D004DEF1CA94110
+                               FCF0C054B0C131E6FAE0FE2F2DBF22B3
+            stream[192..255] = 9B4ED3EF9639B953186FC7E732E7A9EC
+                               55A5F3F19C5A10E12EBE46DD84F10385
+                               33837693588D584FDAF86E3A217C3CFF
+                               020278736F1A90CE07F0DCE4329005B9
+            stream[256..319] = 135FAD68B5282FE59B28D2DF66463632
+                               06CA92E84A73FA131EDDCE89A5C23B4D
+                               08FA57D455BDB32F8ED58DAF3EF288A2
+                               7C72020E35DAE19B446E4C52DCDAC5B1
+            stream[448..511] = 7D08FE1CAA0E8A0362669B310B99127D
+                               18F2111002891D3229102D72605B9BEE
+                               F5DA36059B0DBBA7646927650305431B
+                               FDA4A97570CD0C484BF1E974B157ED7F
+                  xor-digest = 5125E77698C0DAA89A7E47DC5D038D40
+                               7B732CE56CEB674CE653A1B6661B2740
+                               0C092AFF83BEEE4FC4543B9D725C9387
+                               2F89AA338222ED677BF59397200AB304
+
+Set 2, vector# 90:
+                         key = 5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DA2E6F7FF0D1F1C87A97E028D3E20E21
+                               75E9AD91482965B651B495AEE819CC6E
+                               C42AFE2C20EEACCEC4E90710D17210E0
+                               4CC6832905985322C8007F872D3E58E1
+            stream[192..255] = 09B0A38E19DDDA08F7DFEF7D0FC80560
+                               D692A020F0A66F609374ABDCD1343722
+                               05F19CA04EBDD3009844BC540C1B2B41
+                               66D45E8A2E822B906DA34649E7FEEBB3
+            stream[256..319] = 6C8E2CE1D7FABA414432E75BA2EFE4AF
+                               CE2CFE99506677A956AEC86BD290B6AF
+                               C5298A448D0DEFA99AA5CD26D318982F
+                               E786D809C713D5A55B42CA6650191DDC
+            stream[448..511] = 845FEA0A88B521CCB8927C9457AD3225
+                               EF6E3C21705EC9FB24873916A2C24668
+                               963C03FE097DA8224A42A99E5DFFDC17
+                               68CF518DE49CCAC8A70216C62C9CBA6D
+                  xor-digest = A46BFD9D2D0BCC688A032F54733AB7C5
+                               5FF58B296071D5D39349A531E41F0BA9
+                               893A1722B6102740BC5FE394A49363B9
+                               6A626AB43FD6A288CD9B23F7255279F8
+
+Set 2, vector# 99:
+                         key = 63636363636363636363636363636363
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CF0E05248AAD82F1C8CD2095ED2DA333
+                               BCB02E3AD8797377AE1F1B4D6DDB86E6
+                               2A59791CB553550E0492FAB42C7A2C42
+                               3157C5092D2DD37D46589F17FBD86584
+            stream[192..255] = 9E946626F1EAAEDA42E52422B4A84D91
+                               4122EEE5736BCD12061C77DF5B0122B5
+                               1784E946B4E93470170ACDD7E2779591
+                               57BCC9B9F3E11E88BC2F740AA0C10C97
+            stream[256..319] = FF22D8196AB3DF662210D12D0FE79255
+                               6DCD39611C07F089979CF7D693A30CA3
+                               5B795B7F6D64931916E717C8BFB92114
+                               DB75118BDB51D142CE8133415C6B3456
+            stream[448..511] = 971F007EFE17662D95F47F4F28266516
+                               B22A1E50755EEF19149DE3A3121F5FEC
+                               E0D9DFE7A055026CA44193542D7687EC
+                               695B97769BF02F92C1EF3D904A8010C6
+                  xor-digest = D1C4878BEFCE48888A43C6DDE7CC8163
+                               C8D54A4CA36748C74721C7B6E1649A31
+                               4B5B7A4BD43E7C3D2A22F0C8446C7892
+                               90D54D421D37CB16400E59CC86215CC8
+
+Set 2, vector#108:
+                         key = 6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 54F122FC8ECFB176E7F4CF172B2D78B6
+                               54BC11ECF0010D2AEB9F899130F4AC2A
+                               38EBC15C8831D591E6675DC1CE7A471C
+                               4B869FE83CBF37AC70BAAE5D4AC607F9
+            stream[192..255] = 518F298A6008532EEFECB3DCF72103BD
+                               5E3F84FEB6EA2311E8C19A2E93A9C3C3
+                               BB1DA7DBA78D5618D1C4FA5B0B202728
+                               62645A361E55494D66C9359E41E5809B
+            stream[256..319] = BAFFFC9206D1D813F3E2768F08D78B2A
+                               89BB20CCD92E7F13FDD816DD4E4963C2
+                               C5FC2570CBB8BB5C70848B73001F508F
+                               47AF179528200F51CDC6E4854EAA63C3
+            stream[448..511] = 844B1D15FBFD1264169279ACD525611F
+                               A39C7BB41F1E7A1C09090625F7926E51
+                               23A4CD7FE1A3F37ADC67AC437BF0A5AE
+                               FFFC6FB0ABF39D9908145004AA5B958D
+                  xor-digest = EC67596C9DEF4012A2D543842829306A
+                               4285A3B8038818F265065DC848BD80FE
+                               C27C2F66A57B27F7FA8AC912001EC954
+                               05BC6E93D7E555C59060F5D2E294D103
+
+Set 2, vector#117:
+                         key = 75757575757575757575757575757575
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 91D2772A18995DB3C0801DD3740F4466
+                               F9535E5BECB93DDCA0E94D19C0B57BDD
+                               0FFBA9DAF0B11D55C852927F8BA560EC
+                               4999E25848D08FCA7275E7E8571A5F1C
+            stream[192..255] = 72E64FF10CA9F07CC493715724DA7610
+                               9E4358E8B0CAE451348B784A162DF036
+                               AB9796724D17FDBF356031D080A6631C
+                               D1E8D217B041AD2EDF427972653206B2
+            stream[256..319] = 4054F770C93FCAB533143FFCA8E4C0F3
+                               344956C29D10374E502C2EDD177ECE5E
+                               6625BAD9630DAD57976216CD69865058
+                               130B132FEC1AB0C350DF4DACE4C7724A
+            stream[448..511] = 40B4A4DD63F7B6E932482D0E6F5BBB90
+                               E402466550B518A177CD05985D238827
+                               BD92EE7EC22C274F19E682F85ABDAD95
+                               D0EBB3DB6C6134408353C8B0472C9A1D
+                  xor-digest = 9A6C893F2108D13A29373DEDA65386C4
+                               AC356BDDD4A3178952F9126E322B7AE6
+                               83C94F1A131CBEAFF26549D9F84CF04A
+                               1241FA374B055B0ADE7E49E8EC669E65
+
+Set 2, vector#126:
+                         key = 7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 87A7773A3514EB7F882F2C491E90DCF3
+                               059C5CC575D806B9029CCE3FA45A246E
+                               0EBD3AB2F2E324FE36ADC3B56AE2F7EF
+                               C710AA964CB87381386C2A88B1308035
+            stream[192..255] = 415D6F59DD004944D4E45FECC6F1F06E
+                               20BEB18D9C84187C347F43B17E0924F1
+                               2348F825E106E57A00258CE4415294D9
+                               4323A9812D8A71359CEC1001BAA0D567
+            stream[256..319] = 8E20F0D03F37EF4B2C5EE12B5F81F7C5
+                               32D62E779FA0D2D08F8ABB6B0183A4DA
+                               4EE0329215F261D953150B9AB9FCBE2F
+                               568AAE361EAA8636ECC01A63F007977F
+            stream[448..511] = E7C44F44E06321A20E25F73E2069757C
+                               90499DB7E60025CF6D2D445E53A665F3
+                               08EC96F6FE73C0AC90D7E4A712E18C2D
+                               3DED46DFBAFA24C4B0B329E52C525976
+                  xor-digest = 22035341489FA6EEB2A6488CA42F4043
+                               57477C3F55569A1224EC39B1019E90C8
+                               21D37D78ED4DCEAF6EA70724C3751760
+                               38CF25DE4F84BABD80424D83A310881B
+
+Set 2, vector#135:
+                         key = 87878787878787878787878787878787
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CEC0C3852E3B98233EBCB975C10B1191
+                               3C69F2275EB97A1402EDF16C6FBE19BE
+                               79D65360445BCB63676E6553B609A065
+                               0155C3B22DD1975AC0F3F65063A2E16E
+            stream[192..255] = 5E12BA9DE76F9ABF061782EC1C4FBBAB
+                               3373B816DA256CAAC37914B0C161E4E4
+                               5F5ADBE444098A5B2A4CFD4251D79918
+                               987BB834BB50F0834EF4985F356B92A2
+            stream[256..319] = D89642D25DF97D149AE07EA18BA39497
+                               8935978AC34C1DF9F444986D7505DB4C
+                               7E08DB3616B84CD52E7DD7FB108C36B8
+                               B50C2573172F4D3500B6D62A9D20B82A
+            stream[448..511] = A2C17FE7371604556F796429C6BE0688
+                               8611638B310F3E9FAF484BA9EE29C16D
+                               2F842EAF33AFEC557B68D2F453569187
+                               A6F4CD204A0E7A733E81AB7CE9FCAE81
+                  xor-digest = A7C93087CA70DDFE5FA5F1F2F954320B
+                               6E3A61977A7C6AC2F033B826AB9A9957
+                               66671D2A1025CDF8E2824B2F58CB221D
+                               2A68679239D90152FF7D0D39B33FAB93
+
+Set 2, vector#144:
+                         key = 90909090909090909090909090909090
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 7118889F6E46A6523BBEFCDB006B3BC6
+                               71A6D390BC7099A708D370DCD0E3D143
+                               A0334619EBD5C7DA9EF6301F29273F85
+                               2DFA3C580ED65C6E952F88A0B7FE368E
+            stream[192..255] = 31D61E133CA1AAE400CB2DBBAE93C75B
+                               445792061AA0539DA69ED0B77B970C0B
+                               482156A5DEE4082A61364BF06E692399
+                               FB9F4411FEC515291F8949B20F57229E
+            stream[256..319] = 993E815F299D4841518119BFF88F6EFB
+                               F3DB9BAE60238BDE2845DE4DBA6D79DB
+                               C9E42BA5C3C004AE4546FD86C660FFC8
+                               FD6A8A349669FFE3D9E5BDF8E50A407D
+            stream[448..511] = 0F9CEAC6BDCBB56B7E97DDC95877B2B2
+                               1274F4A6D814B5440C74D53A3FF0735D
+                               EF01B14AE4188E215CE7337C04871688
+                               7159695A241BFB9D6B489FE9E23B2AD8
+                  xor-digest = 0BD5739ED28778023E6303FD88DAABC4
+                               0FA0A211A1A5C5F230D9E67DDD9EA517
+                               FEBCDF0BDBC107291B6CF3ACD8B862B8
+                               4BF15400493A54036E97FDEBB9A1DB2C
+
+Set 2, vector#153:
+                         key = 99999999999999999999999999999999
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 236ECC5AB83DB1C5CD1C5A888CFEA2DC
+                               BE99E7E515650511FF7016A0EF287ADE
+                               5A03839C4F83F05FAC3B0B24D4E3F602
+                               3251F8D9CC4530A805F8A6A912EFAB1C
+            stream[192..255] = 792823ACE2C0DDB266A118068AE295CD
+                               716E424D3B98A9DB2501A3F5DF7DC70A
+                               3BD2C6E664D5E13317D6F57B8774C903
+                               D407D2BB6014E0F971141E89569C5868
+            stream[256..319] = 2D6ECCF738FC00ECD5475EDA959A73BB
+                               304C81FA9DDE0C21592247C4098D9347
+                               1DA30294DE8C100E5B17A199F744CAC2
+                               4E33490FC7F223FD6B4923056117C6D9
+            stream[448..511] = E791A6BE7F7593788E5D627F5CDAAB59
+                               349AF2BB1DA2BA622B9824F729929098
+                               BD19DFC05D0D9454F604960C027752F9
+                               7812E53DE6AC6CD2751AB331703646AF
+                  xor-digest = B7C5CE0D2FF66533A1C948C425F33FF2
+                               DC458E7E517637596FC8FB710E2E5636
+                               DB1F14848CB12793D54ABD0856B22F3A
+                               ADFA8C33AD08B8CC5292DD76913CB105
+
+Set 2, vector#162:
+                         key = A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 74490D19F13E7C6D1B25C6408E23F229
+                               8A8806402755660C4A30CD216A500BB6
+                               AE975E08EC62D08425A8A62A71B00215
+                               DE35E5178902348698528CB82296F009
+            stream[192..255] = 51A6EC18829928EE94C37A5CD030CC4C
+                               E4F7E1B3E78C3A5DF07592F45B968BEF
+                               F95B8B257DAF2B468284627AF4481FD2
+                               67BE0B164DD86721DC8C1607A0607EF0
+            stream[256..319] = 75C565D5A5A240B003273F99BEB3E4B3
+                               9C056162B626F383F3E77B5C98C0FBE9
+                               119A7C335C333E6490126AC2510CDFAA
+                               86441C72D1DD9ACBCD3FEFC0D0C794C7
+            stream[448..511] = 2D90CCF0B43239D725E3B53C31B82754
+                               246C065AD23A8D709161FC74B34E23DB
+                               B918EAFA4465125D3780BF0B5803AACA
+                               037AA0A14D977141B611A6CA2278B634
+                  xor-digest = FEFDA1A6E95920B93380CC24FAE214C5
+                               6B009ADCB176D519CA4B8538EDFC95D1
+                               6CA06B730B28A230F0085FE43CBEE2FA
+                               2EE5DCD74D66F5CBB59F256CC1ED885A
+
+Set 2, vector#171:
+                         key = ABABABABABABABABABABABABABABABAB
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 22E1A884ED2C67CCB2977105649B6544
+                               367858D1A730AA2FA96703FA406B337A
+                               B2159A389BEF48D8A215D870B2968E16
+                               B11571F12BEC0A07FA7D3B9790987EC7
+            stream[192..255] = 4C98DD259D03A40AF38E0ED0F37CBD74
+                               B27776E9250B8B063E52E169C7B76A15
+                               0D699278AA4124427B5EB6AFC4AD5DBF
+                               600FEAAA98A88DFF297DACA5ACB4878F
+            stream[256..319] = 5FC732A26406FF0DBC764ACB05C83484
+                               976B640E60CCD6ABFB908583ABEC3E75
+                               2878371EBB5374C9B37A63E0768AE10B
+                               D857253D940AC408EF49EDD590E806AE
+            stream[448..511] = F012E429C44D5DC03B88123855B62C0E
+                               90E06759306017B5773752973850531B
+                               C480316CBBAEDE6353AD5FB298349AA9
+                               16AC0221A4CE1E4729BFB9C230AAF9FB
+                  xor-digest = D73B872315F9052C67C4CFC5CD912DBD
+                               60DA32FD06D9C8E804968E688898200C
+                               1D979DFFCE52E1C3B3309B58D12BDBB3
+                               D3EBA2954D1587D720E004E12EB4A13B
+
+Set 2, vector#180:
+                         key = B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = BEF4DD0101F80A8F880BE0613B2AAF88
+                               D2EF924014F7445ED922E9C021571909
+                               D7E6BFCAEE0724F2A9C522C4BDE4BBE9
+                               FE53FE592C0FEB80D2C7A51FB8BE9EF3
+            stream[192..255] = 6B1966D3EE460999FF09001B0ADEC484
+                               0D22CDDFF39EB0E3D5FDF74C6E7B3394
+                               A0A4271D780DE6DEE9AC58B4903EEDD2
+                               6DD14E14A4DFE506748D5DCA6DDF4C5A
+            stream[256..319] = E79D99119996FBB5163335E2F79F0502
+                               7AEA5372136E7B3C5BE1F4A673A2DC74
+                               60834B81BE6C4976C4A727C8E6046A64
+                               4CAF42EEA6A068B7E532581E9037BE9F
+            stream[448..511] = 5C4F52E0E94884C829DA1FE88EF34614
+                               9F3EE55A136EFA3B417DB63D2487DF82
+                               794E161B3153DDB2E1E4F385E1A848C7
+                               729FF5CB1CB58D5E73FAB1F2DCEEE5AD
+                  xor-digest = 2F3C231B0228C274255F3BD314ECC7F3
+                               1B9C49177009AFF2CD88F807092D77E3
+                               C74C1B9B8650F581EC7603F4D6E70955
+                               1B00C3192414C04AB0AD8B0B9BCFE988
+
+Set 2, vector#189:
+                         key = BDBDBDBDBDBDBDBDBDBDBDBDBDBDBDBD
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 05AF4F98E9D526CD7912F3E8CAF45410
+                               DED6D4E331633C5621B94E7EBD15E856
+                               04AB202A553EFED55A548C7AFFCD2550
+                               60315FD50A305D8BCAC9C077229D34AC
+            stream[192..255] = 786D24EF3FBFF6883A4ECC4F40E445AF
+                               3CFD130D5B6A9CE37BEBA429AD137A82
+                               44D0586FEB16D086F533D1885A82F73C
+                               F2AD2C645591F80ED09942F0A08D898C
+            stream[256..319] = C214B6AC700164FA66DE346A27A99463
+                               C5B6C0E43A9057384BE168E163058FCB
+                               6E7DEC871C6531EFC8B8D581EF92757E
+                               219294D39E0C9C8276440BE56C3D9941
+            stream[448..511] = 22CF14F5BD70E719AFE76C53E5D611AE
+                               4C8D2171695C9CF97E2936A8BB320670
+                               015825547A508EB43D96F2EE1EE2CB34
+                               4E120F001500F8ACC3E19E30455D09D0
+                  xor-digest = FE5928C74EA21F23E29171E5AAACA20C
+                               DD8571E907763C96B99A8C11F9A1D2F5
+                               78F68A6C440996995F7AB6E69B3CCE33
+                               CF8CE0C16F54355696D47DBF82EA8D56
+
+Set 2, vector#198:
+                         key = C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 75559677D7C762F6CFED942D800F2FAB
+                               AB5F3892DC2C79922E96FD34FE511C11
+                               251C8EB7C639E531CE08A8C99F62E7BC
+                               F68FBAFF99D62348FF91CCFEC2710055
+            stream[192..255] = 149806A4D862EEA81F0208D927339E5E
+                               C98E9C2A6E0DB85CC0380DED7EC5B8AC
+                               4ADAE76AEB9C7B7264C3834316209615
+                               25221D58C0174577110596FF89C8FC69
+            stream[256..319] = 137E527A0ACB8B96A9FA07890B60B78B
+                               3CDD19BF89B31FF75A814F470BF97E0E
+                               1293B750B769F5BDD750DE5025D7534C
+                               AD541A1F26C6AE9AC2FD3237C156AEBB
+            stream[448..511] = 0958243E88921B81F04AE63658E52D76
+                               CF2638495B3A6B970633A7C8F67B8CF9
+                               AC378082F72FC63BEA02881CC5B28D9D
+                               C8C261C78B2872B5EBFC82336D6E1A28
+                  xor-digest = 0084D7BED4953402FE8F7FF71A28CEC7
+                               0028A08A00EF935C06A8B3632DAD5914
+                               84E44E372A753F8E630741266C0F4218
+                               4923608103042C70ED4ECC5112B9AF6B
+
+Set 2, vector#207:
+                         key = CFCFCFCFCFCFCFCFCFCFCFCFCFCFCFCF
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0C46BF67A3DBA5DCCF8E4A7A65B6FE28
+                               98C701CBF5E88F1F3DCB6B873E5CAEEF
+                               23024ADA678E1A2CA9E25AA8B476CF4F
+                               9FCBC297FF03A9B94A5A736274EA776C
+            stream[192..255] = 73B9891D1770289A67D6338909FB6282
+                               9A425B7947FC30DC52B11E398E85B1EB
+                               537E1C02898FEBFC15A9172C254CA55A
+                               AA1B56EA856F47E37E2F252D92D94ED8
+            stream[256..319] = 6522D372F90F2DAC155D48F165B6DFA4
+                               38B63B9F436FE00CC075C585297B8F90
+                               E6062358D29641FF9C28EED4A23FC53A
+                               6B5C60C2AF1E8146DB27CCF5F43BA838
+            stream[448..511] = 642541A9733946827D79BBD815C03C17
+                               6357BD6E81E9A61FFFD4A0BF6863AC71
+                               72AEFB92C1F235641BBE1457B724A6AA
+                               AF9FAC687552A778B034C4A4F8E41ADE
+                  xor-digest = 9DDBC1E7D31379D027B4F3DFD72C3668
+                               BD0BC5A97655978E79056B3D25DF3E79
+                               5D5D8BE5D1AAE877F2E7D03225CB6609
+                               6EFE11CBCB728039A243E326437CE73B
+
+Set 2, vector#216:
+                         key = D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DBD4E866F4E24E7F66816CAF625BD07F
+                               1F7BDFBB81428FFEE9FBE14DF5F5F3D8
+                               A044EF53A868D989E16165A0F2B95E8D
+                               83439BB4805A125AD0CA7994AE11B852
+            stream[192..255] = 7CACC4E7B9B1957ABB22ECB9D9D67184
+                               EE7A7F4B822A1C955A69E238022AA313
+                               276C2003E27AEF1B4F94B33A6428685B
+                               F048B357EAB297B7DD98E612F054A317
+            stream[256..319] = 286B484FA80A45EE4D5300DFBE173E8C
+                               978B976BE1B6CB0D15C0324D6B70D265
+                               385B615B3EA97A55D94C47F53FF40861
+                               4460857AC9568556AE54A52546B41B5A
+            stream[448..511] = B3AD999394343F6F0BDDD0B1FAE2E3A6
+                               5BE2BF56D2B78A401D5761E2F3AF8B18
+                               A2B1089864999D9B99E5BF6959F8F802
+                               975FBF204D6159CF23F3706CAF0D9BA5
+                  xor-digest = 0957D6887501D4360C430614B67D99B5
+                               32849E2F5C69CE8A9F3F707A2B5438BD
+                               0C1237B5617FB525CC9C043A10DBB265
+                               3C3F0A353E89A19838B8F68542E09526
+
+Set 2, vector#225:
+                         key = E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A6DF8DEE1EF7D1AF773AA3E9651B645A
+                               50CF101BF065F69F3E78BEF5D689B1D1
+                               D306FF41EB3E78BEB75C4200937CFE60
+                               E89E370680C519B2F64E23516ADF8062
+            stream[192..255] = AA30580A210B87727BE17EC52AAAD037
+                               3E0DD11FBFC89B37825CA4D6F9E8D433
+                               E3EA54C37D678B58CE834AFA310F6D4D
+                               06B4603F12DBF38595AC76511D0B13CF
+            stream[256..319] = 5F3E1A55116CB67BC91C8E37182EEEEC
+                               8FC9B09DAA6F418D3434BFBBFF6BFFFB
+                               F93F8A963F2F51CC487BE868F010EC0B
+                               EE17A480542A301E33B36F59BEE13D91
+            stream[448..511] = 672048756C221C12DA6178BE711B3371
+                               525A92BC9A219CABC5501B0DA4CC248B
+                               8742E8BCBD6F5A1CFE522F3DF3BED6B6
+                               5D60D1AC737ADC582C2CB9751521828B
+                  xor-digest = E7CA739E4DE0E74274E491CAA9BF5CAB
+                               3F418EBEB69509D69B2594E964759D15
+                               104F674CD44681AFECC3B4939CA0A0C9
+                               DD7AA5726653ED3FBFC833DDB0C87B42
+
+Set 2, vector#234:
+                         key = EAEAEAEAEAEAEAEAEAEAEAEAEAEAEAEA
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 2479A8F2872A813D16D15F060D300237
+                               25297B812F6F3B97D74D9716E4403A5A
+                               684D2BFD1E15275470FEDADF1578277E
+                               44C6C06B8A5FCE3D0CCC5E13BF49947C
+            stream[192..255] = DB2F9B25F9523FF5C2CCCB808EFE07F3
+                               132D4B0065A563288F848E05EB45E48B
+                               D15C069C02F90B4FC10AEBF1AF4BF90E
+                               2CF7F48C8CD7A8091014131EBC21FBE8
+            stream[256..319] = 84FAF79797E25BF2CFD54E58F5C7AC1C
+                               EC170B064429EB832924CDA9C47B5174
+                               9BFEF80D96FAE36DDA65659FEA1CC06B
+                               4EA3A1601A3304AA4DDBEB62381FD4DB
+            stream[448..511] = 2C8FC8D23E7DBBC37BB0811D1BC71145
+                               BFBCDBAE19F5281CD0E6AA37419778DA
+                               64DDF68726DD7F4D78BBBFF4576C2AAD
+                               93F477A2AB2C3CA8A381F30BB944C7B0
+                  xor-digest = A6D5F0DDFC0A43491D6D0A17C095C070
+                               9EC7E9B89DB8EEA11045ACC5FF003DC9
+                               CD3318BB6F9675EEF20E15490F525066
+                               AF8380C663B60EDBAE30663C94C39892
+
+Set 2, vector#243:
+                         key = F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CC3701E703946194401D1BA23AD99B5D
+                               F3F856138E142D4B9C23DC9F252A277B
+                               D62DAA33A71A0C61079AD5A20562291A
+                               B6EC92C66D7BE6A17E27D4DDB48EFD31
+            stream[192..255] = D00665FC0A4ACC78758EF25B0B0D6903
+                               D565423614409AD11E821B83F5B35D83
+                               F26F3EF9EC1766FEA9C21C09E0AE248F
+                               4BA01E48BCE09D06471593B3466703DD
+            stream[256..319] = E8B4EEE2C8BBEDBA758C1C2D0889FDDF
+                               96CDC215EF1A62FAA29A5608C852FFA1
+                               18B473C5A7319446F3ED2E8AB39A533D
+                               714325D1B14E838C9EC6E037DB0DD93C
+            stream[448..511] = 4FF3B43841B17A279002EFB07324625B
+                               7E937D480DC73F12836195110ECB4DB5
+                               CD31CA4F92F612A95E82815328DA7D5E
+                               4DCC5BB6791603EDA64C57B5A5AAA04C
+                  xor-digest = 9202B874C48D4B1A9E857E645EE8F884
+                               D971CE97923AC024ABEFB944E34550CE
+                               31712BB832F9174F86FCD369E75CA9AD
+                               85095F43A4B7F33AB641BD6912D2C59C
+
+Set 2, vector#252:
+                         key = FCFCFCFCFCFCFCFCFCFCFCFCFCFCFCFC
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F374DA745A5CF93A567027609E5D3B1D
+                               5C3C8A4D15203705D978AD42279F6548
+                               51FF713F5120CC93D044EF717F5A75E4
+                               98DBEF559E5F157A8C819E213E93B3F4
+            stream[192..255] = B270F638AAB88DFF69D724F79B70CEC9
+                               175AEAA99D55485954B265B5CAB86509
+                               C810E664766A8E6C90D4BEE3A58B1815
+                               9076959FFFA2F30EEB12343E9E7778C5
+            stream[256..319] = B2CC84A1127B5333B30EC81CC14307FC
+                               418DA96336991A27DADA74FDA987B867
+                               B125C53C0E4E2889FDFEFBFB48797A22
+                               2836B2EA42793CE2BFFD568F6234B368
+            stream[448..511] = B70F4A10A1B75D499E8189C8B92AFB36
+                               4CD2D730DC8D7E183EC55A777C2445EB
+                               BA7E9CD95C8F3A206B73C422AC2E2C08
+                               15A8C6FED156FFF93B63DE512EF69725
+                  xor-digest = 467EDA43B849054EE747A532ED0D9AA4
+                               6EA1BF2B6AF19F481D6E3D55EBAA96FC
+                               6629FE65B5EC4B5EB6A155A6D60FEA32
+                               F04F8230E26390F1C8FA53D47B68FEAE
+
+Test vectors -- set 3
+=====================
+
+Set 3, vector#  0:
+                         key = 000102030405060708090A0B0C0D0E0F
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0315CE93BE05F88212B413335CA65F33
+                               6387BA612421C7BE8276299CC178EC31
+                               2143C503A9F2644685882201137BBBD7
+                               3A2385F0AD14B690281B54B8DC064150
+            stream[192..255] = 8B663563AE31DCE7AC61BF4943466774
+                               E9EE784644AA761B9D8AA9B8E04D4C91
+                               75650DDF130454DD60724864DF2FB6B4
+                               31F947F8FCA83F6D3B113BC413D3CC10
+            stream[256..319] = 35EE3D4294E5660A99A1A1C9254D27A4
+                               B42FEA8CBD5C5BD8B902E1B1BFEF17D6
+                               ADC9B6B924C7C53D44A5C58210989BE8
+                               72E532300EA9115CD2AAC8024779B3FC
+            stream[448..511] = 402F841F64827A197FC56EE9C180F5D1
+                               075107622178407B063F70C6C860C6EA
+                               E3016D56F7CDC13A109283F5F4FC9420
+                               6C62BC3D1012EA03EE08EBE8C2DC074A
+                  xor-digest = 6815E00D7D3414FCB103EA82B38FD4F4
+                               68A453E84A520B7119E9D3A4C938BF0B
+                               AC26F7F73EDA7F3E2F20FBA551C15205
+                               EBBF2F6BFE6DBAF95061F0AB3988DD57
+
+Set 3, vector#  9:
+                         key = 090A0B0C0D0E0F101112131415161718
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E695E5417AEC9FBFC0EB0909435E79C6
+                               76AB8E2F28C556CC2C81CFC5F7A2A6F1
+                               254EC0CD2CFAFC257907723557C1DF5A
+                               D81D1E3D201410A12A5FA3A6160F266F
+            stream[192..255] = E3D590D9AF3869FFCBE2A4B8C77A09F6
+                               211193F83B8A43714CCFC02D014376C5
+                               A44FF7C061471AE208F04DCAA89792FF
+                               AE7096EAC47898C1011095DE9B55682F
+            stream[256..319] = 0F31D78C0B86D246FE105AA6D9B93CE0
+                               257E75CC0D2A0BE96B9156555D8A407E
+                               01F47AFF719CC894EE111C32672B0404
+                               B5F26C1DB1D7D0F9E470900AE53B192E
+            stream[448..511] = 1A01733BB8EACDF2B2F4322FB54FB6CB
+                               C92989248FF31BBAAA8304ECC4AF9A39
+                               CAB21BB66E0A144D8B77C537BD52DDD8
+                               C5B0909CC6423D4F243E5AFE6E22D07D
+                  xor-digest = F8C3BF6905A19184D14039E4B7FCFACF
+                               2EFA004B35B55DD04F56199C6C9DE1B4
+                               458C5EFAC45C6062BA1EB726426987ED
+                               88FA899849CF5F6CEF60119F6A68AF9B
+
+Set 3, vector# 18:
+                         key = 12131415161718191A1B1C1D1E1F2021
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3C189DEDA71E56926CA2C3A2974C4FAA
+                               B7EA3C1250E768CEA797ABD6477B59F0
+                               E5494635CB4700A95BBD54B0E93D12A6
+                               423DF8F34BC6B3BE705ED6704BA33894
+            stream[192..255] = F21E411ACF063846BF68F61F7673710D
+                               CFBF8088E2A815F406E17C4BF4E839AA
+                               D2EB9D137B0F7889E68F4B5C8160199A
+                               7C9C697EA6A1794E954ACB535A72B255
+            stream[256..319] = BD7E1C4A54C911E84067AB00F8427810
+                               BDBF4029E78D424E65F477BEB457900D
+                               0EA49B639863BAEB1427A161B8C629D3
+                               55097F5DFFB24BB97329A73B144DB7CA
+            stream[448..511] = A4D9A80D0055F2D8C55D2A49B39DCA69
+                               9A5652C43258152B42BECDE07F21F8D0
+                               EAAC565DCDE549CA4A9A27D82F5AF4BB
+                               1EEB1B0A53A58E50C3E83CBCDCB980F5
+                  xor-digest = FF451365606D0117E15FC2721F40C9CC
+                               0FBF6442A771F8FC3B06186C35C6CA13
+                               B30F65FC84B9A38A6FBA2B6F16541B0A
+                               0D77BDB4F696894B2B73CCCB8D6FA3B7
+
+Set 3, vector# 27:
+                         key = 1B1C1D1E1F202122232425262728292A
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = BE4A26D09D47D25416355FB7FF60AA06
+                               3B3CDE5374780F2C66514A0CAA07406A
+                               88490A2E3D6294A799C9BAAAA1B10ACB
+                               88FF4F6F70EF1F4F67D591040244FEE8
+            stream[192..255] = 54F1AB7235B6440D6A7FC7851E3FFDA8
+                               6CAF44E3F57E1E9406908064FDDA3A3A
+                               3C7AA1CB6ECAAF376C5F290EA02844EA
+                               779A225131F24D2E7D34AD0342399FED
+            stream[256..319] = 81AC4F45FC40CE7E1FF890F5EFF2B583
+                               36F71D1911C7E0227AD8E4DFF7369B41
+                               A8C266B3468A78773C4C40A3EEA6B724
+                               97662462F48835FAC7B6C77CEFD39A65
+            stream[448..511] = CACFA9A51224F533C600BEFF1EC03C7C
+                               7C22EDF93E8596128F8709F0CED4E291
+                               997229AC5542FD2CC9B1167C3D2BB57D
+                               9B08B82C0FC41D93B7CE2211C5E2D534
+                  xor-digest = 0D949205B6024DAC1D215F2AEA7CB484
+                               3FAA9A1719398AB8828A28BD2568369A
+                               C78A224AAD95BAE6A6333C4C13D630B9
+                               42AA52099F6EFD6871B1E45C8DC68AC7
+
+Set 3, vector# 36:
+                         key = 2425262728292A2B2C2D2E2F30313233
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 65906EA9CC0080D2044671D22C7DE242
+                               F764184ABE8DADBCD550225BFD541D6A
+                               762C7A5268EA0ECE51D18269E71A4CCC
+                               054AF634616204C81AE7E515719775DF
+            stream[192..255] = 9ED75834EBBD9576E11DCE8C583ECEDD
+                               2B8780FE98B44E9F08BBE96922C77BEF
+                               08DCE0DFD7C77C42236885BE6EDC8343
+                               24EAED350AA5A513009272818CBC4BE5
+            stream[256..319] = EB1D998260B3AF4472DE59E1C9DD359A
+                               B346B32DCE36C92C9B7BD808BAB76AB1
+                               EDCA2827557501BE0FE28F6498B33B9A
+                               F4EA48786F3158E8047A32A03AE1CD90
+            stream[448..511] = D06B1B9B8110FB9809F5887A35CB24BB
+                               80EDE203AE648AF9FA348B18D8A15B8E
+                               E98E8AB98A7AC5BF71FDEAA1A6E978F6
+                               7D5734AA7FA88E8DA44C861E2F54E585
+                  xor-digest = E77DF8C1D5F46F8896DD00187C840B0A
+                               E4404581DD053C6F39323815729DCE90
+                               0D85C2D8C97D0A3B57CF622F81077B80
+                               92988EFFA36CA176F7393D1E38AAB206
+
+Set 3, vector# 45:
+                         key = 2D2E2F303132333435363738393A3B3C
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3FBFE9A391DE0CE5AAEBF9DA3A15EB99
+                               D6CBAD0341CB78042C89F5D5B0B555C8
+                               A400DC47FD19F40493B348CB51430B44
+                               D05AFCA9D399709EFAB8ED2587F72E85
+            stream[192..255] = 68969047EE54910C44F8B5718E993234
+                               D814C27C0B59EE09F0D35B58352AA6C6
+                               594F605C25C16CDDC29A354A1C6F5948
+                               AE497C093E2D41C211E4C1417DFAAFC4
+            stream[256..319] = 0DD68E08A25ACA4448DF4B562EEBB855
+                               14E41F1F560C479542FE62C2DCBCF03C
+                               30AF180FB71E65A9A09C551551A33942
+                               53558C2440084E6B4CB664A4EAFCAB66
+            stream[448..511] = D93B80D67B6484030103CDD72536E695
+                               E7BAF8B1115109D5D5517BD1E06F4236
+                               A3551688F5C0D78B2CB080AC072B4C48
+                               94A2AF54AD9D816E2068AC569BCD2AE2
+                  xor-digest = 7C071BF395B48A023A7B708A9651EC8F
+                               0C9A00DE8BD9D0764C7F1F394AA2B747
+                               3EF87BF792D5B89AE0548EB9C1344DAB
+                               DF2E4EC6064D50EE1622160D6DD7ADFE
+
+Set 3, vector# 54:
+                         key = 363738393A3B3C3D3E3F404142434445
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 64468807E7EFE78E11B0231D8D7AE80D
+                               BFF3FAE444A60496C8F2DA202941686B
+                               95C48457C1F9DE1AD2FE581336AE36AB
+                               CA574BCB9619CDDB96E4499409516635
+            stream[192..255] = A7DBFEAD9B969D334705B6C53A0CDBC2
+                               21E0BB92854B0B107CC39F8C6E4761C3
+                               EACC8D8C5741AA4243C5BE1A79971A0A
+                               5A23F2BEDE9F3628CB9099B8C7EA9324
+            stream[256..319] = 1A44FB18740973F3124EA805C90C4B27
+                               4EE788D43F4B894B01F63C13410EC204
+                               2607241E87555B0E1A6FF33AF0DB010B
+                               8ADF607E6353FCF74F568E0BAF0F4455
+            stream[448..511] = 11568B95495E520EB6BE106986A07C57
+                               8FDF21463607619E5AAF117D84611E75
+                               F8979F59E60B43C0A37BC24429892742
+                               0D206274DA45EBBA7660422DA45294CD
+                  xor-digest = A70B9BFC683AF2716E17980A49C4F747
+                               AC25992BA7BCA5E5C2AE162497E4E8BB
+                               62C837F64EEBE4A55B5705F115CBA057
+                               C560B1AF0A733B5631E23442601A741F
+
+Set 3, vector# 63:
+                         key = 3F404142434445464748494A4B4C4D4E
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 35865AF843244DD2F95CDF7C9BD54471
+                               9C8432538842C28F93AA21F6E10F8B18
+                               31C2AA7EC010A66E539CF65BE55120BF
+                               090233750995003C7AE414DA6D55F86C
+            stream[192..255] = 190F215FD14E44CD141E47A2322D324A
+                               A63A7B512A77C20A02D3BFC1EF8273C8
+                               F65226CBD1BF32A104D1AFEFD6719E4B
+                               DD6355B044EC8D0CE95023C61007E6BB
+            stream[256..319] = BD02130F7CFDBDBC2171BBDEAB501136
+                               B2364F5879E6E9CCA7E75AD81105D9E4
+                               87E9175B62AFCAD79B23D392B2E9C418
+                               437527118797602E629A70CC869AB7EC
+            stream[448..511] = 1F0DF396B5CA6EC9767B0674B2C7A9C9
+                               133CF872DA39DE78F56D41C7F2FF6B50
+                               716717E995D42C51D6A2ED66FA6CC7DA
+                               92E9B3B4D1F130E699C430CFC96969BB
+                  xor-digest = 70291060FEA7D40B5C3FF731FAF7630F
+                               D9BBED1A7FC25A05E6B3F632E6FD6B91
+                               1F1010E1BEC69F16D44C5183E38BE8DA
+                               8949A4D8AA85F5149C203F8C92887875
+
+Set 3, vector# 72:
+                         key = 48494A4B4C4D4E4F5051525354555657
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = BFFC0703408DF6EB169656D09A5400DD
+                               9C4BAF06A3BC7220E45814104B6D9000
+                               9585BF9B0CD988E94B8C5026D07AD7F5
+                               7D81364775D54D808A5C18453B62A2A1
+            stream[192..255] = 5FC95B73A4C91DB20B93319E420B4C5B
+                               A9DE1873C81C835CB455970A90921594
+                               F9635EF4F411C9ACB4298F75B2CC84F9
+                               7F52182F7F001A1EDF72A68FA1ADE313
+            stream[256..319] = FB24E97B0CCFE15644BAAFF342C55FDF
+                               64434708407AA6D73576E842D5ADF4A2
+                               6B32D329A2DC9F1451C4BF3E9599E9E6
+                               4E5E65F73E09E4F1254BA0DDD8E6C52C
+            stream[448..511] = E2EB303CD0A67C99CDCEE86BEA581FF7
+                               093C9228900B563C6D10B20BF99D3911
+                               D47C805D1447C8F233D3FDD27CF0DA42
+                               D42E0389E2CCE99A274AD9D20B9C6102
+                  xor-digest = F83FB58CAEC8B13BC25C152FCF24E10E
+                               392A197FDA05A6A20E14093EA0B34C5D
+                               FAE102266465324F5AC07FFCECC8E618
+                               D0BB60761A26D5FD59D188097A2348F3
+
+Set 3, vector# 81:
+                         key = 5152535455565758595A5B5C5D5E5F60
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 84076D83A841C8C6ADDE3B5D9FDD6529
+                               4D0F92B549112F0A6DE05236F732E81B
+                               3C8E92229C411D2295129ECD18DD08DD
+                               C98BA78D9BAFF6271D95E1F361EF699A
+            stream[192..255] = 7063A52FB2729433D8A7BF30F27E6EF6
+                               F17C2A422E60A737270787985508D062
+                               4E678A597845CA9EF939F4B8966BD99F
+                               B8633FEA673CE7BFD2ACFB5942D7EDD9
+            stream[256..319] = 4FCE866E8C2359C53F0429F569D02DAE
+                               E99A4062246B633D4C502DC897AD8025
+                               38C95D49D3B1FA94F4E92441357B622A
+                               6264F50D5554BBE42191AB3D6073A8AF
+            stream[448..511] = 2F7C38BD00309FC81D28D84EE4355216
+                               D97A823CC46FAB9DCAF621E4128F9CB8
+                               838BF02E0EF940EFE96860CC0B996044
+                               42CACFD3306335241C1B4B65E790233E
+                  xor-digest = 44038A33AF0013BB34CBCFB77F7E060B
+                               96F5134DFCDBF04EB8F7F29B15C3FDA0
+                               F766DC940FF548C23712625793851A94
+                               294CC7201E1EDC6056C12A46524C6FD0
+
+Set 3, vector# 90:
+                         key = 5A5B5C5D5E5F60616263646566676869
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E811CA3DD1DD0057AD3A1794D3F9CCB6
+                               362049B1692D6ACFE1A6A0FCC99C7A04
+                               3AB9932A146B4040AC9F8E2F0A227C7E
+                               C60B1F35D60EA14483BAE1F8D1AC7FE1
+            stream[192..255] = 865B05E224133AFC45043F05F8082FEA
+                               487BF63BCFB96DA3EE26960061446669
+                               B1C92C6BC5905BD1EB57D579CB62A220
+                               2F35CEB603658237AF1908132A25971C
+            stream[256..319] = A84BE383FC852F1BF44130EAD15B3548
+                               56737C7EA68A0700A22D357FBA70E031
+                               BDC0FE8EC36C41790A8B7706A00CA338
+                               603E054A83881599D718B1911D1CE9D4
+            stream[448..511] = 9286C3479F9A17B51D8749257F59E892
+                               CE7C3EB8638B29C17D779811F01EA405
+                               257062A5F28BCDA1862FE653C7607350
+                               9A87D12EDC5CAAFF9E8F9F76DA0BEDE2
+                  xor-digest = D629CA4708BEF7EED04BB5531DDF9C64
+                               BA4981C9A705D59C4B2391E94B79CFCD
+                               058406845D81E7EBC097330C01FCBCF8
+                               D78940893B4FA38554A32D861AE96D04
+
+Set 3, vector# 99:
+                         key = 636465666768696A6B6C6D6E6F707172
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B89516368AFEEEC12434F76AD1E1ECA8
+                               FF6FEF7B46D05EDD6041C7B8C1E3A33D
+                               2818E38113592B615E980304D93435DF
+                               BDD5676225173331C3667F30AA2A3D2C
+            stream[192..255] = 249528FA392B19B6811711F523D27578
+                               F1BDE75CA167DDEC08303906B64FAC0F
+                               B2912A7A0EDBEDAF9FEDA420DEA330CA
+                               7302F5780827CB11B15A4DD333FD7099
+            stream[256..319] = CECC1B5077BCB9E129B01D8D75089B41
+                               64E76DBC9C8CF2E4D2F17A6248522A51
+                               FCFBFBC992F75D613307F4DD6472B6DF
+                               C8A5B29F1068FC0F1C3F8964B0E09170
+            stream[448..511] = 8B26C436E918B099E4D3A7D4D3395E49
+                               056A8A29130667A32C6A2B0FD08A482F
+                               8F7538ED90374846FFD2E1C733AFFDA1
+                               12148C9718F3F208344D5FC20128AE2C
+                  xor-digest = EAA0ACA59CF63BC27082BD52D6757FD7
+                               620A7AC5AA2FAEC52646978E2057C5FC
+                               F60B36C09D87419C1D1A64133357DB05
+                               6B96C854F38C36DD657524FD09729341
+
+Set 3, vector#108:
+                         key = 6C6D6E6F707172737475767778797A7B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 741C607A6BD38F93B33244C8B7F05D78
+                               46F6A05CEE5A87762480DE123D3BEE63
+                               240928FFC75ECD9AD1785B1664DCB59B
+                               A12F3B64C93BD4FC8C67C0934E5B0ABD
+            stream[192..255] = 3BDB31A701DD7F2E929803C3A47896F0
+                               9E5F569A32AA829E505E34BB7232597D
+                               B838F543A34CC288F9518BE16A228D42
+                               BED0CA3CE0C6E7FF9AEE63625C699B9A
+            stream[256..319] = 1CB7FE159EC1A57043BD142236DC0A18
+                               0CEF37316A6E96354AE319142282F19C
+                               1550EB645DA8F7BEE2ABAE4EAAC0BA29
+                               893E722A6F8E0A9B34368DF56C5845B4
+            stream[448..511] = B6DF810D69EAFB7F2360F6ECB50C5861
+                               7D32B3F495B3E4424045E88CFA0871A2
+                               9314121CC78B98B456ADF53E540346B1
+                               214AE2ADB65C552273F1FA498FA74101
+                  xor-digest = D35A8AE5783348824175BD34F2E16FBB
+                               975E7695DC6C4FF1ED763D404B0D4D30
+                               07AAF01E988BC85DB2FDD017691D3BB9
+                               811355C3C7A6156197AF57B794DCE85D
+
+Set 3, vector#117:
+                         key = 75767778797A7B7C7D7E7F8081828384
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = EA9DA2D5BD4B6E070479ABF8CA2D1B3A
+                               6B968A025D010944FEB51AB2E507F86B
+                               111F8A351A3F32CE1FBC4A75AC34F722
+                               1B5190F2390073084F8153E00BB98D0E
+            stream[192..255] = 0AE0DC3D0E2D3F5F93E446BEBECC4F60
+                               862D190829A209966E132DD029ED6998
+                               DEF4F613F3D53D0A36CFBA2CFE345DCF
+                               013B6CFFEC0116FFC1659A57FB42E0BE
+            stream[256..319] = 5A7FF46C335912389D8B88437CEFD27B
+                               76706405F45F87C91390273D9B70CC5D
+                               89FDFA85E20EC82B98A79BFF5FBF6AB1
+                               4F61F2C1289CD7B8357126C8E13271AD
+            stream[448..511] = 9398E699F5AD8FF31A50C8EFB9DF0D0C
+                               FD612B951A203C1BF85C62AB5AF1C412
+                               42BFD0A55F21820C6F917EC90A8FCAB2
+                               E774A93713A99C7900B80A2BF496D0AF
+                  xor-digest = 05D9732FF20A61E19428873830DA7282
+                               819234F22FE7DFD8871C21CF10C08EF0
+                               7C0413898DB144861B0CCB62992DF40B
+                               29A0A4688C91275F0A198AF39899E362
+
+Set 3, vector#126:
+                         key = 7E7F808182838485868788898A8B8C8D
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 8C4F8495C7231AAEB704E7AB9E79E748
+                               6CB5BC85D3622B8A2E2CB778BBFDACD4
+                               CEF73CC485D8E08406F5986A28706CD0
+                               56D085201DEDB875573B57629B8541C6
+            stream[192..255] = CC6374A744E9205CA39BCD678074B844
+                               16346A7E54F9B87905BADD2FACE7B9F4
+                               B0A366AA3F632A7A67AD8AAC4827C9BB
+                               A1E801A8786BC4FAC2ADE6A6AD6A45F4
+            stream[256..319] = 4F52AAB001BE94A60761CDE0334F8A84
+                               C617195B084E441070E343CEC3189CF6
+                               D6D955F9AD649A3891BDFFACA0A6E6E7
+                               7291396670BA07469D267EB80E48353A
+            stream[448..511] = 673AF85AD5A9A3F26CBABCE9BEBBAE21
+                               E0B6DCCC3256227FC0EAEDF343CC7E9A
+                               8896023DF073E88EEEF135BE34CF67A5
+                               5FB51D3A1754B15A7C4E2CCCB4C8D51C
+                  xor-digest = 2BD4B8BF9B7E79B0EB53318396B03575
+                               0AC918A6A05BBA499D81C9EFD32A0FCA
+                               34A83FC801CD6475A774091F33AE7689
+                               B9FE28645F545E9A9531F528085926F1
+
+Set 3, vector#135:
+                         key = 8788898A8B8C8D8E8F90919293949596
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = BDF2E95B80FDF304C3C4A8081391EDC9
+                               7F9553F93C27788F03797EDEBB8F59EC
+                               2FB2FCCA7727CA1CAEBF5C8DA8719492
+                               F1369D96B2FEFA23D89400CF7CA667EC
+            stream[192..255] = 6AB7500D876A4924DE59800345AD69FB
+                               BA1690733713BF372E0108D9FB65B0E4
+                               50BB89899AB84198381623094F823FF4
+                               8BF9A09F0FCA23684E78654F3D231173
+            stream[256..319] = 34ED638D249BB1AB8B16D350309AE32B
+                               9FB62CAB0EC7AB9D5F3C12C9A6502497
+                               6323EBBBC4CF308FFA68A3D4D8D3959E
+                               AFD3BE46E36072FD15A5DC3FCDECA6D1
+            stream[448..511] = A8BA33AF6CF545424E607A7FC4CBA593
+                               CB05B38C836B21D85B6FB1894926A459
+                               8D71AB424A5A582A491747FED94125D1
+                               08D6C693EC9E4BDE2F418810A921B54F
+                  xor-digest = 84F29F11524741D39779025D792AB735
+                               07963EAA0FA8EE220ECD3592E1320567
+                               BFE76EFC3356860192DDC5F06B94E552
+                               43D659D49FB94C30AB69AB5E9C370A5B
+
+Set 3, vector#144:
+                         key = 909192939495969798999A9B9C9D9E9F
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 1C03A0D6CB75670CD7D978B2E371857E
+                               27E597B15B905D5F4F4384FEC227073B
+                               5A56D8C0C4AF767F267DDEFF86AA036C
+                               41EB6170603AEB3E3C1EF3E176CED812
+            stream[192..255] = 6447D1E067550DEC9E8AE89DB02B85B4
+                               3DD7E511C8B98438BAA50CFAF7CDBB68
+                               757DA1D03A29B9EC6BD633E17BEBC8EB
+                               2D8D453F583E4D183AF30C9F47C8DD56
+            stream[256..319] = B324756101C28D9FC4D1F065F1D000F4
+                               1155514EDB30A7FE36C26B18FD93D6D2
+                               0470A41B6F8D2E8BE140568BF72223F0
+                               981CEB9D100B21C8B751BA6B2816B2D0
+            stream[448..511] = 304AADCAE0CE80E91E3558974A944663
+                               D1E2253977CD7B0D1BFAA138DD81A501
+                               D7EADD8FC834931A44642BA9873AC1B2
+                               47A454EE71F7AD8671BC15E088D01532
+                  xor-digest = 5980D43A91C09B20B0F3323F1750CB47
+                               118550920627B6C512AC5CC53AA6AD25
+                               68EE1EFE702FEDE7CADBFA25B32696FA
+                               12A18CCDE35A1B679F709F28920DF92C
+
+Set 3, vector#153:
+                         key = 999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C2083A758037E850A6FE642EFDE59AED
+                               F51F3002BEE2E69DBDB538BE2D93EE8B
+                               27A1CC89672DC14C44DADE531A88A769
+                               5DC730A2CDF3096DE7F4BD08A1ABA918
+            stream[192..255] = F4D19950E6365AE6BE8011A24B9D803A
+                               D9A8547D452D8B0B8C51676E207DF323
+                               808B5A094A2FDEA5DBC86BFCA576E98E
+                               D0E049834CBE0B3AFAD6892B542EC7AF
+            stream[256..319] = 8F2A026EB2165F39E27DB86607878926
+                               4EC8F42A09E8C80B317FD4F1E32AF4C3
+                               73B7F5160C635ECABE495B01A3488E27
+                               94D226E2D86C4654810C08B2FC42610D
+            stream[448..511] = A1D17725577B7A4FD3D1A280BA2B5C0C
+                               386FCFA09E110F00C85ECA05CC142644
+                               4D8EB87CCDC2B23D1CDBBFFF822B5555
+                               11055B93ADC9168B7353CAE10551AF14
+                  xor-digest = 7B4E8A6123216818A218FBD50D8540B0
+                               A0B62DC114F25DD476680F85DEEA9306
+                               4CBC4526C7A8832D4BC534684A403FE7
+                               B80E7F20D967ECE044085B554C158AFA
+
+Set 3, vector#162:
+                         key = A2A3A4A5A6A7A8A9AAABACADAEAFB0B1
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 6FB232154275843C74BB886D09CBE0EC
+                               CCC539DD6DEC1EC6F31578B80DD3BAD8
+                               5C992CB1A0B4EA40B3EE0C5174E36A74
+                               E1CDCAB13830453984E4365A6C599F72
+            stream[192..255] = 2682C05E19F6D8FC4DDB15B2F8385B52
+                               C5A4A70FF5A0063CD696AADBF8505122
+                               6F696746D4F8C314543BC3869B1E7F9B
+                               1C0D004655FB6585723CD1EA7A700A60
+            stream[256..319] = D6BA4C5A33B8C2DE342DE48E26AE7B14
+                               8E91552D0E05AC9458ED0010E6FF53AE
+                               EDE70E910165B5986876799E60B7E6BF
+                               3109B9BAF7EE3670497FA7CAFCB14733
+            stream[448..511] = 70C4E8AB8E8BA681A2A06F319CBC952E
+                               E3E78DA589369FEEF8A6BC6D976BECFE
+                               E6C7143337758929FCA7E0945892411B
+                               047C2CC2F2AA284E95733DD94D46B89B
+                  xor-digest = E2D3DD6AC908FF3BAE4791A50F717B63
+                               FB3F1F380CC738E2B1626FD026C9BEBC
+                               33957AF4ED6E8B9864EEEAE262FC6168
+                               9A34FA14A35BD915B6945F35BC3D5573
+
+Set 3, vector#171:
+                         key = ABACADAEAFB0B1B2B3B4B5B6B7B8B9BA
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = D25BF02A1BB050E0D15246C2EFB3EB89
+                               390BB913916D347586DCDF71D6792CC6
+                               BF72F6F6A9B779BD8833C468684B4480
+                               52E153D11A0CE183CB337450C4482F6B
+            stream[192..255] = 07980A2C57E9094C5334016A782C830E
+                               B59420086EF9D36542A97220A5EEFE42
+                               026B39B1F00A78992ECA17FCDDCEEA2F
+                               88A15F934A1C65EFB770C2FB9712FFF2
+            stream[256..319] = 8C0AF45C68CB7CA8CFF1AB18F2F9659D
+                               E49DB5C4E3609B50C06F94FC01C059B5
+                               40E302FA8604F030701FE3C833617E0B
+                               094D0BBF10580F7C1C7047E86FBF93E2
+            stream[448..511] = 4D4BEFAB68D63085A05C729F54468567
+                               2C2A9452DF6B4B651A29FBC29513E3C9
+                               635DFD75EAC87A5B1362E99033304EF5
+                               DF42420DFD49C1830D66F4F90928F1AE
+                  xor-digest = 9A7DD8AA5D9E9DA4F34AFBDE9D909CE5
+                               DEBC05D2F930FF08AEEE4096B2E1E453
+                               8587B88E535A217E986F31965C5965DE
+                               3BF4A7F99B3B9D938D2C1AF7DFEFA14A
+
+Set 3, vector#180:
+                         key = B4B5B6B7B8B9BABBBCBDBEBFC0C1C2C3
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 5FB2BFB5B9CC4F84D7641B4555DA4A7F
+                               C07C0053E7AD2CF2187F7F34ED4068AC
+                               6D5B43A5FA41437C05C65550786D60F9
+                               A737F44BE450A1F416C1B1A49890C609
+            stream[192..255] = 8EDCA89958225E39CF796EE587877A55
+                               F9B7A7381241597CA6280F7617A11922
+                               9268F95BB326585AB59F08BFCE8B5638
+                               B3A0D32A761C796060DFEBB5BCE859D5
+            stream[256..319] = 09601C099BAC574564E4CC6FD659776E
+                               4726FB22E0025C37873042866B913C03
+                               285EA24E37847F9AF6C838B82FE651D4
+                               EC5FBD40A256E6C765757B6A3CD08C92
+            stream[448..511] = CA5AC4ED4FBEF0D754F033B5267B9FDF
+                               3CA52B131E118174F70CD4F833A5ABBB
+                               198DBCDF18BABB0B0CC37ECFC8D93AA1
+                               5949FBB21974169B46D545F0ED03C71D
+                  xor-digest = 5DAFDEBC75291BA8F55B4A370756B28F
+                               554FEADDB7888F2834BA1EF221E917F5
+                               F631D5BD789701282DCF16FA450D250B
+                               52C627741369DA654E237B8D7F4A8BA0
+
+Set 3, vector#189:
+                         key = BDBEBFC0C1C2C3C4C5C6C7C8C9CACBCC
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E9EAE6C4903004A2AFCD05FE2E3E7F95
+                               FF8BD2888C4AEBB81CDBBCB7488C54E5
+                               B50467FA82B0CA7EA923C608074E1B45
+                               6452821FC36789C8061E99E8A0C0B579
+            stream[192..255] = 1EC898A6958F23C186261F833BB3EF0B
+                               3C185AE8138311B6AB42098E9C6C7FE1
+                               0306DADE1DBF2B1C3215DEBD88AF1CBD
+                               2D805B8006FA0DCF136E225AE3D91AA3
+            stream[256..319] = 55566604D1C85FFE1D29810B6C49F019
+                               69ACB59765A3FBA2B0B9880064606E47
+                               18BC5F08C32EFC250FEE91FB88077A2E
+                               0840615CCF627C64FBB500B7B800B9CD
+            stream[448..511] = 707821EFE4119A32CFD99F7ED7CEC018
+                               C8EE90493FD9268A83E5482DAF9A646E
+                               8765D8199A56A12ECA50775099179D70
+                               B72A3CEC8F0EFF1AFD074F04548874E3
+                  xor-digest = A51E3C9C948B68A1543FDD1F158DD419
+                               195AE7662739446D9FD543681A866A6C
+                               F09756FF4E0C59BDEFFBF98D53F193A1
+                               77D7BF19320063B8AEEC8A544D5D72C7
+
+Set 3, vector#198:
+                         key = C6C7C8C9CACBCCCDCECFD0D1D2D3D4D5
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = EAA9729F0222A16C750540C605974B55
+                               4FA622F67C71FBA40236A71AC19706F7
+                               9E3792F4B444A39C9C1C902FDBD81898
+                               096338F6A8EB7C934B9558D48AC53301
+            stream[192..255] = 3B5E53787C050061000E3622876AA126
+                               00971A76253833C53B9DABA976169395
+                               3944B5050AB17E492E185737D67581B8
+                               B1C766D50C5B0C2B0D8C78A781E77D89
+            stream[256..319] = 175C28764FEAF8396B3CD34C829D0D0B
+                               E9CE0D75E79017A96C4E7B158B171BE9
+                               4C906FD4BD4946E6DEEC3C78B34C0754
+                               9E85AFCD958AF345E0B432F33C86AA76
+            stream[448..511] = 37BDD665CD9D5A8A8190AC3EEF981379
+                               AD5311E15F853A8A89840879165147A2
+                               807AFABB6236CEA9319DB32344987889
+                               5744A506CA76CE69D9E474840529D667
+                  xor-digest = 4CAAE8F441F6EF3DB6971E274181F8F0
+                               4D7BC603E040833E77921A393EA13F0F
+                               ADFF07AEC94555224F6204874027106A
+                               6D7DDF0546F300D3E84AC87699ED40D2
+
+Set 3, vector#207:
+                         key = CFD0D1D2D3D4D5D6D7D8D9DADBDCDDDE
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 83AC8C40850F4FCA5452871C954AA61F
+                               31A9BD276D39EEC03EC5977A71FDAC38
+                               368D110C57C1A19F2A7461BBFA88E372
+                               F78103F9FFAC1361AC2D2AD84C6AA3E8
+            stream[192..255] = 48E95C2FCFC79C91BACD0C41F626F05E
+                               F80E076E359299EB5272A2F688F96F6B
+                               3147C5A19A99D562A11E953CB2A90911
+                               205A7760B5C8CD959EE6C183A8C1420D
+            stream[256..319] = 974A4DE50EB45F6144DAFFA6B4A68E39
+                               48838434497B8F9700FC42005F3C2FB5
+                               A79984CC2E770C5400EA21AA4EC05751
+                               80A288499879E50462225BE03D677875
+            stream[448..511] = 09823B2D55E26C49E42FC0820D7BA081
+                               5A7EA9380637A2AE2C0D29253EEDB884
+                               9BF4F54D64677F08A1763EFFD904B62D
+                               B3843B0ADE885C00640D16A99E28DCC0
+                  xor-digest = E73D8783F926558E0C1E1B0D3FD86CFA
+                               974CD70EBAACC0CEA2D977E9AFCCD384
+                               935584D2FFEDEA813E6234112CAA1401
+                               71E99BCFE61A7D0E430D4D3F75AA3E28
+
+Set 3, vector#216:
+                         key = D8D9DADBDCDDDEDFE0E1E2E3E4E5E6E7
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 5DE3EC7E6D724976985B426D722D93E6
+                               1F40F5F17EA14B298AC898CBD69F2BBA
+                               5705E1D0CEF7B7122362FCC0D5106D54
+                               25D51F51E29C938C592D9E862DEE9E33
+            stream[192..255] = E079C49AC8F160A9D529F30151AAA7A3
+                               1D137E03DF4C23F8734AAC3B20BF8520
+                               90E3C2529761EB4D67AEF1CC46399947
+                               1240DEE8343D6355B5D7377A7934B019
+            stream[256..319] = DF574E03ADD1DCBD0712D2748C93CD72
+                               D8488396AE3D3275E5A53CAF3EC112E9
+                               50A79494F25B9EC111FE9A7A68A5AEA9
+                               63A4F87B37F822B79D954436368D8E20
+            stream[448..511] = CCEF4C93BCEB2494EB4C70F5E301E980
+                               C494AF8C117F291DD09E3960D2C5A7F1
+                               9928C08F2F51C419E734DE9AADD25C81
+                               3579A7F0B8B367A49B97DED5793E4DCB
+                  xor-digest = 868706BC1A5F3D0BDF96E10324EC36FE
+                               01596216B0B8BBFF69C5BDAF69D0F38E
+                               FE89FFC32D34D142F413A5BEA7AB38ED
+                               22436C62F86C540101DC0267FAF67904
+
+Set 3, vector#225:
+                         key = E1E2E3E4E5E6E7E8E9EAEBECEDEEEFF0
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 45A0736DB4A28A3A6DD181FEF3485F2C
+                               918C65663597C49F4FB23CA550C77CAF
+                               7B331B5D183844278E0D959EA024CC21
+                               CE1A84923E6E782472BA1645BEDFC60D
+            stream[192..255] = E9EE0DFD717F72FD8899D23E87E77DD9
+                               F9DA66B4645AAD8D8C3B489B0A637449
+                               80020326469B4C6403012B6E315CD35A
+                               4344934D720467F30B61C8AEE5C3C342
+            stream[256..319] = 94A2BA2B744CB83A29004AE21470212F
+                               67C2FD18F227FC017131D7F4DD0AB412
+                               48C59BADAE2E408584DF35C603192E37
+                               344C52664DD68B9231661F304F483F41
+            stream[448..511] = 6A29174A1099BF8759D2F5F9BA60816A
+                               B290252AEE08339BE0021033DED03C46
+                               9C8E28AAFAFDC67A7F2219C8942B004E
+                               47263842BEBB47EC6B0666ACCC884591
+                  xor-digest = 7A7411EE5D174907B1138575FCC7479F
+                               AF3437BBF098CCB5D8D25F49E6788374
+                               CBC9CC5812982CBEAF59111813430BEF
+                               56D9DEEDB6C935804013759CFAAC40E4
+
+Set 3, vector#234:
+                         key = EAEBECEDEEEFF0F1F2F3F4F5F6F7F8F9
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C430C2A9FC44DE1563B1679C1A2DFA98
+                               91D01A302C5165EC13B26F6EE4F25437
+                               264AE9E18C98BE112BF560C72024827B
+                               85665C491C47BB396B5AEC66CFCCA371
+            stream[192..255] = 60F3A13B9EBF8784CC81C132E004A179
+                               BEA0606D4C2C830077A50004FB0487E6
+                               E179D81FD9784DC3783ABF86523FE4A4
+                               68930272980E3B46F865E4729DD34773
+            stream[256..319] = 44BC861136F6856B1C74C1CC13753B82
+                               A75E34EB40C518400B507D99B42E488C
+                               8A1F2F590E029EF48DAF2674FDB053AE
+                               5C0967923102EB964602256F70A9CC9D
+            stream[448..511] = 0EE3ADBC4CCC63A8B67C7812CD294183
+                               A2E9D4EF0D65F854FE66CF9D76A34F91
+                               867B27336F8EEC2E2CD30CCB98AD5769
+                               77B07C73C833B51753BB9B0DF08C4834
+                  xor-digest = 7F848C96AE9310B5282712493AD7E13E
+                               2B4581545E625A4DCD98576C75835058
+                               6C621244B6CD439F8E62625ECD9460D3
+                               A18BC2F5DCD9FA7E8CF7880CCFD1A44C
+
+Set 3, vector#243:
+                         key = F3F4F5F6F7F8F9FAFBFCFDFEFF000102
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B9B3501C75EE296AE858573B63C4888F
+                               72B18683CBCD6B95602D51E4388D6DD3
+                               7129169A5209202E2C6EDEB5026B6511
+                               55E4747DD706DDF248A8705D50D38A29
+            stream[192..255] = 12F90D1028010D8296DD0D6ECC4F2354
+                               89856C315555279BD0A4E3161178AAAE
+                               BD849EC0A90903CCFE9DC7CC821C1CAA
+                               D63A45A1D0C0247F1FB1423877FE9A32
+            stream[256..319] = 9F0608162C6315D206B5EFB0E40291AD
+                               E882445B9F34154F6E21B9FA23356DD4
+                               79DFFB16482F6A4F28A8A0629E8B1D78
+                               EAA473CB126FB3727B826B4B3D6175E6
+            stream[448..511] = F26FAB00C37C03AE33209E19F865B135
+                               115A5E254A6B5C1A4896987EAC35C2F4
+                               327822E165AC6BF99F535055ED74833B
+                               C1FFEB32588D8995CEF0708E2D3CF832
+                  xor-digest = 87243F1D4D08D7EE39213D1A4B9E2458
+                               368339A11E364345B4367F84154B36DA
+                               03A3728A7EBD4237897F9D1A19CCFE92
+                               B9D67D3A4A755E6EA8382041D4827A17
+
+Set 3, vector#252:
+                         key = FCFDFEFF000102030405060708090A0B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 05A90DAF1A6B6B60CD3B999A11FEEE39
+                               6D38983ECDA326EC9229D2A1EC722B0C
+                               3C0539DDBF6A4CF62B9BAFEA6C60A29D
+                               4AB63BBBC88987E9A74AE2F71B1E8DE2
+            stream[192..255] = 0AE6673D9F99C5EC9A4532B2B9786CB9
+                               E948A206CB992335FE868BB2271DCA5F
+                               9AB75995A7E7D46F8EA6693765C93D90
+                               9D41C24EF4856252986DDFCBE65D2D11
+            stream[256..319] = D8B07A866003059BAEE90378AD5EFFD5
+                               2732755E79402B50BA0F26A038B3D9C8
+                               1481C19080CB39FE840F8E7313D0C034
+                               9FEA4AA4801225630AAED3E522D6F920
+            stream[448..511] = DED21140E5A3C0C4615D7153DF9381F7
+                               269616817A273BFD984AA5E7CD9D9CA1
+                               9C28E51F4C03C262F5BB4175C799236F
+                               DA69AB27590857C0F270CE4BBFE02D5E
+                  xor-digest = 2D47DA3161389F5F54FAB37F391C21CD
+                               63A748112A1AB415670524B6CB93DA0B
+                               6B54C541ED59F3A54DE238C3FADB3236
+                               3871F6DB1A507B33C1B8F280B0C04B1A
+
+Test vectors -- set 4
+=====================
+
+Set 4, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 114265E078311C062B518148B4530F73
+                               DC9B95DCC41C214F8C9486473DC46847
+                               71819020010586A750426A0E633BC787
+                               6E228E2353AC0A68533C85A742387800
+        stream[65472..65535] = 196F53D41603BF286D1D11F012E564E9
+                               3C7FEEEC9539A015D49475DD8CC73C84
+                               2F85521B4DD9789A813A59D444AEC702
+                               164F669C59B43B5115202D08662D4EC2
+        stream[65536..65599] = 8A7B672621B0B77E8BA8EB9A71DB4558
+                               A78364244F182519F89D25D3012CF8C4
+                               E429DD543C8DC56C6DB8FA5E351BF615
+                               106B51F9FD00F54018A94DAA91D76715
+      stream[131008..131071] = 33EC15BB2C553646CAED9ABD83F37ADF
+                               AD3B3313A074B69FEAD405BAF897C3A3
+                               E12BFB2F4CC3136ACFDA284DA1E780DA
+                               B3E4D34C053302989FE6A79A1EB0F5D2
+                  xor-digest = D899BF7CD2972EBB7333D4E57DC809A1
+                               B717373577B15544443915B36ED162E1
+                               25452584F3E0C2B62164092219FBA924
+                               31C1FF2A14C8E2E437427DACF80A200E
+
+Set 4, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 8EA023E23D94434EAA064A4BE52866DB
+                               57EFB7B200DAFF5AF2AA72D3E55EE5F4
+                               5060FA89024F259CD2490C628452B1F0
+                               91020DE10263BA86838B2E388F5AD040
+        stream[65472..65535] = 5BE1EAE0077FCE5C2C21120EFD560A96
+                               27C3DA9462BE42580065C9E51B7D36C1
+                               D9D717DADF4A3122A08303A8E27721E2
+                               1DADC91138A2461713998AEE26F811D5
+        stream[65536..65599] = 482694A9797978003DFDA5183F00FF97
+                               9F38894BC92DC88418FF68156117A2B4
+                               EF10D76923A734ABCAD1A5B4224BBD08
+                               836E3765321045C3BF6A352371F82CAE
+      stream[131008..131071] = 614BC8A38C5F9E8507595E8F5A03484E
+                               C9DEC6CF52DECFAB008327527B822365
+                               A2038FF09411D7B952417C8C7375289A
+                               244D50703B73577EC272827A21BB917F
+                  xor-digest = CA9E6EC13B679609EA778447EEA1157C
+                               B366A08AC5A96A73D0B5E182DF24EBD9
+                               FC297219A0AF67591BFD68B1721B5970
+                               8EBEB3655791107FD2A0F2F2E341FCC4
+
+Set 4, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 5BD3D0625CEAA75ECFC9828179F7B73B
+                               288A208D60A2297F2C328DB0789BC869
+                               4E50F50E8797F8C7A49E24F72A3AC359
+                               796E6188C71A9B3DB88DAEB1BB2C77D3
+        stream[65472..65535] = 726C7D7AD756CF567E0E8F812A282675
+                               7E75D593C7FCBB45F842020AD59F2B53
+                               888354CEF541411B92C3AF6D57ADE7E9
+                               273805927DEEBE552B32D10754C9D2E5
+        stream[65536..65599] = 5703464C0AED290E65815D8D04098B0E
+                               22D2FA825ACD4391B56CA64CB8201BE5
+                               7B4FB9ED6BB7608BD820436146339559
+                               E7464BC13A8AE3167AFCDA58E3C017AE
+      stream[131008..131071] = FFC5787A10E340B07D08160D2C4F653E
+                               407857845A0D68D1EED8EAC0116CC376
+                               E33AF8A1120D8DCAD6C86B757AC50393
+                               46AADEFF012BD0DAA294DD240D87A98C
+                  xor-digest = B3BAA21AA82617D3BB9C2612E177CB71
+                               51A51790D97FE33C3F33C01B32091758
+                               5766643C125293E1F75D6BA3C46AB381
+                               75A2A4934D4C115A6A1547932B077A58
+
+Set 4, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = AC5DEC8B95C89F4794B7289C69FABE29
+                               F4AA64476D057873D87BD524666F62F6
+                               B71B5131BFB897AE64F2D500437E1798
+                               A742E7B7D06B8089F3DB2453D008C554
+        stream[65472..65535] = A2F58800E24BA8B754C64BAD9252BEC3
+                               ED1273598EEF4C6FE42FE2CADB81F220
+                               26A90BC88B43F2F1FD2E054E8EEECF57
+                               A114D087D5228CB276FD5F4FA3ECF4FB
+        stream[65536..65599] = 5C67BC8E188170A57DB85ACD2F7121A3
+                               7D83F1A708ADC54C14064A9559FE7E1E
+                               3F9E60B9670EA4394521B11D8283EE42
+                               12874323628EAEF0B90FC4653106D68F
+      stream[131008..131071] = 8AA6F8A20F7D4A0B7EBAF6A7336B6D76
+                               731E65DCCD179BD53F6B879E70B8776C
+                               6A8EA30BFF09BA3026B3827EDB9F9C2C
+                               0F96655D8B84EF725D0603F8CCE3C2F6
+                  xor-digest = 458DB66B656320F5F7E4FEB12E748C0A
+                               59F0CD8A7ACAECC25479C309628EC0B5
+                               3B441B831B484FD3180C52F63EDA1858
+                               7C232B195356996DC29DE6DF54E5BB37
+
+Test vectors -- set 5
+=====================
+
+Set 5, vector#  0:
+                         key = 00000000000000000000000000000000
+                          IV = 80000000000000000000000000000000
+               stream[0..63] = 04740F92C2470701F289669A25BF9092
+                               EB4212FEACF66DAB6B1D520977945F8C
+                               6D350BF26A1CA35EB37FA53B0BA2CBF6
+                               6AC07A8C75D494B4B8281CFBAD4937BF
+            stream[192..255] = 5E47F5F506AA34E7D296C6911FCD3D43
+                               31A032269214ECEFDDB492C47A51C4B4
+                               DE9EF0A63A6EB32AF1DF1C5576A93F19
+                               02B7BB89F10D8C7CDFF9C097D3D49148
+            stream[256..319] = 015494CB3CC9BDE8A2981B25C06DD18B
+                               52FA7B94CBE24C152FC60762290329C9
+                               E58C4E5148585F417733737059E310D9
+                               309D0CEF48D2F1589994657A081BA6D7
+            stream[448..511] = 3B67C1B37D96E1076595660D61340EC8
+                               DDE8F492134270951D9D4B260C8E2254
+                               A7FE8C10DE837A617A8E261FBBF42259
+                               C636B3DEEA0F373FE7C2CA2B01EE3FC3
+                  xor-digest = A8CC89F06815EFF6A91CA276BEBA7F41
+                               75F842F85BEAE99F4335A3B85FB28394
+                               8B7EE3C659274C6B784035B94886BF9A
+                               5C1483941B20170EE3A374E39006C09B
+
+Set 5, vector#  9:
+                         key = 00000000000000000000000000000000
+                          IV = 00400000000000000000000000000000
+               stream[0..63] = C25BA6DE4C87FE5360BCDEF864F3F778
+                               598A6A584325D5E6C44EEA4464D7580C
+                               9B8D42B5B3634F739D6A53D15FA41070
+                               D1DD4621BF87F53F42107618D9742FD4
+            stream[192..255] = 4A3808B0619C9D94E19F3AEA0BEF3839
+                               21D7E2BED05F1128A82D9DC010654ECF
+                               65199A645606CC44FDAE763694E6757F
+                               8FF864CBE4204D45102E465F16CAB8EC
+            stream[256..319] = 3097394E0CD0A9DAA28EA873566E42A8
+                               710C28366C2B41B6BF6687D881094676
+                               9970A5BA54D28D7BF772C4FED13A9F5C
+                               6E7AD3F6948667D6C2DF981955F73293
+            stream[448..511] = E685BC2ACD3A67791416E78699C83D31
+                               852EBCB1C1AF71B926D9161CB6D894BC
+                               8C5E85C7E30A0896369BAE50C1112D4C
+                               CC583E44A8275F44B7ED140E9721C7F8
+                  xor-digest = D9B51AAF4A9B75508FCD02443EFE2267
+                               1148C73264776B5513860BCE8547370B
+                               2BA66E82CCDB15F3DEB0F0728411B765
+                               1A098C23202745C19B045C58AB196309
+
+Set 5, vector# 18:
+                         key = 00000000000000000000000000000000
+                          IV = 00002000000000000000000000000000
+               stream[0..63] = EE43BB5B79EAFB54B823DE95B71F3BD2
+                               F2A7CBB6D28E9BED590C20A2C52F9B2C
+                               74EEB9A1A48474D5DA4964EEE0BB98E4
+                               88030E213A4482BD1A8CAD4CF8A962CB
+            stream[192..255] = 150C4D68BF29DD27A2E6FFDFBD6984F4
+                               3AB56AACC08AC0C0149008F0882292EC
+                               A5359CCF4C257ADD4FC535E41D6F67CA
+                               E5210068F77A5D5F32A23B17F79EB7A5
+            stream[256..319] = FEA319287C29AB84585D4BF38DCFA71F
+                               A36253AD7F4BF58398731713614D0047
+                               F85A465C6915E05232A5FE5AE7A559EC
+                               42733403ECF6B11E4D5E8F4A8288A3E3
+            stream[448..511] = 79CE66DD3F77D40889906EAB1F671B2F
+                               98D9FBF8693C1EAFC89D19209408F3B2
+                               7CD83CB3B9F33151DD4A8D79911255FD
+                               3CCBA14918744B0ACB93A5F96AC9AB38
+                  xor-digest = E1E3F49B342F873263F585EC34969176
+                               2CC46C17FDEE0B32224BB77A8EC82A87
+                               816DC612439E998476F50E876481EE6C
+                               B32ADBCF6A5D50FA16355AF63AA30D66
+
+Set 5, vector# 27:
+                         key = 00000000000000000000000000000000
+                          IV = 00000010000000000000000000000000
+               stream[0..63] = FB8F4925A4F922119A6F29F8DDC2338C
+                               0AEF333B55919AF0D0D9B1DB61BA2E5E
+                               4CFB394E15F6A78E01B5C4AB043225FD
+                               9C8F50AB1BFDB16F944C2660995AA4DE
+            stream[192..255] = 87767D451D81D5B40503913508C2448B
+                               7CC093982642089843D7D9C3DA05598F
+                               7AEFC5B70ECCE327B20658D6301F4D6B
+                               E58FA5CE0525C9CE8E93FC0B387AE5C6
+            stream[256..319] = D146E4312CC11F11916ED9FF8EA8ABCD
+                               E0736DDD0A8AF3E067CDED397E429D30
+                               8F2DBF848C5C1653EA969B608CE01275
+                               53573C88DDD32937EF6F8B0864C581B4
+            stream[448..511] = CE919096A83BF3702D8899787DA7BC23
+                               43F1F10833F16E3EB467440B4921BA1D
+                               96845B6B4141E1CA85364E2D508456A0
+                               E399DD048E72685389FD7EF3F78B655F
+                  xor-digest = 00333EC3A59AD0B8FCA054A08340BF91
+                               906512917E72BED76BEFFE29FC011632
+                               082CDCB1A656FB817F968E26063279CC
+                               ABA796307912984BFC267325DB84F621
+
+Set 5, vector# 36:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000080000000000000000000000
+               stream[0..63] = 202723F8212AB20D9369C2E1EEF8553D
+                               C468854873D04FDD32641E324DCB4EE0
+                               883AC1D40D7C9C7783DF4132093724DA
+                               113B1CB12144E00509FD5D36957A4E1A
+            stream[192..255] = E6717FE0A77F9043607A1A7665716225
+                               C8D417FFE2CD7572083C7C552B79DB6F
+                               ABEBBC2D4D36AB319407982187C248F4
+                               83596AC071C0B0CED08686603B024E7B
+            stream[256..319] = 8C59D97F7A093EA2D0AB890923AE4DBD
+                               D40C33508838A3966FBA360E776670C4
+                               DEED8BC8CA57592463781550BCFD1E28
+                               818E7C33A3AEC43775ED0A984044E9D8
+            stream[448..511] = 0A3DC66754E02423C6EC1C1DD26CE11E
+                               FD70C386729C8290DF358C69087CA7DF
+                               D11F5E0D37A313F74B09F29C552CAC0A
+                               5621556828B0145A6A1D43F563AFF672
+                  xor-digest = 6673BA5866E8E96FB48FAC88D307079E
+                               77AC03692B23070EB5BB9D04FA94B9C9
+                               6C2F958E834DEB51C6ADCE432BFB9632
+                               9B3151E0A89EB72019A4522233B8FFE2
+
+Set 5, vector# 45:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000400000000000000000000
+               stream[0..63] = 95AE241C4E9B6690C319D1FD828BE454
+                               52F18F061C1B1E13AA409829E194D70C
+                               AD5BBACA2738B508A5398DF6C2552497
+                               6D143DF0405F68037C285A0E19FEC9CC
+            stream[192..255] = C0E2D5C6B614E4A498F46D5399DCE7EB
+                               7DFAFAC62794F5C39864C521B8DB574C
+                               149E35D1F0EA36EA7F24EF8FD855FDCB
+                               9CCC79F1ABB13EC33E00A9E137809C05
+            stream[256..319] = 285907400C1A86AA9942ABD7BEA8EEC8
+                               BB6AF2F9667D424C1DD56349C99FC65E
+                               8A00893AE529D7BA492089EB6B525964
+                               E9CAF15221A342C4F88697D818AC0F1A
+            stream[448..511] = 13D511737F3A092643E94E74F6C76241
+                               0007158FEF40C63B33E10360FFB3B152
+                               8BD8B33093D722BDCAC1FA99D16D1C27
+                               6E59E428601F256542BD3E7A4A135152
+                  xor-digest = 1D1352487AB5081A28DF23B1B19D5ED1
+                               192F08964E4C0F048AFA9CAA8BF17185
+                               D7B97AD6003E2FD2DCCAD492FF3FBE5A
+                               5CD7AAC627DFE7CC6D0972D423B67128
+
+Set 5, vector# 54:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000002000000000000000000
+               stream[0..63] = ECA0F29C3F5C4D62ACBD601C3042673F
+                               6F8B17C946FE8FEEEB0089059765F067
+                               5AF3E5DADF6DECDA20F72AF486E7E967
+                               40B2DBF22B57FCCDFE571B2D8989C95B
+            stream[192..255] = D2BDF6ED912478A3C53713389C9DFA5A
+                               9272D030543295E8CF6F0929F1A56041
+                               EA22BD04E0DD810F43D9D28D94254F04
+                               F73DFF3B766DB55100EFC9697FA844C7
+            stream[256..319] = C7CE1CD4D8C42FA36724A49107A78630
+                               A60E15673A42C57B609740EC8DE78EE0
+                               B48F2644DC0DD1E80FB8326DDBCC7191
+                               5E6C8DEEFCCB1FBE1456532840A89DB6
+            stream[448..511] = 337650A0B03D30C9697CE85449B0F995
+                               668FB2B73E37E1A550E07632F9F5AA3B
+                               04D61AC41F8A830299FB8F70FAA0419A
+                               42C4589D71C965DDB3A9D000667616AA
+                  xor-digest = 7A26C50BA37BD9F38281FD2DA3CC14F2
+                               E1FFEEC9D7776E87D99053B531EEF792
+                               0C0BF834EA9A0065AF38422A40A31BEF
+                               AFAA17AD565F685BD6E505C7E02FB895
+
+Set 5, vector# 63:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000010000000000000000
+               stream[0..63] = 567919917583CE03DBDA69907CBAE562
+                               107FBBABB4DFC81A3A15438C94AC0C28
+                               8CC35A91DED9A79ADF4EF2670A55699C
+                               000994EF33674B578F5D77928A43416F
+            stream[192..255] = 13D0EC5B7302C0D8AB329E7AADFC3FDE
+                               1D24A80B751948C4BCEF516D94DF7AB2
+                               2B1D9E076BBFE367CBED341B2A5A3BA2
+                               D48735F83855460F9D9953279BFC2AA8
+            stream[256..319] = 5EFFE922E2FE25410E8050A973C3FAE2
+                               EE372E9686B6E7B35294B52A579CDB43
+                               9D5CA7F1EABFEB4303DFD7DFBCC812DB
+                               9D70CD0698D1ED051E1E32C855EB39EE
+            stream[448..511] = 91A01C0EF63716515DB8B71273CA4399
+                               1654AAEF2AFD4DEF25E21A08D5385766
+                               D8C29514065FFF00B07DCB32D1A20830
+                               3C3402963EF252A4CAF5CA31A50BE591
+                  xor-digest = 9232F83FB054098FBED8474939476CEA
+                               5E9FC269E7B248E56B14F56CB396BE74
+                               C2B2203D1802D9515EEE232FD612FE21
+                               11C291A46A89D54B2E5437E643239636
+
+Set 5, vector# 72:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000080000000000000
+               stream[0..63] = 507958BFA08EB41F4D18F519E36FC476
+                               5BB8DC6CFCA36290CE9AB8B165D7AF72
+                               CBF49DCF8BA2D145D7935EDD2CD2242A
+                               7B7FCCB85B4C8625532D84B4BC602515
+            stream[192..255] = B2B06A7C3977D4A1A39892E832A32A55
+                               3EE6E52DB24DC453835893A55D0FF3A2
+                               949B8B96688237E13DBBB2D0C9038AFE
+                               8B9D18CCAF62019ACB908499D292F280
+            stream[256..319] = 1D28AADF7B262A1EEEC11D39F4325CAA
+                               6181F9FA1A6C65F3BEF4F1614B0DF599
+                               EC92E5B6B42A931352965CFFC025F68F
+                               DB2D6D0181F259F12989E5FB23ADAE8E
+            stream[448..511] = F60E3DAD5004E31F6DC89292ECF517F1
+                               CD18AF7E79E775334F4644A09346AAF0
+                               F2B4F5C1DD03555A6D27C43AE53EA7BC
+                               7167F793190071C7AB7B5330A6C6CAD0
+                  xor-digest = 5A65D44021E67626E62FE87B8547210E
+                               F736490C0D51485A8EF0E1CCBB512DC6
+                               0FC18114A29AF923EE3E85655771D6C0
+                               7CFE342A52190C540BE3409853F12065
+
+Set 5, vector# 81:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000400000000000
+               stream[0..63] = 2416B634134170CB4F67F431BC94612B
+                               5F2F72545DAED2356081C91A26554614
+                               5FF2526D8D8FC7D02D8BCDD9AE03187A
+                               9E404C360E115CE949667987AC73624F
+            stream[192..255] = 4D456233EC7E761891A56BF9F9659533
+                               22375C169D7F16DD81D8D69B12092F47
+                               09703B85AA3184827935B60C1E5987A3
+                               C4C2EDFEAD4F777B53989C469B575EB4
+            stream[256..319] = 5F9CDDCBE09CD759B346AAADA2436887
+                               0D47BD8859CB9225B61AD9F99197FB14
+                               B5D625F5DBE0955DCBAA5B874A7C89C0
+                               07BF926AEE571CCD7E20635ED4FF312C
+            stream[448..511] = 642391D8851A9BDBDCA37B9587D5D0A4
+                               877EDEC31D6EB78AA3F1E068B0ECE877
+                               D83EA29906D0C0816EDF7EC5BB417A3E
+                               F3DDAA2145CB37CEEAF8C07DDEE0AAD9
+                  xor-digest = DF93E4E01EA55D18AB8AB1A927A5B5AE
+                               9ACB871B7493DC283581262771852013
+                               EE54288580A03B3991126BE8BC20C5D2
+                               230F00D8216CFB632271750F4FD2595A
+
+Set 5, vector# 90:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000002000000000
+               stream[0..63] = 4981C83E26859DEDB32D84C7BE32830E
+                               784376A12FA6D0077D4CB47ECBA08A92
+                               C841D45D6CDAA3F1FB48C6FE747B0F67
+                               1B32C2B35BE69497737FE4B98770DEE9
+            stream[192..255] = 1FA51FFD0360615EFEB03042AE8E4210
+                               D3D38B4EF07536BAFE43C0585818F012
+                               8F8B3F8CA8DADBDF049688253066C74B
+                               01849C5BD85DCE27C0138D24E8B8B198
+            stream[256..319] = 2D8C58008EE94CFEA1EC545C26466D39
+                               D7BFD5B226E32F1270B5BD3677818B7E
+                               CFD98BDEA26488248B10418C1F854159
+                               8F42C6CC237885A1DEAC5C33F22C27CD
+            stream[448..511] = 94502058B5828AE4F4CDC0516E5B5143
+                               1F07EE1ECAD7CA266C931327BE6BF1B7
+                               A34810220CE00497D7BB9600FC524999
+                               CDEB6DDE8919B03064EB56B3766DAFCB
+                  xor-digest = 1DEDBE0B7B6099DCF285B3C30E91AA0F
+                               7859496E034A1EA1AAE3D3D13C2061C6
+                               0878E595B63D849B7DB77BE7E0C08157
+                               94232B645BE946E5D8278B14427172AD
+
+Set 5, vector# 99:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000010000000
+               stream[0..63] = B84C72BF69B601FB1804CE333C5A2C19
+                               25BC8A5877DF9E574295380611D03FD2
+                               46D2EBB58CC6E918F4DB1B1A0E39642B
+                               D6B39DC76764E18108497E4CC4394057
+            stream[192..255] = AA84DF8195B3F7564D0715517476085D
+                               1B40511A72340DFEAE5134C7BB8F39CE
+                               03E6EE15217986C7E4788453EF054027
+                               8CBF6336073092EF661C13C7EA8B4850
+            stream[256..319] = A7F0C413EE143F55C6356519AE620A9F
+                               4CEF8432C51E2677EB5D700CE333F314
+                               ACA374D86A8FD4A67BDC31C1B0DA2AB1
+                               B20E6DB91E7F85DC13E348314A4FC782
+            stream[448..511] = 3445E08F13D09A1AC09EEB65451F4504
+                               0AFFDE94F6C2667BC4D8FCBECD6C6565
+                               F09FD05EC660DD38307F856AACC95549
+                               AEBCF31B3FBE84FFB3261D7FEF7A3379
+                  xor-digest = 360199B22EB28401FB4F621E37800801
+                               FE69C809D83BE29A50FD1A476B6AAF02
+                               54B1F4B048CB6423182C390B8EDFF1FD
+                               9CE49C26727F0D68EB837C19F58F3F42
+
+Set 5, vector#108:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000080000
+               stream[0..63] = BC618F4A557E5B7CB75B3572FFC31CD8
+                               4DB96FD22E281C198DD33B5E9E419099
+                               BE30E84ED61C0EDEC04B1E16E06B40E2
+                               372E0EA1A48DC55BFBFBE3355B566AB9
+            stream[192..255] = 33372015C7E5749D98A92CC55CC22206
+                               90BEC9878D3CA0AC50765D0B4457CE50
+                               9BCE196BF0388599E692B99EA8169474
+                               546F10891A3FCE22DFF0AF9733C2A2EE
+            stream[256..319] = 382684F74B0F02F7B987D37F6BAD97F4
+                               20B4811FFC744CBB9F00C2855A609FC7
+                               7CD24D0137304B95217E25FF45AFA4CF
+                               28E4335D29DA392D26DBD341A44C082A
+            stream[448..511] = B0B2B619708435C5DB45FFADD2FE4449
+                               E603FA9785E1F521E364DEA0B127F72F
+                               6C8A956CAF2AC9ABCE9772ECC58D3E36
+                               2E758BDE3678D4F4C9804CAF11129BE4
+                  xor-digest = 80FC64E2441F6CA9C0F4C207007FD0E2
+                               5F1C0514D203A1B01A6EEFD1055CA355
+                               0174FAAD47ED0956A736A9404164ED85
+                               CBEB31F80561AAFC4ED8EDC9829D83A9
+
+Set 5, vector#117:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000400
+               stream[0..63] = 69FEF0D5DD7CFA6590821B6C12E239E3
+                               5DCDE7B218A66CF3C75ED278092A6228
+                               143EC00BC16DC2FDB8CD9DDBD802AB56
+                               A4011F6A8CF432F2D34657AB84DEFA4C
+            stream[192..255] = 312EBF427B3D22A22EE1F85D89E12AE7
+                               07160C9BBF4073E538171365290B499B
+                               8904B01801CC897FF09A520449A44D0D
+                               34622DB8477EF1E73DCF15417478FA03
+            stream[256..319] = 83CF222FDBEB77FFC6E282C1212D8D1E
+                               014865E9C1251FC07E901A41A50A3AF9
+                               F8E130394F621B739578C7E238866431
+                               10827799C75F08C47664B09B477F31A8
+            stream[448..511] = 4130A8F8015F082EE8712B6D61178CAE
+                               B1D3CF90AC2DB9F2D402F65E8395DE95
+                               DA0605E8540E553CFFBD029AD5BA8FB7
+                               5950C2FB29097E13ED4A1B1818E0D07D
+                  xor-digest = 21FA07F8AA2FBC12F5B2B14E034C2AB4
+                               54D7D8DA66EB0308D9AB024DBFA414B3
+                               38F36D188D33C71E888FFE1A6AC620CD
+                               55B33C1A146AB8FD275584589BD65606
+
+Set 5, vector#126:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000002
+               stream[0..63] = 0CF41A77C30118D0931FF3142132A627
+                               7A778D3BCF7466EFE56238B166A57043
+                               2DB3B222523330233F81836282A27B40
+                               F6823BD076D84DC3B831DD78828F0FD5
+            stream[192..255] = 38A0C28325566FBAEF5AB3D50D54F407
+                               91182DEF4FC945992AA0D62134451914
+                               F07F16E86E20DB119692966E6CD6165B
+                               79BE7CE6C45D1248F2E0432393BFA726
+            stream[256..319] = DE91DACF57B176EF6E59E485DF02A20E
+                               3A4EE5FF44B1AA3D7F36265221CC71EB
+                               FB9565AA4F269B7DBF3CB9631CCBAAA4
+                               BBBB6BFABB97E52954958D4E7A283F20
+            stream[448..511] = 8FFDC8CCBF864721D6C98E1896FA052D
+                               15141D9C3DFEB48AE91B2436C5C3D088
+                               931470CE951B66C38998F15CF23BED01
+                               F6D95D84150D482C0C289A8E5B2C7C10
+                  xor-digest = 03DA7ADC3E5931928D3FD89E1E0876AF
+                               9D4CE659175E671D6D80EEA78F241AB2
+                               86CE3C26DAE267D91DB556AE0CAA60E0
+                               2B481282E6470A7A161AC8E84C2311EB
+
+Test vectors -- set 6
+=====================
+
+Set 6, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                          IV = 0D74DB42A91077DE45AC137AE148AF16
+               stream[0..63] = 425A5E6F68EC055F38383ADC5CA9C048
+                               D6455C56A5ACED215E22665185E497EB
+                               3A2F5C0D45057169965EA37FE19F5D83
+                               C95C4BEE11E8FA89545A38DD9D18AD6D
+        stream[65472..65535] = EFFA27F50B0B4C4AB3C7855CD5DD9EFD
+                               B61783161678C9728B9032C2CB09A0B2
+                               D2578C53BF3C3E67D382BC89D824D63B
+                               20E62F414E4AC36472A16F4992DF4496
+        stream[65536..65599] = 0111EEC218892B446FDFDBA9D0C734DF
+                               C209D35FA86C1BEAC0D266E5DC4B3243
+                               68B4263BA7A3517805D1501B36450FFA
+                               1544812EBC0B9DDED93F5D45C4D83FFC
+      stream[131008..131071] = D966650E1A27DF3CB71B1E64CD3E7EEC
+                               2D3EEEA2953E2FC5571B4380EA3BAEB5
+                               3F014B4EE071A426E4A518E1AF335BD3
+                               76309236760E0DF6184B3E34BF861458
+                  xor-digest = B234A4CB646B0C2792023EABCD3E974F
+                               1E5BF1D5DD8E07E5C11BCC47BF1F1DCD
+                               BFFA3605A37008813029BFC32D1EEC11
+                               FE775D9889560C847C79ABB5C7181E6D
+
+Set 6, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                          IV = 167DE44BB21980E74EB51C83EA51B81F
+               stream[0..63] = 5C1C44F155CF8595D52D003B7CE6C584
+                               F04708B55E3A8B952379A4F03C6C5118
+                               E0848F52C846BEF459335EEF7033CF25
+                               AC643ED139A9383B9DE13A5652E2B754
+        stream[65472..65535] = C4710CE8066A43B7E7FFBC8190CA79ED
+                               5E14AEC2C153F83966322553D5D4824E
+                               782AA1C91400027395D74B3A39DA1925
+                               C6A757E36B48A8F1FFF12321602379CA
+        stream[65536..65599] = DF29C91A08AB080662764B01223C818B
+                               27DCB638FB2535DA034D325DF996F57A
+                               7F4C67BA94C72EA6C88112E575D55906
+                               3C900A87B205A8144FC1717D5ECEB77F
+      stream[131008..131071] = 63FD83511C8C39ED3968EEC5FD281279
+                               70626BB91625CEFA381AC48E166778DF
+                               63709701FDD99F4A547D8CD6F7324B29
+                               A9E0C025EA1BA007246941D3566D15F9
+                  xor-digest = 959850E75A99AA747502E7BA9D19D870
+                               5895593FCB7BFD7A7DD4FB218F17DC6A
+                               BC8B96520FE83F287429BE3B87D35D78
+                               C6F100D8A9561A149297CBC44306E5A4
+
+Set 6, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                          IV = 1F86ED54BB2289F057BE258CF35AC128
+               stream[0..63] = 696FF80A8A547A2E215C6E0572821F70
+                               201A090460E7B36A48ED5CC976417DEC
+                               EE32E7102AC764805E4A1BED3DF7D786
+                               0B3BC625B121B5200629AB58799DC406
+        stream[65472..65535] = 7BF69658F0EA9905897C1460D30333D8
+                               DA83E3F1377FB75D015D927365C7316B
+                               307CD91A7167B87FB13DBD4739F88A20
+                               F7878C2A483A4FFE1AB4A60840EF3EEE
+        stream[65536..65599] = A55326496CDE23F447CA6A4D1BE0182F
+                               ABC30D61C7A9E655CD99273232CA6589
+                               FDDC8179038B720D5A12CB698FA50B28
+                               9E6CF476ECE2DE213F44F9F23E8AB4FF
+      stream[131008..131071] = FB47C745519AC58C91CA9081B1DB0CA2
+                               8662116EE04AC6C4171A4BD11572677E
+                               DA507990B45C145DD21A56E1FD8F7AE7
+                               1BC54AC550309631C12A80FBB27187C4
+                  xor-digest = 3B3E44A1154CA7C4B74A432D0427AA6B
+                               3B6D81FA45AB9D3A37CF075F57E62AFA
+                               15DCED3DB08B96F48A12B176ABF203D0
+                               922DACF266985DB9D52A9D4AA00614E2
+
+Set 6, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                          IV = 288FF65DC42B92F960C72E95FC63CA31
+               stream[0..63] = 0A12311E99506D44616A24E124676D15
+                               D06BB6A73EDDA4E9767952E1FF698BEC
+                               593FF8E2422D80C9C55DD660C6622CA9
+                               86140571D0958C070E2A8929C24E5562
+        stream[65472..65535] = 6BF87D409915D407FDAA06FED0EDA87B
+                               8CC4F20760B7669009795EC87DFA6BB2
+                               9825706AA3ED93F4197B28587D042223
+                               7D1F6761D7F8D8F8B3E0421AE9EBB9BF
+        stream[65536..65599] = 290EBBC73FA33ED00E0BD9CCAE6ABDB5
+                               EB5E86C533BF3E69D24AE720D0FE30AB
+                               F92B57C1EBAEBE8DCD0DE7EBBA5E8CB6
+                               67669D286E0B8F8A3A53C3192D2DCE67
+      stream[131008..131071] = B6082022254F783C501C08370D8F5678
+                               CA2F08825D4F7D09BF0868CE44DB1F5F
+                               AE8D30C6380C3A20B1EEBD4083E58BC7
+                               A4EAEAA9D54117253784E4917C3A7039
+                  xor-digest = 2181364DEDEDCA0C6F51A4634490FD9E
+                               3E89D0D30AE94F5E75730E4B9E82FF68
+                               5D82723A59CA0879C6B80588AD312CDE
+                               18723B80828EA4914BEE062A68EFDCBA
+
+
+
+End of test vectors
diff --git a/crypto/test/data/hc256/hc256/ecrypt_HC-256_128K_256IV.txt b/crypto/test/data/hc256/hc256/ecrypt_HC-256_128K_256IV.txt
new file mode 100644
index 000000000..a4784edac
--- /dev/null
+++ b/crypto/test/data/hc256/hc256/ecrypt_HC-256_128K_256IV.txt
@@ -0,0 +1,2783 @@
+********************************************************************************
+*                          ECRYPT Stream Cipher Project                        *
+********************************************************************************
+
+Primitive Name: HC-256
+======================
+Profile: S3___
+Key size: 128 bits
+IV size: 256 bits
+
+Test vectors -- set 1
+=====================
+
+(stream is generated by encrypting 512 zero bytes)
+
+Set 1, vector#  0:
+                         key = 80000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = F1B055D7BF34DE7E524D23B5556B743A
+                               EAF06AE9076FD2F48389039C4B24C38D
+                               DFC3AC63A148755FB3CF0CB8FB1EDEEA
+                               63CD484036FFAC3F5F99FC7A10335060
+            stream[192..255] = 2541F0EDA5633B4F47C6B74CDCC612AE
+                               CD27E46B2C8FC9036A09C6FFB5891168
+                               7A8FAEDC225E34C45B6E081EF5279FE7
+                               3271CED417549740EAEC6616C2B6A57F
+            stream[256..319] = 0C8C0567803E2537804BFA15742D3E08
+                               A29985688DF3D6B4C3044464C1D1F2CD
+                               4CBBC470C9A0FB05665CDED63C58E466
+                               896F80ACC020F134CB622487D40E0AF8
+            stream[448..511] = 1FD448C788A21BD30D4B6BC5D8AEF296
+                               2772940557B9434E0FAF636D576B0737
+                               1FF3AC12884BB431F396CF7C189D9AAE
+                               D42797128CE645FE841A4CAABA429324
+                  xor-digest = A3F66A36C20A496A0D4D537B6106662A
+                               DEB5AE1E35FD1486EAB6039F443E5D8A
+                               C6A2D4A2C2E2A9F335E2E468AD8BA51E
+                               550E41533332E6929EC18CE35BBF741A
+
+Set 1, vector#  9:
+                         key = 00400000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 9244D2B190FE8C4BD0E17247C4F1D282
+                               3FECA8DBE546637E34BCA99236D09F79
+                               5A8905A1E0FA94E6C51F7DC0C90FFAE1
+                               A8EBD4C99CC96FB3252DE0A0FB03F971
+            stream[192..255] = BC0ADD787A5EA52E28B45192399DDDE5
+                               CEC4E283181408E554FC714586FB641E
+                               B36F3727358BDD8223B5ADC9B9EF1044
+                               0F7CD97FCF2ABA75AA9972B277CD6656
+            stream[256..319] = C9F6315DA3CBAE23D32685C5549274E6
+                               9C17FB2E46746C5D3260FF2E00FB234A
+                               A460776CB0E7AC3AF0D297825C1796AC
+                               0B689DB219443BF4C0D4D19CD70A49E5
+            stream[448..511] = FBFDF6D40BF2DA0EBB04D52C117E9EBD
+                               6FEF88D39B8EF8B31082EE9B19D50219
+                               183DC962391FA4F602A2510BB476EF4A
+                               A44439F61D589933A1F3F633C96E56FA
+                  xor-digest = 49B435E6FA51A0AF8DC94CF1DE09F8D9
+                               AD76E08C061B54CCD62EF98ABE85969F
+                               3FC41DB934AF9DBC5F32748623639D3E
+                               B15124F13DA8B008CA5016ED61917563
+
+Set 1, vector# 18:
+                         key = 00002000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 9D74BE686C2DE8B207E8D82E49236A3D
+                               E86F5A7EE231B4239080FC9A55FA44ED
+                               7737FA7472B318A4F36FB788E863247F
+                               7067C20DCA632FF051789E9EB99CF409
+            stream[192..255] = 4876774DBB886B72E54EE8160D8BA8DF
+                               6DB032B2A9BA0B79CF82426CEADE421F
+                               EF5ABE9976E909DBADA0442FFC7BBA2B
+                               009F7240941F0C209853A514B0BE9062
+            stream[256..319] = F2499CCE5D3268F4C5515C365D2F4411
+                               B0AA99ED01E7D5328BF0672584AC65CB
+                               E47BCA14C3EB1F838ABDB7C611677BC3
+                               7382E84D05848B9838A166A42E96B016
+            stream[448..511] = C855EF5D1CC991D2DDC892AD8319E39B
+                               734E43E443F5910D03BB79CCEBE70569
+                               F92BBC63363943BEF88BFA5809B3759E
+                               6BA4ECA1FAAC572228458A229DD5BA06
+                  xor-digest = F125B88E0B5F143B836AFD7AC822E027
+                               FF44B736E32627D90FA05F3DB98576E1
+                               9EC41AAF9D61ADE2BF00E38CA4EC2A54
+                               49EE0655FEAE777D67EE127E8A5F8CD8
+
+Set 1, vector# 27:
+                         key = 00000010000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CC447BF1B5D138025BEA2B269E625C4A
+                               D4451F3851F04F118499040C6E564E38
+                               5C5FE17FA7AFAE9FA559CA4835AC1F40
+                               1C045AD439B400BB41984DFE7E4D4CC4
+            stream[192..255] = EEC14B65E027BC2A96E566BB89218A89
+                               31C4AE0BA5C444929EF852EF7E400AC5
+                               D8B3CFC62DEBBC2B20A7B32E350E3839
+                               2953B7839AACC06B2018280770F84B65
+            stream[256..319] = 8870B4F9A62B37A1929973D3975D7ED0
+                               505AA43002B14B55A541EAE00148651A
+                               111D6E5A1581F85FFBC2304783EBF5AC
+                               E924CD8111056B1069F13100DE15EB13
+            stream[448..511] = 1513F3B7A2458674CBA2B566F3AD6169
+                               2BA4EE30687A07AF2FD0D340D92384F5
+                               F5BFD9B8DF2F7098A209C280F6D5AEFF
+                               BC07D167720DB47B4B649C8593E6F40C
+                  xor-digest = FB5EE30BAE44FDFDF105796FB8A66F69
+                               64D502230C191FF9AAF5A4447533D02F
+                               05A3772B99F9FA2A075DBB8BA59D8D5F
+                               F819784D487C305280DF2F19EEA8BD47
+
+Set 1, vector# 36:
+                         key = 00000000080000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 831F1DAB278C6226785209C0AD34759B
+                               9F205B7BC6B987DD145B949336A8FA0E
+                               4550BC1737DAE7DD7D12E2C062BF9693
+                               F08C2FB808A1F0A5887A06B93D132BBC
+            stream[192..255] = 76631E9D4A673D09B9769251433D5EFF
+                               3114AA59E1A9B7E21B4123DE3E34FBF8
+                               4ED6E80EC29B4F75B53A63902C373EB3
+                               D644B8823789743CA407FFEBA4A1AA75
+            stream[256..319] = ABD84B2A5479CDBC5587FB9EEC5DC661
+                               5A3CC6136314F67AD2C96803E8E4BE92
+                               E33DC35F0DBF3C401AA5D7A9F46E54CA
+                               A7ECD68E561BC08E6A5B847A82777E4B
+            stream[448..511] = 9ED1D44510201727B2E92B55DBE06BA1
+                               46762AB34937364B2157292CE68B9D78
+                               3D3C3FFD1FDCA836E4C4FEC750B10668
+                               600C26AC05B4DED64F8CC2EAA0D22052
+                  xor-digest = 843D7B97B3316595111DCBDE3DC13DA4
+                               C14402936D68035CDAF9A1C168120B34
+                               0EBA1FC47E957C5F69F369B4C2ADC4AE
+                               37E743226D72A9F122EC8E00BCAAA126
+
+Set 1, vector# 45:
+                         key = 00000000000400000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = D2D629E84843638274ACB79FA257DD9C
+                               D48A08B823DC9F175CD92C5236B9D230
+                               5931FDEC5A8F531B1ADF30DE0527AD2D
+                               0D2B253D008913558E0FECCA7D7BEA4F
+            stream[192..255] = 6F9322E84D69CFD6A1E589283CD028D1
+                               E2A114B719FB2E18E732B97629313772
+                               CD2F2F8AF77EDB5B4360E4B679441346
+                               03C59E88C042713C3E403E5D93F9BBC2
+            stream[256..319] = EE7BED6C85B20E0A39C103D0B6949F4F
+                               5F6FE0DF2BCE315CCCEF6E537C488525
+                               BFC27FD249A6D36548C558153661861A
+                               78422A563166BBD0D72D6D7876FB4DB4
+            stream[448..511] = D2CFFCD4185EB1D8E15B629225B9C278
+                               6E7BFEACBFE29D7AF396B3D5917A8038
+                               7263018C7E98F49A1D5FA4B64B8E2AA0
+                               7192ADE0376388E8295AE5B54CC51389
+                  xor-digest = A26BEFF2FD72BE47175C1B6F3D749CEB
+                               0E3472FB0FD5E173DE66A5BB60357565
+                               505E3AA44A67651DCA75DFB6F0AFCFE3
+                               F4C89F064FC42D7C2953694B0CD47832
+
+Set 1, vector# 54:
+                         key = 00000000000002000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = DD1649517BE76EFF747658F0ACF5D354
+                               2C7FFD52F09FF7DDDFBC48487450607B
+                               CB90ACC3406D0302E84450FC0BFEC660
+                               9BD44C7FFF670D69C9B19FA50C62EBE3
+            stream[192..255] = EEACF8ABD7D48E285A6658C255A6196B
+                               66B091773A9F81807A119DC24023D5C9
+                               041AF75F2C078C5246BC5F50B622A678
+                               64EB7A07DA6A8764437E20C7E1E0E579
+            stream[256..319] = BF55E777AC644A0938D438FA374360ED
+                               F842BECB027FA3A0F364B9150FFBEB47
+                               09FE2D2056A6CD5A7076172152484BEF
+                               A86EC7DDE657307580BC6F9ACEDA4C73
+            stream[448..511] = AB4CF968EC00E7F08553A10270A7D439
+                               68B0BC79C2DAE278AF1CB81FD516CCA6
+                               F5B8A47271FAAC3223F02DB4D0D5945F
+                               9C13A47906B03B80878CB0596D37CC47
+                  xor-digest = 76ADECA36B9401DDD5CBDEE821B70FD6
+                               65EB9CDB1E3F25C0BE90DEC49C03A9CF
+                               4049CD34F9550B28E0187B0AD47D86D4
+                               88DE4617EDB5F03C67FA2E7B9D20AA25
+
+Set 1, vector# 63:
+                         key = 00000000000000010000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = C0CEF6E3CA9F0D523587FF47973FE896
+                               9FEB08773E3C694FBAC4804B37121B31
+                               06B99ECC2A08603EBA72EB3DC650E8F3
+                               462119F4685EF4CEA18D5765A6F22765
+            stream[192..255] = 79E92E248BA61D72C610876D3078F1CC
+                               CAD662F2423E7EECA813133136A64E54
+                               A1B6A151BECD2B815EAD959DE8E8DC62
+                               8F388D366103296A058CF60F525D6467
+            stream[256..319] = 03BD62A0892D939C1C28C4EB490F87B2
+                               527536AD6790AAA6C3CC50013E2BB883
+                               5710EAB7916FD89896B7983B326AE271
+                               AF9ECF975CDBBB968D076685BAA3343D
+            stream[448..511] = 98762E306A2B9D488FFB671D3975551E
+                               A06A6CFC5DB719B888E3164387EC922F
+                               12BC31A8DCAB8AC0CD6E12212CDA3B13
+                               4CF7F870221D6CDAC2B222AF4FD93DEE
+                  xor-digest = 606FA49585621E34BCC3748C06B51FE5
+                               A8AF320BFB83A4D1D3AEC6373519B28F
+                               2048A975732BA8DEBDFC5F85B84E7C3A
+                               EC0FCC9B1FA9EBB9D79D6B18BA2D70B7
+
+Set 1, vector# 72:
+                         key = 00000000000000000080000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 33A81D48866B04388451BC2730A2980B
+                               5F5BE248369911340E6C024A1F94D4FE
+                               ACFB246F7C0B9E27A40772D68DB36DE1
+                               7E87AEF19C8A68854A46B3F654E0AEC8
+            stream[192..255] = F67C60413B25FF7CB8647D1E9C361696
+                               3B23ECE23A9DBFEC644E855AEC5212F2
+                               D336E6F074EEC8FF5F8D4FC6398AEB9D
+                               BCAF6C29FDFE6E69A03D906C527FB0B5
+            stream[256..319] = 263D512137BAB758F646C71058D02B20
+                               3920965D84E52A99B50FFE79305E491C
+                               E0D61EF71F7A07937CEC8590B758F63E
+                               B3EB5890E8678F170C2E95B827FD8DDE
+            stream[448..511] = 023AD00A87D3D9441D4E8CB603F5CDDD
+                               AE8F3EBFEFB9C5435B72B9B8D03ACDF1
+                               E4A0FB796FF8401854998015905B878C
+                               99B3EDC7DD33A86AD4EA6AD208440C5D
+                  xor-digest = 5DAC8E3446BB3B0DCFB3F0A3A3E788C6
+                               07FA7436C63BF7AC9FAFCF4A231AFAC7
+                               75A3A810EA0FD4E5E6A5B8FE5D165A80
+                               798A9F58EE1AD27016E867D2E774507A
+
+Set 1, vector# 81:
+                         key = 00000000000000000000400000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = B33EA681CA88C80EAD8F2D57C87EA42B
+                               742550FF8AD2B01BDF945BF160AF763B
+                               15D6B3BD92E6CF3E6A2B61A7D4BB94AC
+                               E3DAB365E4EA50EBFD2654E60CE849BE
+            stream[192..255] = E97318BDF61934188A94BCFB4441809D
+                               36C37D1A43BDBB3EB06FFE143B6153FE
+                               C8453A13387923F434CFC7AAF8CBA097
+                               7D796DE95EEFED3B2126B611F477619F
+            stream[256..319] = 4183971367E71731111D2212520306E1
+                               1CBEB05BE6FDB338414C826A8E359C7E
+                               CC680F317C12C6EDE6B443E68B4767AB
+                               4190E95E1AE4E4FFE61707BE742775C1
+            stream[448..511] = 56841724B7D7F95809456EDC1D3A532F
+                               E1C6BA252017DA90EEC71FEE9A639A89
+                               4CB7E1575494BC8B44FE4C5DAF90FF4C
+                               A32E03D6399BCB3D9D25B62764A4977D
+                  xor-digest = 3E80587D70A53AFFB96A62F6493B9BE0
+                               1C25339CBFF7784F5100A7922EE3E6B9
+                               9D17B026C0EE69C5383F63E0E5AEE9DB
+                               5814E2C526192AEFE17004AAA1996280
+
+Set 1, vector# 90:
+                         key = 00000000000000000000002000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 51A7510726D12FE9574095633A3710E6
+                               3EB8196622BC808B8A18800E208648C9
+                               F7031F8171B71F37613753A5E49B37C1
+                               CBC7933A52CAD48601E91CA198EC19EB
+            stream[192..255] = 286EF1C4F74C993A7D783E86527CDFE5
+                               213CE4DF7EC72544685291D8108C7621
+                               50D488AEF761D819781814F4501553CC
+                               B45EDDA85828C33C4D0608169AD20B2A
+            stream[256..319] = 89DF5C916612EF0ACC1035EB75752239
+                               ADE08E0D63B622EA52CC997DC8178C4C
+                               4E57951FC8C6659A225E88502742B888
+                               1F300FC9F278AA3D9C1063A83CF33C44
+            stream[448..511] = B2DE3AE2941AFBDB21D80ABB0EB852D3
+                               A076D98C696F886C302D96D6AD226CA3
+                               7B3213B3E641632B728A0AC7131B74FE
+                               F733D1B18666D36A02C148FC98AD2E89
+                  xor-digest = 01090125BA6C43AAA3910B650D046F37
+                               E04896E9D2BC276D969A10C1B26FAD48
+                               8A2CA5E59044ADDF698588A561557669
+                               A4EF25E1BB85C0A9D63F69FBB2924F83
+
+Set 1, vector# 99:
+                         key = 00000000000000000000000010000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 545E2C75365948B40FFF042EB6919907
+                               6E63EE636CB343C51AF6C17BA24E1BF5
+                               C045B0893B8CBDF6A4068F8574513676
+                               80000B10BA11666A546D8DC75374F5BB
+            stream[192..255] = 9805DCB5596FADF01224553F3A8DCC5C
+                               909D1A5EC2C29BA0DB86A46ABF70BAF4
+                               4A171739309A923428EA7BA8EFCA5CB0
+                               B0B8A5EFE9A4A39BE0EA6CEA782DD862
+            stream[256..319] = 531EE320A584EE1E4E0701400F86DC29
+                               69531C2BB1BC922CFA9E0919A05B84C2
+                               46495A7C358015724B62A986220DFA17
+                               6BF39FE4263A9D27D93F3737CC1D5C59
+            stream[448..511] = 92CC0D63772783AF62E642A5849CE7AF
+                               4D21EC815D644F88887242F4F5F7E1DC
+                               55E241D72691ED50D59CB3E2FE68A856
+                               7696F8B8E3099642D70EC3945B8BA656
+                  xor-digest = 855CFA62E449250845472BCE9453BA45
+                               F91601ABA6BB715B079D407E05D94CF5
+                               93B5A1E2C12C04C78AB719339AFC11C5
+                               213E17ED9DC2B0B9CCF751E0613D4F2C
+
+Set 1, vector#108:
+                         key = 00000000000000000000000000080000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = F9748DADA2741A7CA30EFA167ED09978
+                               71619682AB68CB400A74BFD642180CC7
+                               F3499CE2CC86AB7727786DD01AB8D08E
+                               8774C5A3CFB4738FF1E3243DECF720FD
+            stream[192..255] = 5AA20B305F5D6363180CDCD4E16427E7
+                               2E3DFD73D2C4E2498008F6E0FA9CE3BB
+                               D751F6EB8DD5F48EB42B994688601E3D
+                               2CEB3DE19BF16C4BD7FD4B331FC93473
+            stream[256..319] = 81E3D9BB421CB09A9139534C6E430668
+                               FCFCB87E48CFA085D4FA1AB316CD5AB6
+                               35294E434852C1509C1023A85B26622C
+                               68BE19944CA3233A4D3272710A791E3D
+            stream[448..511] = A499D228204BC22C32047DF550E2CCC0
+                               260ECB7BA32E8F5CBA2C1D9A09D1F38D
+                               FB30815BA3C9A8D3243CFE7AC4A14B1A
+                               D6AA67D3EC0A5CB617FAD57E41A2A0DF
+                  xor-digest = 0324B7F1BD990F8DBF19C021CCDF741A
+                               1B4A9C3C3940CC59CD715F0B2CC31C08
+                               82E5B93721AC98B00F7B45FCCF19FFA9
+                               782B7D7FC048F0756A29B066B472B394
+
+Set 1, vector#117:
+                         key = 00000000000000000000000000000400
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 7EA95775329E2D1163E30F429FECAEF4
+                               CA177BB4D3C4D1AEFA6B5A01904266F7
+                               7D7B7243B9DB1490245EC05129CA2DBE
+                               E3A98885DAD0B43B0E725DDA39B444EB
+            stream[192..255] = 78ED15A7B4A8151F384C740B844115CF
+                               D4FA31F9BC16E22158B0F896E70C0F73
+                               F74AA5EF024F6B386ED71239CBD57996
+                               4583C37104AD8C7E5C812C378AF00F98
+            stream[256..319] = 292FF21E49659AF99AB21753BA2A2B28
+                               25DDB156D4F7AFC1888FBE8376AE4C6B
+                               905D5916121E9F9D76C83FB146ADA735
+                               2AAAB6E89CE9398C484D69D1A33F0C97
+            stream[448..511] = A50FF5FC20C57F8297C9CE2599A3E6CE
+                               3193746E8C45FD9AECA0C5A0FB3BF70F
+                               5981B5BA8D2FA57677EF65B535FC3E65
+                               405BECF0A508445E36A7B6DE2BB56106
+                  xor-digest = D9650FA5D128620134828E1C99D9678C
+                               CFD5BDFADC46A5E79D47AC5967B8A1CF
+                               32F7DB65B949C88CCEE0D96D960A110E
+                               FF1D09EF5549B88D5B53ED46D4C2F296
+
+Set 1, vector#126:
+                         key = 00000000000000000000000000000002
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 25874CF64ABA4536844F815F486F9DEF
+                               927E325CFF2FAC48134A4D30824C5BF1
+                               EC75F8FEFC624AFCC717BF2C8EAAE374
+                               0AF399C2653389DBE31F9FF5D451D362
+            stream[192..255] = B151A1EDCCB8B4A3CA9BC98F19EFE637
+                               BE2D6A97A8F794091E7FFF06E7B4E574
+                               46B81E8C787BB77E461592160C44B5AB
+                               49329142D01A1CD5CFC6681F93DF1E33
+            stream[256..319] = 29B2B0C04E07D33EC3146E60AA305F0C
+                               2288913B55DDC18FC17EE836B39193DB
+                               87089DF2BAC4185A57E910331864E25B
+                               540BBC968099900F7BF18645A28A419B
+            stream[448..511] = 286FCC98B40EA26BFCBE5CDEE52B30F5
+                               810CFB26E756C628B56B3B5ACDA49E07
+                               192592CA2241C6C5193221EDA36CB0E7
+                               B5C3132F08087DF0673D3101FC559962
+                  xor-digest = DBF1D7E0AC062FE6BA9834F0AE41ABA2
+                               B28B41FDFEF914F070007B0A48EE9D9F
+                               E69DB8395BECDBA7B545201318177A49
+                               7D343A317B5A37A9DF98DD25C84DF948
+
+Test vectors -- set 2
+=====================
+
+Set 2, vector#  0:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 5B078985D8F6F30D42C5C02FA6B67951
+                               53F06534801F89F24E74248B720B4818
+                               CD9227ECEBCF4DBF8DBF6977E4AE14FA
+                               E8504C7BC8A9F3EA6C0106F5327E6981
+            stream[192..255] = 30DA9453A90909A5675D6B691CB0990F
+                               C423CDD8222EB47245BBB67BCA2B9C10
+                               8D1F016DF0CF8CEAF6829910916DBC1E
+                               113D11E91BEC3D85C47E3042EC865658
+            stream[256..319] = CAFED71B892EDBE13388CEF6A3365797
+                               E0D88C0D3A5B91BE4CBAF5162F69558F
+                               DBB45CA6F8C8D4C371D62736EC244584
+                               60131F54854F3EC804AA9A38E6ADE281
+            stream[448..511] = 531A0ED5D2A51DDC6499FE1BB6E2295F
+                               2C3EA0F56AF46ED93DFAA4E16F5F0831
+                               2D77BD0E9122043CD6A202CBA9351F6A
+                               0E8E6263F4017355136A0C551E6FD0F8
+                  xor-digest = 023D719F61C193E4CCD87755C87F9604
+                               C5A29DD7E31637B3DD70D43441D48CC7
+                               D474013C85EEAB1897C80ED0A0272543
+                               F951C72E3954616CB5D6B51FC24F4B0F
+
+Set 2, vector#  9:
+                         key = 09090909090909090909090909090909
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = F5C2926651AEED9AF1A9C2F04C03D081
+                               2145B56AEA46EB283A25A4C9E3D8BEB4
+                               821B418F06F2B9DCDF1A85AB8C02CD14
+                               62E1BBCAEC9AB0E99AA6AFF918BA627C
+            stream[192..255] = 3B3C6E78A8F381EE2C159FAE1C487C58
+                               11FA9BB02CECF7440239FBB0497347EF
+                               D8F1A8AA71AFC70ECCD64E81388E6E87
+                               9521C2B47AD84F9CFD9E240D8D2F3001
+            stream[256..319] = DB04FD01BC18D91E2D31237AD0FE26AD
+                               3C8D6A2EFDAA9CC11BFCC61D94F6104A
+                               4091B3634FA57AB0AB9B209F22DA5529
+                               75C3C322DEBE4AE68623BFE1B2BB7F0A
+            stream[448..511] = 35B290F85EBA78A978750690C4747E8F
+                               72621951483772E8B89876CC5D55F3AB
+                               02D9B8FB35C741279FF9B5B571B26329
+                               4D011F813CB5B209CA1A22D532BF09B7
+                  xor-digest = EA9BB65E87C987EA64BC3F4E710CCC34
+                               F6CD0A795B8347E1441CEBEE35540D41
+                               64FC2B95D71FD47A2C4ADF732261EE52
+                               8125BE374FA4A90132CC1063971A2862
+
+Set 2, vector# 18:
+                         key = 12121212121212121212121212121212
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 397F8EC015ED573967938D1CEAFE9BBD
+                               BD8853C329B3A881B489090853FE0F43
+                               89DA105F0ADFA9CF51DA2521C40FD2B8
+                               FB0BF80B93E3F2B3D8A8EB1C615E0FA6
+            stream[192..255] = 68E7DBF465E3C6994D58B9937A866E4D
+                               43A82A80DAEDBF29C048639BA38B690B
+                               7ED11323E3C0A8E77A16356705431EC9
+                               9F2CB7F7E1ED3B83EAF2CAEC00B00755
+            stream[256..319] = DA51CF3A07EBE7E86E9DDDE5A47E7417
+                               376F334E6AEF9C187012C8AD2B94BE7C
+                               00A876756EB232510FD0798E72EEC87F
+                               75EC1467C07B3A1EFB0D51A5FA65E382
+            stream[448..511] = 0BF3C6FF6794887F2776FD632B83682B
+                               AAFD131432CFD7D2F675E03320395313
+                               AD4ED96E9052FE6B2D2A17428660A25E
+                               EE642B712800BE3F7E44F21A1E6A03AC
+                  xor-digest = EF4E84DBD66497B142EEAC56B830FF78
+                               0465CEE20B9CFAF5727D4B3A588F4D00
+                               AAF718330CFF35508C44C1ADB8476625
+                               2CC3AA6AAAE74F8BF1DDB6D4AADA425E
+
+Set 2, vector# 27:
+                         key = 1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 72BC8A6E1E61E704B142AA00812EE676
+                               263C1CB9AB941119B19D15EBA3462F56
+                               2F69220595DE5E0E7C595FA40F1F06B2
+                               6EC32252AF05310809DDDFAE2E24B170
+            stream[192..255] = B29A740B51B4EA1080666337D5551484
+                               FFED6860A5125DC0573C8F90F23A98E0
+                               BA7B3E4C28C2CEFB1C33D2C36D1B7625
+                               64B9A67240CF174347A4C8D868F00F6F
+            stream[256..319] = 555ABD5577A8909797FBA9769C03A0F6
+                               537C06AFB23354F054E25457B729B534
+                               CD10B2ABD45BE3E38DAF1B7A9103268F
+                               4FDB4C0FC9A80A003FCB907E8F249AE0
+            stream[448..511] = 3B29A43D9C795DAF1760CA9EB57C0B39
+                               F62D54311207B617B727FCCE1B2E762A
+                               060810C4DEF672E7D76083E3E4BED0D1
+                               0BAFD27CDFD2C937E660190D36B3FD7B
+                  xor-digest = 0B3B0B3C69F2E4BDA22E25AEF352234C
+                               18CC5E1E3F6A317ED7257887446EF734
+                               65CA15F51AF5E077B7915062391D8497
+                               8F437985DD08F5FA3A8D74B3227A6EEF
+
+Set 2, vector# 36:
+                         key = 24242424242424242424242424242424
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = C845BA29D542FBED2D021C85188E119F
+                               D34967B79D9F44635DD45D2E41DC5AFB
+                               B237AD2FA0E4CF4202D83DF3073C578D
+                               2AA8A32D30FB45DE28F23CEB85E50FBF
+            stream[192..255] = 15C910FDD3C590AED1ED7DA2A7969297
+                               FD12081B4B23F0A32CE5B3196173C7CA
+                               7EDD03F9637E08CA501C4850C15B207D
+                               7AA724377396CED2357B572BBF9E69AA
+            stream[256..319] = E484AF567EF80BAE77461855294E9280
+                               EF57E7366605785034D639D6DE3EBB0D
+                               E21886D0E1E0679BC2E2C9C2D9201484
+                               4A452B6AD3F1AC8B7762FF3C0E405B3B
+            stream[448..511] = 595D9855200786BB575FF7977509F395
+                               7879CA1F19619A99174BF013CB62F85B
+                               FF2C3C4FE724E26DD0C10D7635A2491A
+                               9E7E868D9DAD9201465AA178184D06AC
+                  xor-digest = 08737B82505F46F4FF282EF42F387AA8
+                               0450058F5314389BB73733BC163D75D5
+                               D32FC6408F8DE5F6ED2050027D605FAC
+                               A7119FC2DC1B6D3E84E8048DCC42FBD2
+
+Set 2, vector# 45:
+                         key = 2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CA82A689535CA8BAE01BAFEBA6504B3E
+                               6E6320101999BCE5550C2BBC9BC65D91
+                               FAA2D72FA4BF46B6EE916244048B1D09
+                               A115E3AB6C00BAC8EE382B58859E8157
+            stream[192..255] = DE787B1CE01B0BC09801D78D1FFA3A82
+                               0C18B867C561E96DF4ADADC5A4375E44
+                               5A34F9457E5F8C9A337A0C88DF0F723A
+                               D4509F1449DF2C6AEC0EADF4C7A8139A
+            stream[256..319] = 7E1854FA15DF9D5827F1555F12B292C8
+                               452A1A893EF034C51750388D294947EE
+                               3F505839C69C1708E8323C449C39A96B
+                               FC9EC91B0E1CAA8112057EB0389FDFD2
+            stream[448..511] = C85B42B838FB9C3D4956C9E22FBD8FBC
+                               EDD92C4461EFBA5CF1664B9AF54857BE
+                               C3D00319E5E8A89A8322831151EE1D52
+                               D8585AC79CB60B61ED2C852D04BB0FB1
+                  xor-digest = C65A6BEBC4FE898DB8D6B8F6E8F3680D
+                               2363BC12259B0FDB2BD8F052A572ECA8
+                               D1EF62AA9A48497805A413742B5AF5A2
+                               6DC9FF624B49E5D6FE58BBE5251B4983
+
+Set 2, vector# 54:
+                         key = 36363636363636363636363636363636
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 9F6BCFDE566A1B67C608F11B8461E340
+                               42D4F07DA4D5EB05554CB7426D65C5EC
+                               A93C2D321175B6F72FCBEBA6E38CB098
+                               B72534F7D534B1AADD97B77E8513B482
+            stream[192..255] = B2466A173F436C8433F264CBF125B8E4
+                               C10BC81BD46B5C21FA161CB2AE07D27B
+                               F66812A2C2FCB2B14C23E413CEF4E591
+                               AD52EF810A000B42E5C1B76EEBB17739
+            stream[256..319] = ECBED2058DC50223614EB8635B834C3B
+                               B176719C18CA5E3D087A93E5CDF81123
+                               C6FB819CCAFB5042AADFED5E3C33116A
+                               FD92AA21031165A22F4751C423B8B945
+            stream[448..511] = 758BD9435DE607867DA256064C304C8E
+                               DDDF5B64173CF2C98B2842992F8C5FE1
+                               A37C3227B7F37D49A39F9FF929A883FD
+                               56DB8B1A174E1E55FCB21C9E1164C20B
+                  xor-digest = 31761A49503946701D35306FBCBE10E2
+                               02967E7EC14A328B4DB19FE79F03553F
+                               13A012B7297B2D02F18A216AD24A682B
+                               299518C3769123EE86A4937DAA9FC39B
+
+Set 2, vector# 63:
+                         key = 3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 85C7FF83641ECF1C91B2D996D4EAFF6B
+                               26A4E7E34C0CA9CB9399F655E566383E
+                               246143F57776C8E08951E87F76091FE7
+                               2356CC901F09A07895A890AECF047B3F
+            stream[192..255] = 4CE0C6606195F7562D485E32E8E105AF
+                               C862100A07E55FB449BCFA2D9BD48658
+                               958B37B3EA3565FA66824102A14B5770
+                               5E3914E0680E116ED58212CBF61028E3
+            stream[256..319] = 3BB772A5A8DE2AB14CAC1ACBF45B1701
+                               057710F24C01E680F58090B8E949AF01
+                               8970A43A698A04C0C8639FAA665DA3AA
+                               562B2C5C3A03BCC38FE75DC1821ED718
+            stream[448..511] = C73DEA1F7BFE42DF75EA2681BEB31948
+                               821FBB049DAD15B988A77C0247868A38
+                               2056B66F47B0195FA30C9DB5A2334A9D
+                               CD7C0D22E479FAE1BBCDFFE60F261C7F
+                  xor-digest = 94D41CCAD940CED3C854DA0796DC62E5
+                               6B566A980E34F353CFFD0F53AE9E34FF
+                               A6A057645FE66D86BE30F93805D9E2B5
+                               D78C68EEBF61CE387277A51EB2EF835B
+
+Set 2, vector# 72:
+                         key = 48484848484848484848484848484848
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = E45194379659D1D8904DB3698AF8B245
+                               762910B7FBD019AD1AA20A6C433B4C80
+                               308A9EA68697631646BF3A2107C4E7FE
+                               2235E8F3262A9DFD3F5CC23FEB0B2DAB
+            stream[192..255] = 012611EBCFF9F839DDABF99D9D4757DA
+                               4E947598C4757976F6F61DA5F0DAC8BC
+                               DDF72F08BA2F446FA37F9A490F6A2B6D
+                               79227C93271D6B763DA7B2A907220A42
+            stream[256..319] = DDE54F9170D6A4702CAF45CC6F799F74
+                               A43D83AB8ECBAC5206D108F869561D70
+                               F151A0037F8E28951B5026643F8B2D6D
+                               56A62E259F04A5EA304791A9468E66AF
+            stream[448..511] = F70794C084E6EDC07BA0347413B05FC9
+                               FC46994CA820CE4FC037ADBA50EAA9AD
+                               55064ACB7308CFCE3F35AD5C7C628362
+                               F4210FBC2D3264F734728626BABF5356
+                  xor-digest = 31815B36BA034BB1941DB1E45A941A59
+                               7C3882F34BD3BF441CAE8A9790B05BCA
+                               72049FD10C09A14AC9DB867A82C38A5F
+                               524C72F783DFD16980DBCDEB486FAE96
+
+Set 2, vector# 81:
+                         key = 51515151515151515151515151515151
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 3C04E21F6937C4EF472BFDDA89F9CAF6
+                               FF53889A9979ABA8F23AA51DB1EDB8E9
+                               D08F696C1100799A7D004DEF1CA94110
+                               FCF0C054B0C131E6FAE0FE2F2DBF22B3
+            stream[192..255] = 9B4ED3EF9639B953186FC7E732E7A9EC
+                               55A5F3F19C5A10E12EBE46DD84F10385
+                               33837693588D584FDAF86E3A217C3CFF
+                               020278736F1A90CE07F0DCE4329005B9
+            stream[256..319] = 135FAD68B5282FE59B28D2DF66463632
+                               06CA92E84A73FA131EDDCE89A5C23B4D
+                               08FA57D455BDB32F8ED58DAF3EF288A2
+                               7C72020E35DAE19B446E4C52DCDAC5B1
+            stream[448..511] = 7D08FE1CAA0E8A0362669B310B99127D
+                               18F2111002891D3229102D72605B9BEE
+                               F5DA36059B0DBBA7646927650305431B
+                               FDA4A97570CD0C484BF1E974B157ED7F
+                  xor-digest = 5125E77698C0DAA89A7E47DC5D038D40
+                               7B732CE56CEB674CE653A1B6661B2740
+                               0C092AFF83BEEE4FC4543B9D725C9387
+                               2F89AA338222ED677BF59397200AB304
+
+Set 2, vector# 90:
+                         key = 5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = DA2E6F7FF0D1F1C87A97E028D3E20E21
+                               75E9AD91482965B651B495AEE819CC6E
+                               C42AFE2C20EEACCEC4E90710D17210E0
+                               4CC6832905985322C8007F872D3E58E1
+            stream[192..255] = 09B0A38E19DDDA08F7DFEF7D0FC80560
+                               D692A020F0A66F609374ABDCD1343722
+                               05F19CA04EBDD3009844BC540C1B2B41
+                               66D45E8A2E822B906DA34649E7FEEBB3
+            stream[256..319] = 6C8E2CE1D7FABA414432E75BA2EFE4AF
+                               CE2CFE99506677A956AEC86BD290B6AF
+                               C5298A448D0DEFA99AA5CD26D318982F
+                               E786D809C713D5A55B42CA6650191DDC
+            stream[448..511] = 845FEA0A88B521CCB8927C9457AD3225
+                               EF6E3C21705EC9FB24873916A2C24668
+                               963C03FE097DA8224A42A99E5DFFDC17
+                               68CF518DE49CCAC8A70216C62C9CBA6D
+                  xor-digest = A46BFD9D2D0BCC688A032F54733AB7C5
+                               5FF58B296071D5D39349A531E41F0BA9
+                               893A1722B6102740BC5FE394A49363B9
+                               6A626AB43FD6A288CD9B23F7255279F8
+
+Set 2, vector# 99:
+                         key = 63636363636363636363636363636363
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CF0E05248AAD82F1C8CD2095ED2DA333
+                               BCB02E3AD8797377AE1F1B4D6DDB86E6
+                               2A59791CB553550E0492FAB42C7A2C42
+                               3157C5092D2DD37D46589F17FBD86584
+            stream[192..255] = 9E946626F1EAAEDA42E52422B4A84D91
+                               4122EEE5736BCD12061C77DF5B0122B5
+                               1784E946B4E93470170ACDD7E2779591
+                               57BCC9B9F3E11E88BC2F740AA0C10C97
+            stream[256..319] = FF22D8196AB3DF662210D12D0FE79255
+                               6DCD39611C07F089979CF7D693A30CA3
+                               5B795B7F6D64931916E717C8BFB92114
+                               DB75118BDB51D142CE8133415C6B3456
+            stream[448..511] = 971F007EFE17662D95F47F4F28266516
+                               B22A1E50755EEF19149DE3A3121F5FEC
+                               E0D9DFE7A055026CA44193542D7687EC
+                               695B97769BF02F92C1EF3D904A8010C6
+                  xor-digest = D1C4878BEFCE48888A43C6DDE7CC8163
+                               C8D54A4CA36748C74721C7B6E1649A31
+                               4B5B7A4BD43E7C3D2A22F0C8446C7892
+                               90D54D421D37CB16400E59CC86215CC8
+
+Set 2, vector#108:
+                         key = 6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 54F122FC8ECFB176E7F4CF172B2D78B6
+                               54BC11ECF0010D2AEB9F899130F4AC2A
+                               38EBC15C8831D591E6675DC1CE7A471C
+                               4B869FE83CBF37AC70BAAE5D4AC607F9
+            stream[192..255] = 518F298A6008532EEFECB3DCF72103BD
+                               5E3F84FEB6EA2311E8C19A2E93A9C3C3
+                               BB1DA7DBA78D5618D1C4FA5B0B202728
+                               62645A361E55494D66C9359E41E5809B
+            stream[256..319] = BAFFFC9206D1D813F3E2768F08D78B2A
+                               89BB20CCD92E7F13FDD816DD4E4963C2
+                               C5FC2570CBB8BB5C70848B73001F508F
+                               47AF179528200F51CDC6E4854EAA63C3
+            stream[448..511] = 844B1D15FBFD1264169279ACD525611F
+                               A39C7BB41F1E7A1C09090625F7926E51
+                               23A4CD7FE1A3F37ADC67AC437BF0A5AE
+                               FFFC6FB0ABF39D9908145004AA5B958D
+                  xor-digest = EC67596C9DEF4012A2D543842829306A
+                               4285A3B8038818F265065DC848BD80FE
+                               C27C2F66A57B27F7FA8AC912001EC954
+                               05BC6E93D7E555C59060F5D2E294D103
+
+Set 2, vector#117:
+                         key = 75757575757575757575757575757575
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 91D2772A18995DB3C0801DD3740F4466
+                               F9535E5BECB93DDCA0E94D19C0B57BDD
+                               0FFBA9DAF0B11D55C852927F8BA560EC
+                               4999E25848D08FCA7275E7E8571A5F1C
+            stream[192..255] = 72E64FF10CA9F07CC493715724DA7610
+                               9E4358E8B0CAE451348B784A162DF036
+                               AB9796724D17FDBF356031D080A6631C
+                               D1E8D217B041AD2EDF427972653206B2
+            stream[256..319] = 4054F770C93FCAB533143FFCA8E4C0F3
+                               344956C29D10374E502C2EDD177ECE5E
+                               6625BAD9630DAD57976216CD69865058
+                               130B132FEC1AB0C350DF4DACE4C7724A
+            stream[448..511] = 40B4A4DD63F7B6E932482D0E6F5BBB90
+                               E402466550B518A177CD05985D238827
+                               BD92EE7EC22C274F19E682F85ABDAD95
+                               D0EBB3DB6C6134408353C8B0472C9A1D
+                  xor-digest = 9A6C893F2108D13A29373DEDA65386C4
+                               AC356BDDD4A3178952F9126E322B7AE6
+                               83C94F1A131CBEAFF26549D9F84CF04A
+                               1241FA374B055B0ADE7E49E8EC669E65
+
+Set 2, vector#126:
+                         key = 7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 87A7773A3514EB7F882F2C491E90DCF3
+                               059C5CC575D806B9029CCE3FA45A246E
+                               0EBD3AB2F2E324FE36ADC3B56AE2F7EF
+                               C710AA964CB87381386C2A88B1308035
+            stream[192..255] = 415D6F59DD004944D4E45FECC6F1F06E
+                               20BEB18D9C84187C347F43B17E0924F1
+                               2348F825E106E57A00258CE4415294D9
+                               4323A9812D8A71359CEC1001BAA0D567
+            stream[256..319] = 8E20F0D03F37EF4B2C5EE12B5F81F7C5
+                               32D62E779FA0D2D08F8ABB6B0183A4DA
+                               4EE0329215F261D953150B9AB9FCBE2F
+                               568AAE361EAA8636ECC01A63F007977F
+            stream[448..511] = E7C44F44E06321A20E25F73E2069757C
+                               90499DB7E60025CF6D2D445E53A665F3
+                               08EC96F6FE73C0AC90D7E4A712E18C2D
+                               3DED46DFBAFA24C4B0B329E52C525976
+                  xor-digest = 22035341489FA6EEB2A6488CA42F4043
+                               57477C3F55569A1224EC39B1019E90C8
+                               21D37D78ED4DCEAF6EA70724C3751760
+                               38CF25DE4F84BABD80424D83A310881B
+
+Set 2, vector#135:
+                         key = 87878787878787878787878787878787
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CEC0C3852E3B98233EBCB975C10B1191
+                               3C69F2275EB97A1402EDF16C6FBE19BE
+                               79D65360445BCB63676E6553B609A065
+                               0155C3B22DD1975AC0F3F65063A2E16E
+            stream[192..255] = 5E12BA9DE76F9ABF061782EC1C4FBBAB
+                               3373B816DA256CAAC37914B0C161E4E4
+                               5F5ADBE444098A5B2A4CFD4251D79918
+                               987BB834BB50F0834EF4985F356B92A2
+            stream[256..319] = D89642D25DF97D149AE07EA18BA39497
+                               8935978AC34C1DF9F444986D7505DB4C
+                               7E08DB3616B84CD52E7DD7FB108C36B8
+                               B50C2573172F4D3500B6D62A9D20B82A
+            stream[448..511] = A2C17FE7371604556F796429C6BE0688
+                               8611638B310F3E9FAF484BA9EE29C16D
+                               2F842EAF33AFEC557B68D2F453569187
+                               A6F4CD204A0E7A733E81AB7CE9FCAE81
+                  xor-digest = A7C93087CA70DDFE5FA5F1F2F954320B
+                               6E3A61977A7C6AC2F033B826AB9A9957
+                               66671D2A1025CDF8E2824B2F58CB221D
+                               2A68679239D90152FF7D0D39B33FAB93
+
+Set 2, vector#144:
+                         key = 90909090909090909090909090909090
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 7118889F6E46A6523BBEFCDB006B3BC6
+                               71A6D390BC7099A708D370DCD0E3D143
+                               A0334619EBD5C7DA9EF6301F29273F85
+                               2DFA3C580ED65C6E952F88A0B7FE368E
+            stream[192..255] = 31D61E133CA1AAE400CB2DBBAE93C75B
+                               445792061AA0539DA69ED0B77B970C0B
+                               482156A5DEE4082A61364BF06E692399
+                               FB9F4411FEC515291F8949B20F57229E
+            stream[256..319] = 993E815F299D4841518119BFF88F6EFB
+                               F3DB9BAE60238BDE2845DE4DBA6D79DB
+                               C9E42BA5C3C004AE4546FD86C660FFC8
+                               FD6A8A349669FFE3D9E5BDF8E50A407D
+            stream[448..511] = 0F9CEAC6BDCBB56B7E97DDC95877B2B2
+                               1274F4A6D814B5440C74D53A3FF0735D
+                               EF01B14AE4188E215CE7337C04871688
+                               7159695A241BFB9D6B489FE9E23B2AD8
+                  xor-digest = 0BD5739ED28778023E6303FD88DAABC4
+                               0FA0A211A1A5C5F230D9E67DDD9EA517
+                               FEBCDF0BDBC107291B6CF3ACD8B862B8
+                               4BF15400493A54036E97FDEBB9A1DB2C
+
+Set 2, vector#153:
+                         key = 99999999999999999999999999999999
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 236ECC5AB83DB1C5CD1C5A888CFEA2DC
+                               BE99E7E515650511FF7016A0EF287ADE
+                               5A03839C4F83F05FAC3B0B24D4E3F602
+                               3251F8D9CC4530A805F8A6A912EFAB1C
+            stream[192..255] = 792823ACE2C0DDB266A118068AE295CD
+                               716E424D3B98A9DB2501A3F5DF7DC70A
+                               3BD2C6E664D5E13317D6F57B8774C903
+                               D407D2BB6014E0F971141E89569C5868
+            stream[256..319] = 2D6ECCF738FC00ECD5475EDA959A73BB
+                               304C81FA9DDE0C21592247C4098D9347
+                               1DA30294DE8C100E5B17A199F744CAC2
+                               4E33490FC7F223FD6B4923056117C6D9
+            stream[448..511] = E791A6BE7F7593788E5D627F5CDAAB59
+                               349AF2BB1DA2BA622B9824F729929098
+                               BD19DFC05D0D9454F604960C027752F9
+                               7812E53DE6AC6CD2751AB331703646AF
+                  xor-digest = B7C5CE0D2FF66533A1C948C425F33FF2
+                               DC458E7E517637596FC8FB710E2E5636
+                               DB1F14848CB12793D54ABD0856B22F3A
+                               ADFA8C33AD08B8CC5292DD76913CB105
+
+Set 2, vector#162:
+                         key = A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 74490D19F13E7C6D1B25C6408E23F229
+                               8A8806402755660C4A30CD216A500BB6
+                               AE975E08EC62D08425A8A62A71B00215
+                               DE35E5178902348698528CB82296F009
+            stream[192..255] = 51A6EC18829928EE94C37A5CD030CC4C
+                               E4F7E1B3E78C3A5DF07592F45B968BEF
+                               F95B8B257DAF2B468284627AF4481FD2
+                               67BE0B164DD86721DC8C1607A0607EF0
+            stream[256..319] = 75C565D5A5A240B003273F99BEB3E4B3
+                               9C056162B626F383F3E77B5C98C0FBE9
+                               119A7C335C333E6490126AC2510CDFAA
+                               86441C72D1DD9ACBCD3FEFC0D0C794C7
+            stream[448..511] = 2D90CCF0B43239D725E3B53C31B82754
+                               246C065AD23A8D709161FC74B34E23DB
+                               B918EAFA4465125D3780BF0B5803AACA
+                               037AA0A14D977141B611A6CA2278B634
+                  xor-digest = FEFDA1A6E95920B93380CC24FAE214C5
+                               6B009ADCB176D519CA4B8538EDFC95D1
+                               6CA06B730B28A230F0085FE43CBEE2FA
+                               2EE5DCD74D66F5CBB59F256CC1ED885A
+
+Set 2, vector#171:
+                         key = ABABABABABABABABABABABABABABABAB
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 22E1A884ED2C67CCB2977105649B6544
+                               367858D1A730AA2FA96703FA406B337A
+                               B2159A389BEF48D8A215D870B2968E16
+                               B11571F12BEC0A07FA7D3B9790987EC7
+            stream[192..255] = 4C98DD259D03A40AF38E0ED0F37CBD74
+                               B27776E9250B8B063E52E169C7B76A15
+                               0D699278AA4124427B5EB6AFC4AD5DBF
+                               600FEAAA98A88DFF297DACA5ACB4878F
+            stream[256..319] = 5FC732A26406FF0DBC764ACB05C83484
+                               976B640E60CCD6ABFB908583ABEC3E75
+                               2878371EBB5374C9B37A63E0768AE10B
+                               D857253D940AC408EF49EDD590E806AE
+            stream[448..511] = F012E429C44D5DC03B88123855B62C0E
+                               90E06759306017B5773752973850531B
+                               C480316CBBAEDE6353AD5FB298349AA9
+                               16AC0221A4CE1E4729BFB9C230AAF9FB
+                  xor-digest = D73B872315F9052C67C4CFC5CD912DBD
+                               60DA32FD06D9C8E804968E688898200C
+                               1D979DFFCE52E1C3B3309B58D12BDBB3
+                               D3EBA2954D1587D720E004E12EB4A13B
+
+Set 2, vector#180:
+                         key = B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = BEF4DD0101F80A8F880BE0613B2AAF88
+                               D2EF924014F7445ED922E9C021571909
+                               D7E6BFCAEE0724F2A9C522C4BDE4BBE9
+                               FE53FE592C0FEB80D2C7A51FB8BE9EF3
+            stream[192..255] = 6B1966D3EE460999FF09001B0ADEC484
+                               0D22CDDFF39EB0E3D5FDF74C6E7B3394
+                               A0A4271D780DE6DEE9AC58B4903EEDD2
+                               6DD14E14A4DFE506748D5DCA6DDF4C5A
+            stream[256..319] = E79D99119996FBB5163335E2F79F0502
+                               7AEA5372136E7B3C5BE1F4A673A2DC74
+                               60834B81BE6C4976C4A727C8E6046A64
+                               4CAF42EEA6A068B7E532581E9037BE9F
+            stream[448..511] = 5C4F52E0E94884C829DA1FE88EF34614
+                               9F3EE55A136EFA3B417DB63D2487DF82
+                               794E161B3153DDB2E1E4F385E1A848C7
+                               729FF5CB1CB58D5E73FAB1F2DCEEE5AD
+                  xor-digest = 2F3C231B0228C274255F3BD314ECC7F3
+                               1B9C49177009AFF2CD88F807092D77E3
+                               C74C1B9B8650F581EC7603F4D6E70955
+                               1B00C3192414C04AB0AD8B0B9BCFE988
+
+Set 2, vector#189:
+                         key = BDBDBDBDBDBDBDBDBDBDBDBDBDBDBDBD
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 05AF4F98E9D526CD7912F3E8CAF45410
+                               DED6D4E331633C5621B94E7EBD15E856
+                               04AB202A553EFED55A548C7AFFCD2550
+                               60315FD50A305D8BCAC9C077229D34AC
+            stream[192..255] = 786D24EF3FBFF6883A4ECC4F40E445AF
+                               3CFD130D5B6A9CE37BEBA429AD137A82
+                               44D0586FEB16D086F533D1885A82F73C
+                               F2AD2C645591F80ED09942F0A08D898C
+            stream[256..319] = C214B6AC700164FA66DE346A27A99463
+                               C5B6C0E43A9057384BE168E163058FCB
+                               6E7DEC871C6531EFC8B8D581EF92757E
+                               219294D39E0C9C8276440BE56C3D9941
+            stream[448..511] = 22CF14F5BD70E719AFE76C53E5D611AE
+                               4C8D2171695C9CF97E2936A8BB320670
+                               015825547A508EB43D96F2EE1EE2CB34
+                               4E120F001500F8ACC3E19E30455D09D0
+                  xor-digest = FE5928C74EA21F23E29171E5AAACA20C
+                               DD8571E907763C96B99A8C11F9A1D2F5
+                               78F68A6C440996995F7AB6E69B3CCE33
+                               CF8CE0C16F54355696D47DBF82EA8D56
+
+Set 2, vector#198:
+                         key = C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 75559677D7C762F6CFED942D800F2FAB
+                               AB5F3892DC2C79922E96FD34FE511C11
+                               251C8EB7C639E531CE08A8C99F62E7BC
+                               F68FBAFF99D62348FF91CCFEC2710055
+            stream[192..255] = 149806A4D862EEA81F0208D927339E5E
+                               C98E9C2A6E0DB85CC0380DED7EC5B8AC
+                               4ADAE76AEB9C7B7264C3834316209615
+                               25221D58C0174577110596FF89C8FC69
+            stream[256..319] = 137E527A0ACB8B96A9FA07890B60B78B
+                               3CDD19BF89B31FF75A814F470BF97E0E
+                               1293B750B769F5BDD750DE5025D7534C
+                               AD541A1F26C6AE9AC2FD3237C156AEBB
+            stream[448..511] = 0958243E88921B81F04AE63658E52D76
+                               CF2638495B3A6B970633A7C8F67B8CF9
+                               AC378082F72FC63BEA02881CC5B28D9D
+                               C8C261C78B2872B5EBFC82336D6E1A28
+                  xor-digest = 0084D7BED4953402FE8F7FF71A28CEC7
+                               0028A08A00EF935C06A8B3632DAD5914
+                               84E44E372A753F8E630741266C0F4218
+                               4923608103042C70ED4ECC5112B9AF6B
+
+Set 2, vector#207:
+                         key = CFCFCFCFCFCFCFCFCFCFCFCFCFCFCFCF
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 0C46BF67A3DBA5DCCF8E4A7A65B6FE28
+                               98C701CBF5E88F1F3DCB6B873E5CAEEF
+                               23024ADA678E1A2CA9E25AA8B476CF4F
+                               9FCBC297FF03A9B94A5A736274EA776C
+            stream[192..255] = 73B9891D1770289A67D6338909FB6282
+                               9A425B7947FC30DC52B11E398E85B1EB
+                               537E1C02898FEBFC15A9172C254CA55A
+                               AA1B56EA856F47E37E2F252D92D94ED8
+            stream[256..319] = 6522D372F90F2DAC155D48F165B6DFA4
+                               38B63B9F436FE00CC075C585297B8F90
+                               E6062358D29641FF9C28EED4A23FC53A
+                               6B5C60C2AF1E8146DB27CCF5F43BA838
+            stream[448..511] = 642541A9733946827D79BBD815C03C17
+                               6357BD6E81E9A61FFFD4A0BF6863AC71
+                               72AEFB92C1F235641BBE1457B724A6AA
+                               AF9FAC687552A778B034C4A4F8E41ADE
+                  xor-digest = 9DDBC1E7D31379D027B4F3DFD72C3668
+                               BD0BC5A97655978E79056B3D25DF3E79
+                               5D5D8BE5D1AAE877F2E7D03225CB6609
+                               6EFE11CBCB728039A243E326437CE73B
+
+Set 2, vector#216:
+                         key = D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = DBD4E866F4E24E7F66816CAF625BD07F
+                               1F7BDFBB81428FFEE9FBE14DF5F5F3D8
+                               A044EF53A868D989E16165A0F2B95E8D
+                               83439BB4805A125AD0CA7994AE11B852
+            stream[192..255] = 7CACC4E7B9B1957ABB22ECB9D9D67184
+                               EE7A7F4B822A1C955A69E238022AA313
+                               276C2003E27AEF1B4F94B33A6428685B
+                               F048B357EAB297B7DD98E612F054A317
+            stream[256..319] = 286B484FA80A45EE4D5300DFBE173E8C
+                               978B976BE1B6CB0D15C0324D6B70D265
+                               385B615B3EA97A55D94C47F53FF40861
+                               4460857AC9568556AE54A52546B41B5A
+            stream[448..511] = B3AD999394343F6F0BDDD0B1FAE2E3A6
+                               5BE2BF56D2B78A401D5761E2F3AF8B18
+                               A2B1089864999D9B99E5BF6959F8F802
+                               975FBF204D6159CF23F3706CAF0D9BA5
+                  xor-digest = 0957D6887501D4360C430614B67D99B5
+                               32849E2F5C69CE8A9F3F707A2B5438BD
+                               0C1237B5617FB525CC9C043A10DBB265
+                               3C3F0A353E89A19838B8F68542E09526
+
+Set 2, vector#225:
+                         key = E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = A6DF8DEE1EF7D1AF773AA3E9651B645A
+                               50CF101BF065F69F3E78BEF5D689B1D1
+                               D306FF41EB3E78BEB75C4200937CFE60
+                               E89E370680C519B2F64E23516ADF8062
+            stream[192..255] = AA30580A210B87727BE17EC52AAAD037
+                               3E0DD11FBFC89B37825CA4D6F9E8D433
+                               E3EA54C37D678B58CE834AFA310F6D4D
+                               06B4603F12DBF38595AC76511D0B13CF
+            stream[256..319] = 5F3E1A55116CB67BC91C8E37182EEEEC
+                               8FC9B09DAA6F418D3434BFBBFF6BFFFB
+                               F93F8A963F2F51CC487BE868F010EC0B
+                               EE17A480542A301E33B36F59BEE13D91
+            stream[448..511] = 672048756C221C12DA6178BE711B3371
+                               525A92BC9A219CABC5501B0DA4CC248B
+                               8742E8BCBD6F5A1CFE522F3DF3BED6B6
+                               5D60D1AC737ADC582C2CB9751521828B
+                  xor-digest = E7CA739E4DE0E74274E491CAA9BF5CAB
+                               3F418EBEB69509D69B2594E964759D15
+                               104F674CD44681AFECC3B4939CA0A0C9
+                               DD7AA5726653ED3FBFC833DDB0C87B42
+
+Set 2, vector#234:
+                         key = EAEAEAEAEAEAEAEAEAEAEAEAEAEAEAEA
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 2479A8F2872A813D16D15F060D300237
+                               25297B812F6F3B97D74D9716E4403A5A
+                               684D2BFD1E15275470FEDADF1578277E
+                               44C6C06B8A5FCE3D0CCC5E13BF49947C
+            stream[192..255] = DB2F9B25F9523FF5C2CCCB808EFE07F3
+                               132D4B0065A563288F848E05EB45E48B
+                               D15C069C02F90B4FC10AEBF1AF4BF90E
+                               2CF7F48C8CD7A8091014131EBC21FBE8
+            stream[256..319] = 84FAF79797E25BF2CFD54E58F5C7AC1C
+                               EC170B064429EB832924CDA9C47B5174
+                               9BFEF80D96FAE36DDA65659FEA1CC06B
+                               4EA3A1601A3304AA4DDBEB62381FD4DB
+            stream[448..511] = 2C8FC8D23E7DBBC37BB0811D1BC71145
+                               BFBCDBAE19F5281CD0E6AA37419778DA
+                               64DDF68726DD7F4D78BBBFF4576C2AAD
+                               93F477A2AB2C3CA8A381F30BB944C7B0
+                  xor-digest = A6D5F0DDFC0A43491D6D0A17C095C070
+                               9EC7E9B89DB8EEA11045ACC5FF003DC9
+                               CD3318BB6F9675EEF20E15490F525066
+                               AF8380C663B60EDBAE30663C94C39892
+
+Set 2, vector#243:
+                         key = F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CC3701E703946194401D1BA23AD99B5D
+                               F3F856138E142D4B9C23DC9F252A277B
+                               D62DAA33A71A0C61079AD5A20562291A
+                               B6EC92C66D7BE6A17E27D4DDB48EFD31
+            stream[192..255] = D00665FC0A4ACC78758EF25B0B0D6903
+                               D565423614409AD11E821B83F5B35D83
+                               F26F3EF9EC1766FEA9C21C09E0AE248F
+                               4BA01E48BCE09D06471593B3466703DD
+            stream[256..319] = E8B4EEE2C8BBEDBA758C1C2D0889FDDF
+                               96CDC215EF1A62FAA29A5608C852FFA1
+                               18B473C5A7319446F3ED2E8AB39A533D
+                               714325D1B14E838C9EC6E037DB0DD93C
+            stream[448..511] = 4FF3B43841B17A279002EFB07324625B
+                               7E937D480DC73F12836195110ECB4DB5
+                               CD31CA4F92F612A95E82815328DA7D5E
+                               4DCC5BB6791603EDA64C57B5A5AAA04C
+                  xor-digest = 9202B874C48D4B1A9E857E645EE8F884
+                               D971CE97923AC024ABEFB944E34550CE
+                               31712BB832F9174F86FCD369E75CA9AD
+                               85095F43A4B7F33AB641BD6912D2C59C
+
+Set 2, vector#252:
+                         key = FCFCFCFCFCFCFCFCFCFCFCFCFCFCFCFC
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = F374DA745A5CF93A567027609E5D3B1D
+                               5C3C8A4D15203705D978AD42279F6548
+                               51FF713F5120CC93D044EF717F5A75E4
+                               98DBEF559E5F157A8C819E213E93B3F4
+            stream[192..255] = B270F638AAB88DFF69D724F79B70CEC9
+                               175AEAA99D55485954B265B5CAB86509
+                               C810E664766A8E6C90D4BEE3A58B1815
+                               9076959FFFA2F30EEB12343E9E7778C5
+            stream[256..319] = B2CC84A1127B5333B30EC81CC14307FC
+                               418DA96336991A27DADA74FDA987B867
+                               B125C53C0E4E2889FDFEFBFB48797A22
+                               2836B2EA42793CE2BFFD568F6234B368
+            stream[448..511] = B70F4A10A1B75D499E8189C8B92AFB36
+                               4CD2D730DC8D7E183EC55A777C2445EB
+                               BA7E9CD95C8F3A206B73C422AC2E2C08
+                               15A8C6FED156FFF93B63DE512EF69725
+                  xor-digest = 467EDA43B849054EE747A532ED0D9AA4
+                               6EA1BF2B6AF19F481D6E3D55EBAA96FC
+                               6629FE65B5EC4B5EB6A155A6D60FEA32
+                               F04F8230E26390F1C8FA53D47B68FEAE
+
+Test vectors -- set 3
+=====================
+
+Set 3, vector#  0:
+                         key = 000102030405060708090A0B0C0D0E0F
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 0315CE93BE05F88212B413335CA65F33
+                               6387BA612421C7BE8276299CC178EC31
+                               2143C503A9F2644685882201137BBBD7
+                               3A2385F0AD14B690281B54B8DC064150
+            stream[192..255] = 8B663563AE31DCE7AC61BF4943466774
+                               E9EE784644AA761B9D8AA9B8E04D4C91
+                               75650DDF130454DD60724864DF2FB6B4
+                               31F947F8FCA83F6D3B113BC413D3CC10
+            stream[256..319] = 35EE3D4294E5660A99A1A1C9254D27A4
+                               B42FEA8CBD5C5BD8B902E1B1BFEF17D6
+                               ADC9B6B924C7C53D44A5C58210989BE8
+                               72E532300EA9115CD2AAC8024779B3FC
+            stream[448..511] = 402F841F64827A197FC56EE9C180F5D1
+                               075107622178407B063F70C6C860C6EA
+                               E3016D56F7CDC13A109283F5F4FC9420
+                               6C62BC3D1012EA03EE08EBE8C2DC074A
+                  xor-digest = 6815E00D7D3414FCB103EA82B38FD4F4
+                               68A453E84A520B7119E9D3A4C938BF0B
+                               AC26F7F73EDA7F3E2F20FBA551C15205
+                               EBBF2F6BFE6DBAF95061F0AB3988DD57
+
+Set 3, vector#  9:
+                         key = 090A0B0C0D0E0F101112131415161718
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = E695E5417AEC9FBFC0EB0909435E79C6
+                               76AB8E2F28C556CC2C81CFC5F7A2A6F1
+                               254EC0CD2CFAFC257907723557C1DF5A
+                               D81D1E3D201410A12A5FA3A6160F266F
+            stream[192..255] = E3D590D9AF3869FFCBE2A4B8C77A09F6
+                               211193F83B8A43714CCFC02D014376C5
+                               A44FF7C061471AE208F04DCAA89792FF
+                               AE7096EAC47898C1011095DE9B55682F
+            stream[256..319] = 0F31D78C0B86D246FE105AA6D9B93CE0
+                               257E75CC0D2A0BE96B9156555D8A407E
+                               01F47AFF719CC894EE111C32672B0404
+                               B5F26C1DB1D7D0F9E470900AE53B192E
+            stream[448..511] = 1A01733BB8EACDF2B2F4322FB54FB6CB
+                               C92989248FF31BBAAA8304ECC4AF9A39
+                               CAB21BB66E0A144D8B77C537BD52DDD8
+                               C5B0909CC6423D4F243E5AFE6E22D07D
+                  xor-digest = F8C3BF6905A19184D14039E4B7FCFACF
+                               2EFA004B35B55DD04F56199C6C9DE1B4
+                               458C5EFAC45C6062BA1EB726426987ED
+                               88FA899849CF5F6CEF60119F6A68AF9B
+
+Set 3, vector# 18:
+                         key = 12131415161718191A1B1C1D1E1F2021
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 3C189DEDA71E56926CA2C3A2974C4FAA
+                               B7EA3C1250E768CEA797ABD6477B59F0
+                               E5494635CB4700A95BBD54B0E93D12A6
+                               423DF8F34BC6B3BE705ED6704BA33894
+            stream[192..255] = F21E411ACF063846BF68F61F7673710D
+                               CFBF8088E2A815F406E17C4BF4E839AA
+                               D2EB9D137B0F7889E68F4B5C8160199A
+                               7C9C697EA6A1794E954ACB535A72B255
+            stream[256..319] = BD7E1C4A54C911E84067AB00F8427810
+                               BDBF4029E78D424E65F477BEB457900D
+                               0EA49B639863BAEB1427A161B8C629D3
+                               55097F5DFFB24BB97329A73B144DB7CA
+            stream[448..511] = A4D9A80D0055F2D8C55D2A49B39DCA69
+                               9A5652C43258152B42BECDE07F21F8D0
+                               EAAC565DCDE549CA4A9A27D82F5AF4BB
+                               1EEB1B0A53A58E50C3E83CBCDCB980F5
+                  xor-digest = FF451365606D0117E15FC2721F40C9CC
+                               0FBF6442A771F8FC3B06186C35C6CA13
+                               B30F65FC84B9A38A6FBA2B6F16541B0A
+                               0D77BDB4F696894B2B73CCCB8D6FA3B7
+
+Set 3, vector# 27:
+                         key = 1B1C1D1E1F202122232425262728292A
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = BE4A26D09D47D25416355FB7FF60AA06
+                               3B3CDE5374780F2C66514A0CAA07406A
+                               88490A2E3D6294A799C9BAAAA1B10ACB
+                               88FF4F6F70EF1F4F67D591040244FEE8
+            stream[192..255] = 54F1AB7235B6440D6A7FC7851E3FFDA8
+                               6CAF44E3F57E1E9406908064FDDA3A3A
+                               3C7AA1CB6ECAAF376C5F290EA02844EA
+                               779A225131F24D2E7D34AD0342399FED
+            stream[256..319] = 81AC4F45FC40CE7E1FF890F5EFF2B583
+                               36F71D1911C7E0227AD8E4DFF7369B41
+                               A8C266B3468A78773C4C40A3EEA6B724
+                               97662462F48835FAC7B6C77CEFD39A65
+            stream[448..511] = CACFA9A51224F533C600BEFF1EC03C7C
+                               7C22EDF93E8596128F8709F0CED4E291
+                               997229AC5542FD2CC9B1167C3D2BB57D
+                               9B08B82C0FC41D93B7CE2211C5E2D534
+                  xor-digest = 0D949205B6024DAC1D215F2AEA7CB484
+                               3FAA9A1719398AB8828A28BD2568369A
+                               C78A224AAD95BAE6A6333C4C13D630B9
+                               42AA52099F6EFD6871B1E45C8DC68AC7
+
+Set 3, vector# 36:
+                         key = 2425262728292A2B2C2D2E2F30313233
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 65906EA9CC0080D2044671D22C7DE242
+                               F764184ABE8DADBCD550225BFD541D6A
+                               762C7A5268EA0ECE51D18269E71A4CCC
+                               054AF634616204C81AE7E515719775DF
+            stream[192..255] = 9ED75834EBBD9576E11DCE8C583ECEDD
+                               2B8780FE98B44E9F08BBE96922C77BEF
+                               08DCE0DFD7C77C42236885BE6EDC8343
+                               24EAED350AA5A513009272818CBC4BE5
+            stream[256..319] = EB1D998260B3AF4472DE59E1C9DD359A
+                               B346B32DCE36C92C9B7BD808BAB76AB1
+                               EDCA2827557501BE0FE28F6498B33B9A
+                               F4EA48786F3158E8047A32A03AE1CD90
+            stream[448..511] = D06B1B9B8110FB9809F5887A35CB24BB
+                               80EDE203AE648AF9FA348B18D8A15B8E
+                               E98E8AB98A7AC5BF71FDEAA1A6E978F6
+                               7D5734AA7FA88E8DA44C861E2F54E585
+                  xor-digest = E77DF8C1D5F46F8896DD00187C840B0A
+                               E4404581DD053C6F39323815729DCE90
+                               0D85C2D8C97D0A3B57CF622F81077B80
+                               92988EFFA36CA176F7393D1E38AAB206
+
+Set 3, vector# 45:
+                         key = 2D2E2F303132333435363738393A3B3C
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 3FBFE9A391DE0CE5AAEBF9DA3A15EB99
+                               D6CBAD0341CB78042C89F5D5B0B555C8
+                               A400DC47FD19F40493B348CB51430B44
+                               D05AFCA9D399709EFAB8ED2587F72E85
+            stream[192..255] = 68969047EE54910C44F8B5718E993234
+                               D814C27C0B59EE09F0D35B58352AA6C6
+                               594F605C25C16CDDC29A354A1C6F5948
+                               AE497C093E2D41C211E4C1417DFAAFC4
+            stream[256..319] = 0DD68E08A25ACA4448DF4B562EEBB855
+                               14E41F1F560C479542FE62C2DCBCF03C
+                               30AF180FB71E65A9A09C551551A33942
+                               53558C2440084E6B4CB664A4EAFCAB66
+            stream[448..511] = D93B80D67B6484030103CDD72536E695
+                               E7BAF8B1115109D5D5517BD1E06F4236
+                               A3551688F5C0D78B2CB080AC072B4C48
+                               94A2AF54AD9D816E2068AC569BCD2AE2
+                  xor-digest = 7C071BF395B48A023A7B708A9651EC8F
+                               0C9A00DE8BD9D0764C7F1F394AA2B747
+                               3EF87BF792D5B89AE0548EB9C1344DAB
+                               DF2E4EC6064D50EE1622160D6DD7ADFE
+
+Set 3, vector# 54:
+                         key = 363738393A3B3C3D3E3F404142434445
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 64468807E7EFE78E11B0231D8D7AE80D
+                               BFF3FAE444A60496C8F2DA202941686B
+                               95C48457C1F9DE1AD2FE581336AE36AB
+                               CA574BCB9619CDDB96E4499409516635
+            stream[192..255] = A7DBFEAD9B969D334705B6C53A0CDBC2
+                               21E0BB92854B0B107CC39F8C6E4761C3
+                               EACC8D8C5741AA4243C5BE1A79971A0A
+                               5A23F2BEDE9F3628CB9099B8C7EA9324
+            stream[256..319] = 1A44FB18740973F3124EA805C90C4B27
+                               4EE788D43F4B894B01F63C13410EC204
+                               2607241E87555B0E1A6FF33AF0DB010B
+                               8ADF607E6353FCF74F568E0BAF0F4455
+            stream[448..511] = 11568B95495E520EB6BE106986A07C57
+                               8FDF21463607619E5AAF117D84611E75
+                               F8979F59E60B43C0A37BC24429892742
+                               0D206274DA45EBBA7660422DA45294CD
+                  xor-digest = A70B9BFC683AF2716E17980A49C4F747
+                               AC25992BA7BCA5E5C2AE162497E4E8BB
+                               62C837F64EEBE4A55B5705F115CBA057
+                               C560B1AF0A733B5631E23442601A741F
+
+Set 3, vector# 63:
+                         key = 3F404142434445464748494A4B4C4D4E
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 35865AF843244DD2F95CDF7C9BD54471
+                               9C8432538842C28F93AA21F6E10F8B18
+                               31C2AA7EC010A66E539CF65BE55120BF
+                               090233750995003C7AE414DA6D55F86C
+            stream[192..255] = 190F215FD14E44CD141E47A2322D324A
+                               A63A7B512A77C20A02D3BFC1EF8273C8
+                               F65226CBD1BF32A104D1AFEFD6719E4B
+                               DD6355B044EC8D0CE95023C61007E6BB
+            stream[256..319] = BD02130F7CFDBDBC2171BBDEAB501136
+                               B2364F5879E6E9CCA7E75AD81105D9E4
+                               87E9175B62AFCAD79B23D392B2E9C418
+                               437527118797602E629A70CC869AB7EC
+            stream[448..511] = 1F0DF396B5CA6EC9767B0674B2C7A9C9
+                               133CF872DA39DE78F56D41C7F2FF6B50
+                               716717E995D42C51D6A2ED66FA6CC7DA
+                               92E9B3B4D1F130E699C430CFC96969BB
+                  xor-digest = 70291060FEA7D40B5C3FF731FAF7630F
+                               D9BBED1A7FC25A05E6B3F632E6FD6B91
+                               1F1010E1BEC69F16D44C5183E38BE8DA
+                               8949A4D8AA85F5149C203F8C92887875
+
+Set 3, vector# 72:
+                         key = 48494A4B4C4D4E4F5051525354555657
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = BFFC0703408DF6EB169656D09A5400DD
+                               9C4BAF06A3BC7220E45814104B6D9000
+                               9585BF9B0CD988E94B8C5026D07AD7F5
+                               7D81364775D54D808A5C18453B62A2A1
+            stream[192..255] = 5FC95B73A4C91DB20B93319E420B4C5B
+                               A9DE1873C81C835CB455970A90921594
+                               F9635EF4F411C9ACB4298F75B2CC84F9
+                               7F52182F7F001A1EDF72A68FA1ADE313
+            stream[256..319] = FB24E97B0CCFE15644BAAFF342C55FDF
+                               64434708407AA6D73576E842D5ADF4A2
+                               6B32D329A2DC9F1451C4BF3E9599E9E6
+                               4E5E65F73E09E4F1254BA0DDD8E6C52C
+            stream[448..511] = E2EB303CD0A67C99CDCEE86BEA581FF7
+                               093C9228900B563C6D10B20BF99D3911
+                               D47C805D1447C8F233D3FDD27CF0DA42
+                               D42E0389E2CCE99A274AD9D20B9C6102
+                  xor-digest = F83FB58CAEC8B13BC25C152FCF24E10E
+                               392A197FDA05A6A20E14093EA0B34C5D
+                               FAE102266465324F5AC07FFCECC8E618
+                               D0BB60761A26D5FD59D188097A2348F3
+
+Set 3, vector# 81:
+                         key = 5152535455565758595A5B5C5D5E5F60
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 84076D83A841C8C6ADDE3B5D9FDD6529
+                               4D0F92B549112F0A6DE05236F732E81B
+                               3C8E92229C411D2295129ECD18DD08DD
+                               C98BA78D9BAFF6271D95E1F361EF699A
+            stream[192..255] = 7063A52FB2729433D8A7BF30F27E6EF6
+                               F17C2A422E60A737270787985508D062
+                               4E678A597845CA9EF939F4B8966BD99F
+                               B8633FEA673CE7BFD2ACFB5942D7EDD9
+            stream[256..319] = 4FCE866E8C2359C53F0429F569D02DAE
+                               E99A4062246B633D4C502DC897AD8025
+                               38C95D49D3B1FA94F4E92441357B622A
+                               6264F50D5554BBE42191AB3D6073A8AF
+            stream[448..511] = 2F7C38BD00309FC81D28D84EE4355216
+                               D97A823CC46FAB9DCAF621E4128F9CB8
+                               838BF02E0EF940EFE96860CC0B996044
+                               42CACFD3306335241C1B4B65E790233E
+                  xor-digest = 44038A33AF0013BB34CBCFB77F7E060B
+                               96F5134DFCDBF04EB8F7F29B15C3FDA0
+                               F766DC940FF548C23712625793851A94
+                               294CC7201E1EDC6056C12A46524C6FD0
+
+Set 3, vector# 90:
+                         key = 5A5B5C5D5E5F60616263646566676869
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = E811CA3DD1DD0057AD3A1794D3F9CCB6
+                               362049B1692D6ACFE1A6A0FCC99C7A04
+                               3AB9932A146B4040AC9F8E2F0A227C7E
+                               C60B1F35D60EA14483BAE1F8D1AC7FE1
+            stream[192..255] = 865B05E224133AFC45043F05F8082FEA
+                               487BF63BCFB96DA3EE26960061446669
+                               B1C92C6BC5905BD1EB57D579CB62A220
+                               2F35CEB603658237AF1908132A25971C
+            stream[256..319] = A84BE383FC852F1BF44130EAD15B3548
+                               56737C7EA68A0700A22D357FBA70E031
+                               BDC0FE8EC36C41790A8B7706A00CA338
+                               603E054A83881599D718B1911D1CE9D4
+            stream[448..511] = 9286C3479F9A17B51D8749257F59E892
+                               CE7C3EB8638B29C17D779811F01EA405
+                               257062A5F28BCDA1862FE653C7607350
+                               9A87D12EDC5CAAFF9E8F9F76DA0BEDE2
+                  xor-digest = D629CA4708BEF7EED04BB5531DDF9C64
+                               BA4981C9A705D59C4B2391E94B79CFCD
+                               058406845D81E7EBC097330C01FCBCF8
+                               D78940893B4FA38554A32D861AE96D04
+
+Set 3, vector# 99:
+                         key = 636465666768696A6B6C6D6E6F707172
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = B89516368AFEEEC12434F76AD1E1ECA8
+                               FF6FEF7B46D05EDD6041C7B8C1E3A33D
+                               2818E38113592B615E980304D93435DF
+                               BDD5676225173331C3667F30AA2A3D2C
+            stream[192..255] = 249528FA392B19B6811711F523D27578
+                               F1BDE75CA167DDEC08303906B64FAC0F
+                               B2912A7A0EDBEDAF9FEDA420DEA330CA
+                               7302F5780827CB11B15A4DD333FD7099
+            stream[256..319] = CECC1B5077BCB9E129B01D8D75089B41
+                               64E76DBC9C8CF2E4D2F17A6248522A51
+                               FCFBFBC992F75D613307F4DD6472B6DF
+                               C8A5B29F1068FC0F1C3F8964B0E09170
+            stream[448..511] = 8B26C436E918B099E4D3A7D4D3395E49
+                               056A8A29130667A32C6A2B0FD08A482F
+                               8F7538ED90374846FFD2E1C733AFFDA1
+                               12148C9718F3F208344D5FC20128AE2C
+                  xor-digest = EAA0ACA59CF63BC27082BD52D6757FD7
+                               620A7AC5AA2FAEC52646978E2057C5FC
+                               F60B36C09D87419C1D1A64133357DB05
+                               6B96C854F38C36DD657524FD09729341
+
+Set 3, vector#108:
+                         key = 6C6D6E6F707172737475767778797A7B
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 741C607A6BD38F93B33244C8B7F05D78
+                               46F6A05CEE5A87762480DE123D3BEE63
+                               240928FFC75ECD9AD1785B1664DCB59B
+                               A12F3B64C93BD4FC8C67C0934E5B0ABD
+            stream[192..255] = 3BDB31A701DD7F2E929803C3A47896F0
+                               9E5F569A32AA829E505E34BB7232597D
+                               B838F543A34CC288F9518BE16A228D42
+                               BED0CA3CE0C6E7FF9AEE63625C699B9A
+            stream[256..319] = 1CB7FE159EC1A57043BD142236DC0A18
+                               0CEF37316A6E96354AE319142282F19C
+                               1550EB645DA8F7BEE2ABAE4EAAC0BA29
+                               893E722A6F8E0A9B34368DF56C5845B4
+            stream[448..511] = B6DF810D69EAFB7F2360F6ECB50C5861
+                               7D32B3F495B3E4424045E88CFA0871A2
+                               9314121CC78B98B456ADF53E540346B1
+                               214AE2ADB65C552273F1FA498FA74101
+                  xor-digest = D35A8AE5783348824175BD34F2E16FBB
+                               975E7695DC6C4FF1ED763D404B0D4D30
+                               07AAF01E988BC85DB2FDD017691D3BB9
+                               811355C3C7A6156197AF57B794DCE85D
+
+Set 3, vector#117:
+                         key = 75767778797A7B7C7D7E7F8081828384
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = EA9DA2D5BD4B6E070479ABF8CA2D1B3A
+                               6B968A025D010944FEB51AB2E507F86B
+                               111F8A351A3F32CE1FBC4A75AC34F722
+                               1B5190F2390073084F8153E00BB98D0E
+            stream[192..255] = 0AE0DC3D0E2D3F5F93E446BEBECC4F60
+                               862D190829A209966E132DD029ED6998
+                               DEF4F613F3D53D0A36CFBA2CFE345DCF
+                               013B6CFFEC0116FFC1659A57FB42E0BE
+            stream[256..319] = 5A7FF46C335912389D8B88437CEFD27B
+                               76706405F45F87C91390273D9B70CC5D
+                               89FDFA85E20EC82B98A79BFF5FBF6AB1
+                               4F61F2C1289CD7B8357126C8E13271AD
+            stream[448..511] = 9398E699F5AD8FF31A50C8EFB9DF0D0C
+                               FD612B951A203C1BF85C62AB5AF1C412
+                               42BFD0A55F21820C6F917EC90A8FCAB2
+                               E774A93713A99C7900B80A2BF496D0AF
+                  xor-digest = 05D9732FF20A61E19428873830DA7282
+                               819234F22FE7DFD8871C21CF10C08EF0
+                               7C0413898DB144861B0CCB62992DF40B
+                               29A0A4688C91275F0A198AF39899E362
+
+Set 3, vector#126:
+                         key = 7E7F808182838485868788898A8B8C8D
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 8C4F8495C7231AAEB704E7AB9E79E748
+                               6CB5BC85D3622B8A2E2CB778BBFDACD4
+                               CEF73CC485D8E08406F5986A28706CD0
+                               56D085201DEDB875573B57629B8541C6
+            stream[192..255] = CC6374A744E9205CA39BCD678074B844
+                               16346A7E54F9B87905BADD2FACE7B9F4
+                               B0A366AA3F632A7A67AD8AAC4827C9BB
+                               A1E801A8786BC4FAC2ADE6A6AD6A45F4
+            stream[256..319] = 4F52AAB001BE94A60761CDE0334F8A84
+                               C617195B084E441070E343CEC3189CF6
+                               D6D955F9AD649A3891BDFFACA0A6E6E7
+                               7291396670BA07469D267EB80E48353A
+            stream[448..511] = 673AF85AD5A9A3F26CBABCE9BEBBAE21
+                               E0B6DCCC3256227FC0EAEDF343CC7E9A
+                               8896023DF073E88EEEF135BE34CF67A5
+                               5FB51D3A1754B15A7C4E2CCCB4C8D51C
+                  xor-digest = 2BD4B8BF9B7E79B0EB53318396B03575
+                               0AC918A6A05BBA499D81C9EFD32A0FCA
+                               34A83FC801CD6475A774091F33AE7689
+                               B9FE28645F545E9A9531F528085926F1
+
+Set 3, vector#135:
+                         key = 8788898A8B8C8D8E8F90919293949596
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = BDF2E95B80FDF304C3C4A8081391EDC9
+                               7F9553F93C27788F03797EDEBB8F59EC
+                               2FB2FCCA7727CA1CAEBF5C8DA8719492
+                               F1369D96B2FEFA23D89400CF7CA667EC
+            stream[192..255] = 6AB7500D876A4924DE59800345AD69FB
+                               BA1690733713BF372E0108D9FB65B0E4
+                               50BB89899AB84198381623094F823FF4
+                               8BF9A09F0FCA23684E78654F3D231173
+            stream[256..319] = 34ED638D249BB1AB8B16D350309AE32B
+                               9FB62CAB0EC7AB9D5F3C12C9A6502497
+                               6323EBBBC4CF308FFA68A3D4D8D3959E
+                               AFD3BE46E36072FD15A5DC3FCDECA6D1
+            stream[448..511] = A8BA33AF6CF545424E607A7FC4CBA593
+                               CB05B38C836B21D85B6FB1894926A459
+                               8D71AB424A5A582A491747FED94125D1
+                               08D6C693EC9E4BDE2F418810A921B54F
+                  xor-digest = 84F29F11524741D39779025D792AB735
+                               07963EAA0FA8EE220ECD3592E1320567
+                               BFE76EFC3356860192DDC5F06B94E552
+                               43D659D49FB94C30AB69AB5E9C370A5B
+
+Set 3, vector#144:
+                         key = 909192939495969798999A9B9C9D9E9F
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 1C03A0D6CB75670CD7D978B2E371857E
+                               27E597B15B905D5F4F4384FEC227073B
+                               5A56D8C0C4AF767F267DDEFF86AA036C
+                               41EB6170603AEB3E3C1EF3E176CED812
+            stream[192..255] = 6447D1E067550DEC9E8AE89DB02B85B4
+                               3DD7E511C8B98438BAA50CFAF7CDBB68
+                               757DA1D03A29B9EC6BD633E17BEBC8EB
+                               2D8D453F583E4D183AF30C9F47C8DD56
+            stream[256..319] = B324756101C28D9FC4D1F065F1D000F4
+                               1155514EDB30A7FE36C26B18FD93D6D2
+                               0470A41B6F8D2E8BE140568BF72223F0
+                               981CEB9D100B21C8B751BA6B2816B2D0
+            stream[448..511] = 304AADCAE0CE80E91E3558974A944663
+                               D1E2253977CD7B0D1BFAA138DD81A501
+                               D7EADD8FC834931A44642BA9873AC1B2
+                               47A454EE71F7AD8671BC15E088D01532
+                  xor-digest = 5980D43A91C09B20B0F3323F1750CB47
+                               118550920627B6C512AC5CC53AA6AD25
+                               68EE1EFE702FEDE7CADBFA25B32696FA
+                               12A18CCDE35A1B679F709F28920DF92C
+
+Set 3, vector#153:
+                         key = 999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = C2083A758037E850A6FE642EFDE59AED
+                               F51F3002BEE2E69DBDB538BE2D93EE8B
+                               27A1CC89672DC14C44DADE531A88A769
+                               5DC730A2CDF3096DE7F4BD08A1ABA918
+            stream[192..255] = F4D19950E6365AE6BE8011A24B9D803A
+                               D9A8547D452D8B0B8C51676E207DF323
+                               808B5A094A2FDEA5DBC86BFCA576E98E
+                               D0E049834CBE0B3AFAD6892B542EC7AF
+            stream[256..319] = 8F2A026EB2165F39E27DB86607878926
+                               4EC8F42A09E8C80B317FD4F1E32AF4C3
+                               73B7F5160C635ECABE495B01A3488E27
+                               94D226E2D86C4654810C08B2FC42610D
+            stream[448..511] = A1D17725577B7A4FD3D1A280BA2B5C0C
+                               386FCFA09E110F00C85ECA05CC142644
+                               4D8EB87CCDC2B23D1CDBBFFF822B5555
+                               11055B93ADC9168B7353CAE10551AF14
+                  xor-digest = 7B4E8A6123216818A218FBD50D8540B0
+                               A0B62DC114F25DD476680F85DEEA9306
+                               4CBC4526C7A8832D4BC534684A403FE7
+                               B80E7F20D967ECE044085B554C158AFA
+
+Set 3, vector#162:
+                         key = A2A3A4A5A6A7A8A9AAABACADAEAFB0B1
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 6FB232154275843C74BB886D09CBE0EC
+                               CCC539DD6DEC1EC6F31578B80DD3BAD8
+                               5C992CB1A0B4EA40B3EE0C5174E36A74
+                               E1CDCAB13830453984E4365A6C599F72
+            stream[192..255] = 2682C05E19F6D8FC4DDB15B2F8385B52
+                               C5A4A70FF5A0063CD696AADBF8505122
+                               6F696746D4F8C314543BC3869B1E7F9B
+                               1C0D004655FB6585723CD1EA7A700A60
+            stream[256..319] = D6BA4C5A33B8C2DE342DE48E26AE7B14
+                               8E91552D0E05AC9458ED0010E6FF53AE
+                               EDE70E910165B5986876799E60B7E6BF
+                               3109B9BAF7EE3670497FA7CAFCB14733
+            stream[448..511] = 70C4E8AB8E8BA681A2A06F319CBC952E
+                               E3E78DA589369FEEF8A6BC6D976BECFE
+                               E6C7143337758929FCA7E0945892411B
+                               047C2CC2F2AA284E95733DD94D46B89B
+                  xor-digest = E2D3DD6AC908FF3BAE4791A50F717B63
+                               FB3F1F380CC738E2B1626FD026C9BEBC
+                               33957AF4ED6E8B9864EEEAE262FC6168
+                               9A34FA14A35BD915B6945F35BC3D5573
+
+Set 3, vector#171:
+                         key = ABACADAEAFB0B1B2B3B4B5B6B7B8B9BA
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = D25BF02A1BB050E0D15246C2EFB3EB89
+                               390BB913916D347586DCDF71D6792CC6
+                               BF72F6F6A9B779BD8833C468684B4480
+                               52E153D11A0CE183CB337450C4482F6B
+            stream[192..255] = 07980A2C57E9094C5334016A782C830E
+                               B59420086EF9D36542A97220A5EEFE42
+                               026B39B1F00A78992ECA17FCDDCEEA2F
+                               88A15F934A1C65EFB770C2FB9712FFF2
+            stream[256..319] = 8C0AF45C68CB7CA8CFF1AB18F2F9659D
+                               E49DB5C4E3609B50C06F94FC01C059B5
+                               40E302FA8604F030701FE3C833617E0B
+                               094D0BBF10580F7C1C7047E86FBF93E2
+            stream[448..511] = 4D4BEFAB68D63085A05C729F54468567
+                               2C2A9452DF6B4B651A29FBC29513E3C9
+                               635DFD75EAC87A5B1362E99033304EF5
+                               DF42420DFD49C1830D66F4F90928F1AE
+                  xor-digest = 9A7DD8AA5D9E9DA4F34AFBDE9D909CE5
+                               DEBC05D2F930FF08AEEE4096B2E1E453
+                               8587B88E535A217E986F31965C5965DE
+                               3BF4A7F99B3B9D938D2C1AF7DFEFA14A
+
+Set 3, vector#180:
+                         key = B4B5B6B7B8B9BABBBCBDBEBFC0C1C2C3
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 5FB2BFB5B9CC4F84D7641B4555DA4A7F
+                               C07C0053E7AD2CF2187F7F34ED4068AC
+                               6D5B43A5FA41437C05C65550786D60F9
+                               A737F44BE450A1F416C1B1A49890C609
+            stream[192..255] = 8EDCA89958225E39CF796EE587877A55
+                               F9B7A7381241597CA6280F7617A11922
+                               9268F95BB326585AB59F08BFCE8B5638
+                               B3A0D32A761C796060DFEBB5BCE859D5
+            stream[256..319] = 09601C099BAC574564E4CC6FD659776E
+                               4726FB22E0025C37873042866B913C03
+                               285EA24E37847F9AF6C838B82FE651D4
+                               EC5FBD40A256E6C765757B6A3CD08C92
+            stream[448..511] = CA5AC4ED4FBEF0D754F033B5267B9FDF
+                               3CA52B131E118174F70CD4F833A5ABBB
+                               198DBCDF18BABB0B0CC37ECFC8D93AA1
+                               5949FBB21974169B46D545F0ED03C71D
+                  xor-digest = 5DAFDEBC75291BA8F55B4A370756B28F
+                               554FEADDB7888F2834BA1EF221E917F5
+                               F631D5BD789701282DCF16FA450D250B
+                               52C627741369DA654E237B8D7F4A8BA0
+
+Set 3, vector#189:
+                         key = BDBEBFC0C1C2C3C4C5C6C7C8C9CACBCC
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = E9EAE6C4903004A2AFCD05FE2E3E7F95
+                               FF8BD2888C4AEBB81CDBBCB7488C54E5
+                               B50467FA82B0CA7EA923C608074E1B45
+                               6452821FC36789C8061E99E8A0C0B579
+            stream[192..255] = 1EC898A6958F23C186261F833BB3EF0B
+                               3C185AE8138311B6AB42098E9C6C7FE1
+                               0306DADE1DBF2B1C3215DEBD88AF1CBD
+                               2D805B8006FA0DCF136E225AE3D91AA3
+            stream[256..319] = 55566604D1C85FFE1D29810B6C49F019
+                               69ACB59765A3FBA2B0B9880064606E47
+                               18BC5F08C32EFC250FEE91FB88077A2E
+                               0840615CCF627C64FBB500B7B800B9CD
+            stream[448..511] = 707821EFE4119A32CFD99F7ED7CEC018
+                               C8EE90493FD9268A83E5482DAF9A646E
+                               8765D8199A56A12ECA50775099179D70
+                               B72A3CEC8F0EFF1AFD074F04548874E3
+                  xor-digest = A51E3C9C948B68A1543FDD1F158DD419
+                               195AE7662739446D9FD543681A866A6C
+                               F09756FF4E0C59BDEFFBF98D53F193A1
+                               77D7BF19320063B8AEEC8A544D5D72C7
+
+Set 3, vector#198:
+                         key = C6C7C8C9CACBCCCDCECFD0D1D2D3D4D5
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = EAA9729F0222A16C750540C605974B55
+                               4FA622F67C71FBA40236A71AC19706F7
+                               9E3792F4B444A39C9C1C902FDBD81898
+                               096338F6A8EB7C934B9558D48AC53301
+            stream[192..255] = 3B5E53787C050061000E3622876AA126
+                               00971A76253833C53B9DABA976169395
+                               3944B5050AB17E492E185737D67581B8
+                               B1C766D50C5B0C2B0D8C78A781E77D89
+            stream[256..319] = 175C28764FEAF8396B3CD34C829D0D0B
+                               E9CE0D75E79017A96C4E7B158B171BE9
+                               4C906FD4BD4946E6DEEC3C78B34C0754
+                               9E85AFCD958AF345E0B432F33C86AA76
+            stream[448..511] = 37BDD665CD9D5A8A8190AC3EEF981379
+                               AD5311E15F853A8A89840879165147A2
+                               807AFABB6236CEA9319DB32344987889
+                               5744A506CA76CE69D9E474840529D667
+                  xor-digest = 4CAAE8F441F6EF3DB6971E274181F8F0
+                               4D7BC603E040833E77921A393EA13F0F
+                               ADFF07AEC94555224F6204874027106A
+                               6D7DDF0546F300D3E84AC87699ED40D2
+
+Set 3, vector#207:
+                         key = CFD0D1D2D3D4D5D6D7D8D9DADBDCDDDE
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 83AC8C40850F4FCA5452871C954AA61F
+                               31A9BD276D39EEC03EC5977A71FDAC38
+                               368D110C57C1A19F2A7461BBFA88E372
+                               F78103F9FFAC1361AC2D2AD84C6AA3E8
+            stream[192..255] = 48E95C2FCFC79C91BACD0C41F626F05E
+                               F80E076E359299EB5272A2F688F96F6B
+                               3147C5A19A99D562A11E953CB2A90911
+                               205A7760B5C8CD959EE6C183A8C1420D
+            stream[256..319] = 974A4DE50EB45F6144DAFFA6B4A68E39
+                               48838434497B8F9700FC42005F3C2FB5
+                               A79984CC2E770C5400EA21AA4EC05751
+                               80A288499879E50462225BE03D677875
+            stream[448..511] = 09823B2D55E26C49E42FC0820D7BA081
+                               5A7EA9380637A2AE2C0D29253EEDB884
+                               9BF4F54D64677F08A1763EFFD904B62D
+                               B3843B0ADE885C00640D16A99E28DCC0
+                  xor-digest = E73D8783F926558E0C1E1B0D3FD86CFA
+                               974CD70EBAACC0CEA2D977E9AFCCD384
+                               935584D2FFEDEA813E6234112CAA1401
+                               71E99BCFE61A7D0E430D4D3F75AA3E28
+
+Set 3, vector#216:
+                         key = D8D9DADBDCDDDEDFE0E1E2E3E4E5E6E7
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 5DE3EC7E6D724976985B426D722D93E6
+                               1F40F5F17EA14B298AC898CBD69F2BBA
+                               5705E1D0CEF7B7122362FCC0D5106D54
+                               25D51F51E29C938C592D9E862DEE9E33
+            stream[192..255] = E079C49AC8F160A9D529F30151AAA7A3
+                               1D137E03DF4C23F8734AAC3B20BF8520
+                               90E3C2529761EB4D67AEF1CC46399947
+                               1240DEE8343D6355B5D7377A7934B019
+            stream[256..319] = DF574E03ADD1DCBD0712D2748C93CD72
+                               D8488396AE3D3275E5A53CAF3EC112E9
+                               50A79494F25B9EC111FE9A7A68A5AEA9
+                               63A4F87B37F822B79D954436368D8E20
+            stream[448..511] = CCEF4C93BCEB2494EB4C70F5E301E980
+                               C494AF8C117F291DD09E3960D2C5A7F1
+                               9928C08F2F51C419E734DE9AADD25C81
+                               3579A7F0B8B367A49B97DED5793E4DCB
+                  xor-digest = 868706BC1A5F3D0BDF96E10324EC36FE
+                               01596216B0B8BBFF69C5BDAF69D0F38E
+                               FE89FFC32D34D142F413A5BEA7AB38ED
+                               22436C62F86C540101DC0267FAF67904
+
+Set 3, vector#225:
+                         key = E1E2E3E4E5E6E7E8E9EAEBECEDEEEFF0
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 45A0736DB4A28A3A6DD181FEF3485F2C
+                               918C65663597C49F4FB23CA550C77CAF
+                               7B331B5D183844278E0D959EA024CC21
+                               CE1A84923E6E782472BA1645BEDFC60D
+            stream[192..255] = E9EE0DFD717F72FD8899D23E87E77DD9
+                               F9DA66B4645AAD8D8C3B489B0A637449
+                               80020326469B4C6403012B6E315CD35A
+                               4344934D720467F30B61C8AEE5C3C342
+            stream[256..319] = 94A2BA2B744CB83A29004AE21470212F
+                               67C2FD18F227FC017131D7F4DD0AB412
+                               48C59BADAE2E408584DF35C603192E37
+                               344C52664DD68B9231661F304F483F41
+            stream[448..511] = 6A29174A1099BF8759D2F5F9BA60816A
+                               B290252AEE08339BE0021033DED03C46
+                               9C8E28AAFAFDC67A7F2219C8942B004E
+                               47263842BEBB47EC6B0666ACCC884591
+                  xor-digest = 7A7411EE5D174907B1138575FCC7479F
+                               AF3437BBF098CCB5D8D25F49E6788374
+                               CBC9CC5812982CBEAF59111813430BEF
+                               56D9DEEDB6C935804013759CFAAC40E4
+
+Set 3, vector#234:
+                         key = EAEBECEDEEEFF0F1F2F3F4F5F6F7F8F9
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = C430C2A9FC44DE1563B1679C1A2DFA98
+                               91D01A302C5165EC13B26F6EE4F25437
+                               264AE9E18C98BE112BF560C72024827B
+                               85665C491C47BB396B5AEC66CFCCA371
+            stream[192..255] = 60F3A13B9EBF8784CC81C132E004A179
+                               BEA0606D4C2C830077A50004FB0487E6
+                               E179D81FD9784DC3783ABF86523FE4A4
+                               68930272980E3B46F865E4729DD34773
+            stream[256..319] = 44BC861136F6856B1C74C1CC13753B82
+                               A75E34EB40C518400B507D99B42E488C
+                               8A1F2F590E029EF48DAF2674FDB053AE
+                               5C0967923102EB964602256F70A9CC9D
+            stream[448..511] = 0EE3ADBC4CCC63A8B67C7812CD294183
+                               A2E9D4EF0D65F854FE66CF9D76A34F91
+                               867B27336F8EEC2E2CD30CCB98AD5769
+                               77B07C73C833B51753BB9B0DF08C4834
+                  xor-digest = 7F848C96AE9310B5282712493AD7E13E
+                               2B4581545E625A4DCD98576C75835058
+                               6C621244B6CD439F8E62625ECD9460D3
+                               A18BC2F5DCD9FA7E8CF7880CCFD1A44C
+
+Set 3, vector#243:
+                         key = F3F4F5F6F7F8F9FAFBFCFDFEFF000102
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = B9B3501C75EE296AE858573B63C4888F
+                               72B18683CBCD6B95602D51E4388D6DD3
+                               7129169A5209202E2C6EDEB5026B6511
+                               55E4747DD706DDF248A8705D50D38A29
+            stream[192..255] = 12F90D1028010D8296DD0D6ECC4F2354
+                               89856C315555279BD0A4E3161178AAAE
+                               BD849EC0A90903CCFE9DC7CC821C1CAA
+                               D63A45A1D0C0247F1FB1423877FE9A32
+            stream[256..319] = 9F0608162C6315D206B5EFB0E40291AD
+                               E882445B9F34154F6E21B9FA23356DD4
+                               79DFFB16482F6A4F28A8A0629E8B1D78
+                               EAA473CB126FB3727B826B4B3D6175E6
+            stream[448..511] = F26FAB00C37C03AE33209E19F865B135
+                               115A5E254A6B5C1A4896987EAC35C2F4
+                               327822E165AC6BF99F535055ED74833B
+                               C1FFEB32588D8995CEF0708E2D3CF832
+                  xor-digest = 87243F1D4D08D7EE39213D1A4B9E2458
+                               368339A11E364345B4367F84154B36DA
+                               03A3728A7EBD4237897F9D1A19CCFE92
+                               B9D67D3A4A755E6EA8382041D4827A17
+
+Set 3, vector#252:
+                         key = FCFDFEFF000102030405060708090A0B
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 05A90DAF1A6B6B60CD3B999A11FEEE39
+                               6D38983ECDA326EC9229D2A1EC722B0C
+                               3C0539DDBF6A4CF62B9BAFEA6C60A29D
+                               4AB63BBBC88987E9A74AE2F71B1E8DE2
+            stream[192..255] = 0AE6673D9F99C5EC9A4532B2B9786CB9
+                               E948A206CB992335FE868BB2271DCA5F
+                               9AB75995A7E7D46F8EA6693765C93D90
+                               9D41C24EF4856252986DDFCBE65D2D11
+            stream[256..319] = D8B07A866003059BAEE90378AD5EFFD5
+                               2732755E79402B50BA0F26A038B3D9C8
+                               1481C19080CB39FE840F8E7313D0C034
+                               9FEA4AA4801225630AAED3E522D6F920
+            stream[448..511] = DED21140E5A3C0C4615D7153DF9381F7
+                               269616817A273BFD984AA5E7CD9D9CA1
+                               9C28E51F4C03C262F5BB4175C799236F
+                               DA69AB27590857C0F270CE4BBFE02D5E
+                  xor-digest = 2D47DA3161389F5F54FAB37F391C21CD
+                               63A748112A1AB415670524B6CB93DA0B
+                               6B54C541ED59F3A54DE238C3FADB3236
+                               3871F6DB1A507B33C1B8F280B0C04B1A
+
+Test vectors -- set 4
+=====================
+
+Set 4, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 114265E078311C062B518148B4530F73
+                               DC9B95DCC41C214F8C9486473DC46847
+                               71819020010586A750426A0E633BC787
+                               6E228E2353AC0A68533C85A742387800
+        stream[65472..65535] = 196F53D41603BF286D1D11F012E564E9
+                               3C7FEEEC9539A015D49475DD8CC73C84
+                               2F85521B4DD9789A813A59D444AEC702
+                               164F669C59B43B5115202D08662D4EC2
+        stream[65536..65599] = 8A7B672621B0B77E8BA8EB9A71DB4558
+                               A78364244F182519F89D25D3012CF8C4
+                               E429DD543C8DC56C6DB8FA5E351BF615
+                               106B51F9FD00F54018A94DAA91D76715
+      stream[131008..131071] = 33EC15BB2C553646CAED9ABD83F37ADF
+                               AD3B3313A074B69FEAD405BAF897C3A3
+                               E12BFB2F4CC3136ACFDA284DA1E780DA
+                               B3E4D34C053302989FE6A79A1EB0F5D2
+                  xor-digest = D899BF7CD2972EBB7333D4E57DC809A1
+                               B717373577B15544443915B36ED162E1
+                               25452584F3E0C2B62164092219FBA924
+                               31C1FF2A14C8E2E437427DACF80A200E
+
+Set 4, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 8EA023E23D94434EAA064A4BE52866DB
+                               57EFB7B200DAFF5AF2AA72D3E55EE5F4
+                               5060FA89024F259CD2490C628452B1F0
+                               91020DE10263BA86838B2E388F5AD040
+        stream[65472..65535] = 5BE1EAE0077FCE5C2C21120EFD560A96
+                               27C3DA9462BE42580065C9E51B7D36C1
+                               D9D717DADF4A3122A08303A8E27721E2
+                               1DADC91138A2461713998AEE26F811D5
+        stream[65536..65599] = 482694A9797978003DFDA5183F00FF97
+                               9F38894BC92DC88418FF68156117A2B4
+                               EF10D76923A734ABCAD1A5B4224BBD08
+                               836E3765321045C3BF6A352371F82CAE
+      stream[131008..131071] = 614BC8A38C5F9E8507595E8F5A03484E
+                               C9DEC6CF52DECFAB008327527B822365
+                               A2038FF09411D7B952417C8C7375289A
+                               244D50703B73577EC272827A21BB917F
+                  xor-digest = CA9E6EC13B679609EA778447EEA1157C
+                               B366A08AC5A96A73D0B5E182DF24EBD9
+                               FC297219A0AF67591BFD68B1721B5970
+                               8EBEB3655791107FD2A0F2F2E341FCC4
+
+Set 4, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 5BD3D0625CEAA75ECFC9828179F7B73B
+                               288A208D60A2297F2C328DB0789BC869
+                               4E50F50E8797F8C7A49E24F72A3AC359
+                               796E6188C71A9B3DB88DAEB1BB2C77D3
+        stream[65472..65535] = 726C7D7AD756CF567E0E8F812A282675
+                               7E75D593C7FCBB45F842020AD59F2B53
+                               888354CEF541411B92C3AF6D57ADE7E9
+                               273805927DEEBE552B32D10754C9D2E5
+        stream[65536..65599] = 5703464C0AED290E65815D8D04098B0E
+                               22D2FA825ACD4391B56CA64CB8201BE5
+                               7B4FB9ED6BB7608BD820436146339559
+                               E7464BC13A8AE3167AFCDA58E3C017AE
+      stream[131008..131071] = FFC5787A10E340B07D08160D2C4F653E
+                               407857845A0D68D1EED8EAC0116CC376
+                               E33AF8A1120D8DCAD6C86B757AC50393
+                               46AADEFF012BD0DAA294DD240D87A98C
+                  xor-digest = B3BAA21AA82617D3BB9C2612E177CB71
+                               51A51790D97FE33C3F33C01B32091758
+                               5766643C125293E1F75D6BA3C46AB381
+                               75A2A4934D4C115A6A1547932B077A58
+
+Set 4, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = AC5DEC8B95C89F4794B7289C69FABE29
+                               F4AA64476D057873D87BD524666F62F6
+                               B71B5131BFB897AE64F2D500437E1798
+                               A742E7B7D06B8089F3DB2453D008C554
+        stream[65472..65535] = A2F58800E24BA8B754C64BAD9252BEC3
+                               ED1273598EEF4C6FE42FE2CADB81F220
+                               26A90BC88B43F2F1FD2E054E8EEECF57
+                               A114D087D5228CB276FD5F4FA3ECF4FB
+        stream[65536..65599] = 5C67BC8E188170A57DB85ACD2F7121A3
+                               7D83F1A708ADC54C14064A9559FE7E1E
+                               3F9E60B9670EA4394521B11D8283EE42
+                               12874323628EAEF0B90FC4653106D68F
+      stream[131008..131071] = 8AA6F8A20F7D4A0B7EBAF6A7336B6D76
+                               731E65DCCD179BD53F6B879E70B8776C
+                               6A8EA30BFF09BA3026B3827EDB9F9C2C
+                               0F96655D8B84EF725D0603F8CCE3C2F6
+                  xor-digest = 458DB66B656320F5F7E4FEB12E748C0A
+                               59F0CD8A7ACAECC25479C309628EC0B5
+                               3B441B831B484FD3180C52F63EDA1858
+                               7C232B195356996DC29DE6DF54E5BB37
+
+Test vectors -- set 5
+=====================
+
+Set 5, vector#  0:
+                         key = 00000000000000000000000000000000
+                          IV = 80000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 635990D909A80CE2A75E521ABF588B6E
+                               85320D2C722D1C93B42AFBE6358D6E2B
+                               F2BE933BC961FB50F9A2B55389A08CD7
+                               A0131F89CF0E61D0C7071DEA6D8DD4C2
+            stream[192..255] = 0F92D4DCC222BFC7020CA6BC3D044F69
+                               12D9A93668C65401C570A01D6BF6B3BC
+                               A6F00F6FF46AAE3C09C6158EF05A520D
+                               F8D55FF27CDB7AEB5D03C1FFCE7B95ED
+            stream[256..319] = 664CCED71B27680F9458952173BE0043
+                               D3C27F35F9CEE7AE9D783ABA671C4FC6
+                               8F2815DC904316BEB39020F646041276
+                               5BE5500A60DE2209961755C1BF96E1E2
+            stream[448..511] = 8F02C1FB389DD1C5F0CB730ADA528D37
+                               DD778C4782C7B5DF1961F97CC82B63E2
+                               9CF4BE512EE27B50781E297D1633D700
+                               1298F13FD8AF9D1EA83F831A70EE50EA
+                  xor-digest = 3F9A4D249220E1AC8E559399FCA23DD1
+                               1A250DCDA841502F5FEF0F5D4EFE7E46
+                               D9B1E5E4312903E290D695C2B681949F
+                               480D45F78FD69597570338049464FECA
+
+Set 5, vector#  9:
+                         key = 00000000000000000000000000000000
+                          IV = 00400000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 8E932D78DCDE35F1E5B8B2E863859A64
+                               7AEE8B0867F6F221B09C37B7A78B4043
+                               D055164B1FF1608EC17F3F148FEBBFF5
+                               A9FCE4158B33D2CAA4AC5FE5551C788A
+            stream[192..255] = 7034BE31CED03DEFAB3F69A24E622BDD
+                               9B202ADAF05D0324EE933064ED6D965B
+                               937FBC8405F0D7236AC28C320CE66C06
+                               C5B93EC581FDD59ED40102C651495EBD
+            stream[256..319] = 37C4EB0E72191FF0F70C8A70F475061E
+                               A0BEDD8A9AF1901FC6BB5482B5A29469
+                               06E8C40249E02784896D5D42387127DA
+                               CDF1657A66E0D43E6F69632519D1D3A1
+            stream[448..511] = 8CBE98126AE27A51146FE05F40CEA89A
+                               39781F515D621DD48B6D6234F9AFAFF3
+                               6FB862084F5249BCC0018E8FBC090121
+                               E227FF494BC180FF68EA2B134E7B00D6
+                  xor-digest = 24556A29026E3CAE101E7112B2FE5BCD
+                               3D925460B66A9EADDC271E39C317DC27
+                               51DC9254491F76F9163AF09AA5372F34
+                               1B76D54C09DEC9419F839E5C50F1957C
+
+Set 5, vector# 18:
+                         key = 00000000000000000000000000000000
+                          IV = 00002000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = AC05D72564EDC8EB439A95579D04BF65
+                               592AB1024152B9B14D71B18FEB5374A4
+                               C07AA2F58EB2E45F737580241CFB9C0B
+                               842F8CC9230B540FC50A590DEBDC29D8
+            stream[192..255] = 48AB7E018380336AD0CFF37379D9E370
+                               5B0C938600C6713FF4CF5C142F640FF9
+                               72CF147E7C38389DF426FBF560E7DEF8
+                               41B4B1CFE6A4E2DB4A85505C931FFFBF
+            stream[256..319] = E9C6536F67F4B3053B353170CC5B77B3
+                               06A47B759A5FEE5BE45842C01E11519E
+                               5746B056C86D8A6712446949DFFE6935
+                               8E4512E7BBD6E6F544CACA98BDC723E9
+            stream[448..511] = 731EF8977E1307CB5FE80BD4F89025A5
+                               AFEE3E54F7CCEE6556A211097498827F
+                               6219704F96652420BB9EE830DB3DD940
+                               96987BAEC5A43526FCBCD85C9BFDB209
+                  xor-digest = A37E582543E75640DD988C7FB5579D43
+                               9C41669EBCCA5580184743BD54D24CBE
+                               E32F2B1433CDBE51E8208C78FD739CC5
+                               4E2A37E16A7AE4F2193ABC4F04C35D23
+
+Set 5, vector# 27:
+                         key = 00000000000000000000000000000000
+                          IV = 00000010000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 0B295517E5A2E100C262736DAE920F2D
+                               26C40787AFEA87FC34C27D6E0BF98A62
+                               53B695751F9095C8766184EA44042F2D
+                               6DE099A80C75DB1F33F53EFE578A8F0B
+            stream[192..255] = B54C4F2EDF17A1EC22F536586A5BD691
+                               2008DA6642C84AFC8ACD35A7DAE73F79
+                               C835D83F4C0C3B1E510D1BB42013A872
+                               8E4899A8CE134625698CAB31852AA7D2
+            stream[256..319] = BBE2221921E73DC79E795AC0AF9B890F
+                               FE88A14DA29DE45FA38F4C3E94E6BE9D
+                               98238BFB181FE664B4147CDDC125FD06
+                               D11A65F1975A0D781024DE1EF026DFE7
+            stream[448..511] = 83E61FCEEB1367635632B45BC73B8B39
+                               165015E7A6B8D9851390D4CA9DCCB935
+                               F09BDF52883FF37BC77DE94842E39BBE
+                               0BE530FC9D3B4564E11B7EBAC8083818
+                  xor-digest = 55242D44DFDB1A747071F1C825DB5620
+                               EDE1AF37B6D73A22264B14F7D35E4412
+                               4A6242C5AD34B54E98738D6CC90FE355
+                               BB9402DD017B6678FCC0EF27CF5D67C2
+
+Set 5, vector# 36:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000080000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = B89065FE0B458C64FD6EDC6A893C8C81
+                               83578E7D37BE97E6FF82E45110A25960
+                               49A817CDE859B67B56CB80768D6DD275
+                               6EC368FBABC35C8B51C62AC92F913281
+            stream[192..255] = 0E0AB045409ADA1A9540504550404B8B
+                               2C38384E577F2DCAD5316CE7E806A0F1
+                               21D2A3298F71F301340F3C0A9CDD4815
+                               936F16B4EC229E63451980646D45E3AB
+            stream[256..319] = 1DC37BCE039878BA2E5938E4563D2523
+                               7350E41C8EF9262A9EF7D7FED7E22F45
+                               DC3E98EC981D2BCCC1185857C627EE20
+                               C86DFEF500756B241320798764C3C09A
+            stream[448..511] = 9A0082CDB35BB3CB1C74CE337D944D3B
+                               2C833B4F786A92DEA4445A2E5E101384
+                               AEA834F5E01C1B37EF8291D039875A3E
+                               21D613FC71212DE686AE52295B773E42
+                  xor-digest = F94584BB343C6BD6BE3AA1EF799989CD
+                               93F6DDB6A9AC7E2EDFC92460F0905E6E
+                               AA3E81F6E173C7F9FCE8FB5D7B261A58
+                               3FF006AD017A09FBA3B3D084285169A6
+
+Set 5, vector# 45:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000400000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 486343B348F2A1726617D6E93989B000
+                               B41FC9707E2A99C7FE5CE9423DC3004B
+                               67EB02F45B368F87FF2C4CC0C59D1728
+                               9F713E714E049CFD8E5D593255092A7B
+            stream[192..255] = A1A3127E632EF47679F52224E6D5A16A
+                               6E0598271F36F4DAA98B115535E77C71
+                               84170D2DB4B8C5D804790A666D105108
+                               81213A0684DD4AF03DE7707702F4F73A
+            stream[256..319] = C917B1577463E05F34350C4C7F6CBB5B
+                               D63B2D74EAF1500832132CA1A1F289C4
+                               3D93BFDC5E9D91897D2F7E05740F3C95
+                               0AD872A93DAF3850A452410FBD706A92
+            stream[448..511] = 11646E84240BB95D1B14694785E7E119
+                               848855E462DD14176442B8595CF602C2
+                               D1F4A2E09B8D7DE28382D1DA4DB3B1E5
+                               910DAE6ACC02E79FEB07A8E55747046B
+                  xor-digest = 65E9982A725056B8FBC275052EA48C00
+                               69A1BA0939831C4014E81AAF14F66FB0
+                               E01FC0C70A49C4533ACBF304A5309F4B
+                               60D6B310BC66C6684BD5B9C83F994E95
+
+Set 5, vector# 54:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000002000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = ACAB34102EDDB67B8A5D8B135BAC15CB
+                               1CD52AE386364C709C2B9D6BD322D7B8
+                               477577B4958D448A3BEBA473D861E592
+                               CA15371AEA0F500361CBDD865488A7A5
+            stream[192..255] = F25DAF77D7D734E5486A1AAE01794FB3
+                               C17099E01489A5B4213EFAE6D745B798
+                               77939C7A178D1FF09EB2C42A8A3CE51D
+                               59D501B36BF9E4960BF3FC8D50F5A847
+            stream[256..319] = 1C9C6F63998627AE1AA7E8F0B2D73A99
+                               707256CDB12E3AB239EFA72AEC516FBD
+                               6DECC9375EAAC634707A139E59B32B51
+                               5D25ED6951FF4228A11DC87E8DE61385
+            stream[448..511] = 6A997977A25F4E9E0D9AFD8C20B56EE1
+                               C702C301528E332BF8F5E7DBEEE5CC28
+                               C9E12E1A8BD7A2118A0F31F800B574A8
+                               2FC44FE19B20F1D3396432DBB02DACC1
+                  xor-digest = 0B2BA364EE76F0549A10200D129196B8
+                               E2B69667999FADFAD55CA479AE679C56
+                               54A453C43898443B9DF2835AE806C2A5
+                               EF30CB8AC25DBA756A705F66759029FA
+
+Set 5, vector# 63:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000010000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4DD010482D0DB2D09D76872D25F73B26
+                               749FFE70B9674587FC4CEDBA5966D217
+                               489244D0177F676188A1762C430DD8F1
+                               5ED9F7BB67F2E8A79F7633DB7B45CFF3
+            stream[192..255] = 3587F0A7B9F410D45357626BE10B4EAB
+                               FF8798FECA5F91F3AD2543B301B5C301
+                               F84404071C7BC77AC31E423E1AB1E2AC
+                               2CFAA37DBC2A1316D16A5C7BFED1A77B
+            stream[256..319] = BFC632891511228ADBA0211EF390A7F8
+                               08A12AC6BDD7C2E29DF27025EBA1A6EE
+                               00B9718FF2BC003904C1C28878894AE0
+                               E5CE5E9F55CAA522EBEF5747C755CB73
+            stream[448..511] = 513D9FFA86D8AFC20E4870DE0E9B330D
+                               76F02E44A6C4D7C5270B89C6BAC9426B
+                               5A12666244C0CC5A641118B93F72668A
+                               B7C53CD7FAB0940F1B37A85015DC91BE
+                  xor-digest = CACA8BD50E28720128B57B37D45DFB02
+                               206D53785FCE81205AEA085466142DB4
+                               A17F841156916294F3B7CA93CD99CB12
+                               93FF593B5105D2822CA9BC3BAF178935
+
+Set 5, vector# 72:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000080000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4DB6CB1D5BA89BA45BA8E3DFCEFC444B
+                               7D97C73F53EBC50BC46047CD76499CF1
+                               FAB51AA6C8B24118AC4EC8E49192B41A
+                               2812AA1A4325418AA6C69F6143F0A6B9
+            stream[192..255] = 33FB647044F3918513212D3538C31662
+                               1DD9F3A10C0589CB718564CED7ECC391
+                               D9701C7A23AD48E05A79BE9E32F60819
+                               3E57FA8D8EDDF9F43F38BF8BBCBAF52D
+            stream[256..319] = 79F3525A6EE300764DE481C20A40135E
+                               94362F56DBF4C5AFD214F9D4039A0899
+                               F74A7D7C27494B39D1B0145B9F691B5F
+                               F436F2AE8B335EC62CCB0FF506E0240D
+            stream[448..511] = FFE0E6B8D741377FF1A02764FEE3D681
+                               6CD020C6DDA5097989137E9BCFFFD35E
+                               0E6379AD2ED3D9D298C6B98DEA82DE6C
+                               2B66529C860DD4ED56265CA09B16A8A3
+                  xor-digest = BEC66A4FEB220D732F04AE0B98FCDE2C
+                               0B70613BAD57D7590E007E84AC546B09
+                               AF1D5BEB509CFE5523254B5FC8CC2672
+                               215C67477AFF14D0788DB166C5B4B12B
+
+Set 5, vector# 81:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000400000000000
+                               00000000000000000000000000000000
+               stream[0..63] = ED4C49EAEBE78999C0DBC4674757D435
+                               B056A45036DC51B390A6C87B3CE8BCE8
+                               2C7DD348C7775D2402EBE359E7895FEB
+                               B9F44DB5D0F7B40AC207A3CA750EF25A
+            stream[192..255] = 32F897ACB5CE63D1A64781524B1CB4FF
+                               9E595EEF93A3206A0D1B4E6F4ED7501D
+                               2DDFCA31B4FC1A33F589167B070FC003
+                               F67C528B6AB99ED308EC3CEF82B4E2F0
+            stream[256..319] = 57CE29261DAB385309C97955261874B7
+                               676349DEDF7582B7654D1A8DAA570EA5
+                               9745D2167F2AE1ED538F1D0ECE53AA38
+                               379F9AE542EBE229D561E34ACB28FA14
+            stream[448..511] = 667E22A8BE7BB84CA1B1C0848E5F22D7
+                               E98E54A79D5A960C33D07357199AF1AD
+                               53F3F803EA698127C22F75F31C40656F
+                               8C28818775B3D88460CFD29798187537
+                  xor-digest = C68E7F4A7CDB68892794933392C1BA84
+                               5B6B7CF52B8421137EE0220BA67C91E9
+                               81B47F9BFC39FDFF9DD48F3617F2D523
+                               0680B87D18A821A09525FDB79DE6FED2
+
+Set 5, vector# 90:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000002000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 80FC6D794178A189EC423AF926622982
+                               60C44DC5DD5AC91F779D02958366CFE2
+                               C5551DE2A5D635353757AFDDE68DF592
+                               A034D87C871D7D871264BB0F89E99536
+            stream[192..255] = 0BEF31DBC3F3DBCC5B3D28BE296384D5
+                               D33DD0AD9A80D4AB8F58274B4397A658
+                               94F67376AD8DCEC19BC2C74A835D9F70
+                               1F4C60DC256DBA4E83B21D36B66F5DC8
+            stream[256..319] = 625DDFD8D922D848380D45D6D7E730BB
+                               049666B3900E4305218BB7089D059FD5
+                               825F9EAA3AC047A006F1353C37AFD11E
+                               0143DD68CBE9543B959E26ECB4C649A1
+            stream[448..511] = 636E6EB97E3127EB703D5170D2C8FAF8
+                               63E8C333F5EFEFCF9063E3D770FF9E0F
+                               2B37396CEC935239797FE430DA4CFFB2
+                               9B19D833687318DF01750DD2F3D942B5
+                  xor-digest = 0865679CB53BC2845A0B71AB820F61AA
+                               9B99E100AC7F0358D5B610C09EC52C7F
+                               8C7C5D973CB85B18F8990F3BDBFBDCBD
+                               13071BB3AB3F329E75A44E80320BF86E
+
+Set 5, vector# 99:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000010000000
+                               00000000000000000000000000000000
+               stream[0..63] = FC2DEE44B15BD914C17DADE6645A0250
+                               2F40B39C0C6AA26C0250D328112AC67A
+                               0C55D48700EFE67EFBCED927B62427C1
+                               41DB8089774E2DE23C5FDDFD66D39BC3
+            stream[192..255] = B6A4D34FC81937580BFC32E04C8E2B20
+                               309AF3E2152B98BD748A344D4537788D
+                               35B16DD2C01444CAAAB8684916705C88
+                               FE75C53D75713FFFFA2693E91395F919
+            stream[256..319] = 9E619BB0045C58C2D303F79E659CF5E2
+                               011D619E0CB10CFDD53AEE6812DD780E
+                               36407CFE9BFC1C73C27CBBD491BB6A7E
+                               8918023EFD6E2227C0C840F1DFA5924A
+            stream[448..511] = 2A320747019AE86A59D5422B634448E0
+                               B43C41457428AC7A4E5D0C9D7327B44B
+                               BBB6F64CC2423299C009E5B24DDF10C9
+                               F87F2A525ACF803C50837EF6C2FF3D34
+                  xor-digest = 3737C19DCC04C7C72EC9280D53C17E64
+                               E9F4B1E47980711DC64FE6D3E7DD05E0
+                               DEFF339F38868B1F7CFFAD4298127949
+                               11EAD4D34047B22B07C397A37F6BD2A0
+
+Set 5, vector#108:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000080000
+                               00000000000000000000000000000000
+               stream[0..63] = 84F71EA20D46B3802A787C1322DE6A79
+                               34587F447AE7FE277362497E4FDB69CE
+                               129EC4D8D80ABD0C15026EED3DFE2B6F
+                               C48C5DF09CBE035E348A22F8A2AB7DAA
+            stream[192..255] = 6444791C6DE062EB9A494AEB910A458A
+                               DE3D834BD6F87F26A9D6F99FD970C820
+                               ED9FE0DF88A924F97945B0EB10E5D464
+                               559AA278DAF6A942651E06C66D33F7A0
+            stream[256..319] = 1878644E35B3BC562F82647D45C84317
+                               769BACDB95DCEACA456727616BC90FF5
+                               E78FEE1EFB86A714CFCDE79AA9E66FAC
+                               D600B0FC5C471569BBEB5692E7D9616D
+            stream[448..511] = 54BD56C4F0F3A0CB89A678F2912E5B21
+                               C2B225030E82A90470EB6040F50A818D
+                               C91F65BFFCEA3F9041BF110A762DE3D4
+                               B41A8D1E18CAC776063B2DC93BC2D02E
+                  xor-digest = 52E18382B88883C5648E067675468200
+                               2AA9AC5C18A856E89175C449A6033501
+                               87FA4C17A4D36269340F0877385A35AC
+                               4B7FEF6E1463D34BCDF3597618FAF352
+
+Set 5, vector#117:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000400
+                               00000000000000000000000000000000
+               stream[0..63] = 3F40E9A3C872ED15A6AA296F716E095B
+                               F39153C7C6F4ECE6F550AD35582083A1
+                               CA0DC3CD817AE3946E43AA9C8700420F
+                               F0DFC21B34F4E5E40B3EA14299EF468D
+            stream[192..255] = 853C4A895DCBE411B9B2E340B0AB55AC
+                               8EEEC42885768110ED7E1CCADC10121D
+                               8DE12AFD0DCA4507A8A7A2650FF68C6B
+                               5DB1DD670C8C68365E846934D16A46CC
+            stream[256..319] = 565AEFAC0325093EF87FDC51413BD5E8
+                               56AB6C90FCE7D3C6EEB7E58F22AF63D6
+                               73BCF3840D611A5E1102E9A4108CB902
+                               5A1D837510A971536231CA247965379B
+            stream[448..511] = 887287B62116FE2A28957ECC71DE5BA9
+                               CBBC16DBFA4EC141EB617F9314FCD238
+                               91C4237FA35871C0C795E2F3A4197DB4
+                               F81BA4A29759BEB5FA2277CBB9169734
+                  xor-digest = 78E564BE9E7102E2CB009D7A540395C6
+                               188C8499B7E96C0AD709C3BA2C341741
+                               6EED55AB00AE5719F25CFA06F1488E83
+                               798F18BFD755B9061AFB4EA5D864FC24
+
+Set 5, vector#126:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000002
+                               00000000000000000000000000000000
+               stream[0..63] = F4C281D9C88A7FD6B2CBA9EB0366C594
+                               59327932DBEF8118A7A680D0F0AA41A3
+                               735FE0874F047D2B071B5B9E755A7B6A
+                               9426353B923A5913C647A88B642B2C00
+            stream[192..255] = C7DAC2AE7631D11EB21EF15FDCD3EEDE
+                               7DC98A7060613A643EE8A944EEB6C7D1
+                               EDE08538E1BA6092ACDE0C648D29AF5C
+                               309CFCBC4F40A713FA58D93C954961AE
+            stream[256..319] = D1647D6453798B7E15A49199134384B5
+                               C9BDEBF7F859F6460C2666F297410070
+                               E68307CA78790EF01D160D94B69729D6
+                               90A4FE477A27AFF8B254875C98116485
+            stream[448..511] = C6D3DCBD0E9D4746B142C819867E0A14
+                               8B81FEE3D1007E907F8E9D597EAD63F7
+                               A87E6F224C67CF8162C4E92FC1BE44EA
+                               FE3715B3C1C432CC660CCF1536A20F46
+                  xor-digest = 59FDF05B6D16079B7E18F6A8CE0C58FF
+                               AD7C985C01A12C07D1ECEA740A92F761
+                               FDAC3F96357498B5F5FBA91DE6502A86
+                               1332A1B3E85C5E72444A2168C25D6FEB
+
+Set 5, vector#135:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               01000000000000000000000000000000
+               stream[0..63] = 494BAFEFE4FBF2C406F55FFB436105BA
+                               09211B71DA446A0F5436E6DBF42F8E1C
+                               C805E797C9987C14997083E9004473E1
+                               B2B3729DE9B483361CD38CC78C982533
+            stream[192..255] = 3C04C6633F7D8B714E8549AEA1851035
+                               A520EB6422F42B2C840C74CF51A13FA2
+                               9C1875212E8DC07774D6911415F1C305
+                               9826A05DA9F09942273CDB592F7E3A6E
+            stream[256..319] = 1FF6BEFD79A7E5BA0DF64948BA0ECE7D
+                               ABFB3883BF8A95D3E76DEA30550F5C3A
+                               2B67FE2AB78DF091E758E498418EF514
+                               089283275588A41AD20D53E6394635A5
+            stream[448..511] = A4D10D3B6AFDF415D49FB6ADA1245812
+                               1DA1365ECEBDB6C2508F1EB92E91E8EF
+                               90892E6FCC9E70AB9A2EC4D49A11C197
+                               68E6B4C154A4D65C55AFD38B2BE3F4DE
+                  xor-digest = 91D4EA4C6ECE28536C415A6AF46DC432
+                               3B6DC2DC98C3A3FE2BFE53C8FF556C16
+                               0197D655357512A808415BF757AB3A84
+                               6BE7865622D32B7DE3867B3B096408DB
+
+Set 5, vector#144:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00008000000000000000000000000000
+               stream[0..63] = 521913EA655235FA0E713B0DA3ECB98F
+                               7AB817E70827D29E75E3BF2729EC2AAB
+                               8747B8FE0FC9489B6E0EFF45EF985980
+                               CC0189D9D0F2EF34E809D992E7695D9E
+            stream[192..255] = D265AAD80EC96DFF08859F93B236136A
+                               BE146981E919C0554D64FBB7D03DC9AC
+                               9021F2A1B39866567D8BA1DBE2C3CD21
+                               E5C4C94085F7083F4C640E918C4004F1
+            stream[256..319] = 7DCD3CF623332365E6CF2D92FD147BE4
+                               1E532F51F939C921DD4492E026993E56
+                               843ECBF0925CC52D56084E7F2B538653
+                               2020DEE6FE7E85D4A89AEEBD5F3EAAAB
+            stream[448..511] = 00E20611C7ADFC3BD9E59B9E6D7ADB03
+                               F87FAAB01D7771B89299BDC59E1E2EAD
+                               FC9FDE416B62FEF07AB7A816AF261E77
+                               FCF79DBEB09323D44B5956CD93AAA990
+                  xor-digest = 0578B3E20EBF98D89E2DE82A6EA8E34B
+                               424E526CF419713F0AA662B852E58BB6
+                               7ED570D75534E1F23F85F160690A464F
+                               122CCBFA5CD1DCC0969F2E57D65D64F8
+
+Set 5, vector#153:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000040000000000000000000000000
+               stream[0..63] = 2617095641B825094DE44205319CA853
+                               418588D5B6BFC05A2713CF898DC42B3D
+                               6ABDDF4C287235438A48BDDA49E5ECF7
+                               EFA235A23BF667289612893708704F08
+            stream[192..255] = 04F668517ADC1AF6E31DE6B7007ABAC3
+                               59A2DD6DD61755C6CA7053E05FBBA2AC
+                               D9AF682EFC71391EDA4A5872B53D7CFB
+                               BD35ACB719169283EFD9FF9E172269C4
+            stream[256..319] = BCBA3F15D83B9AD41317AB9EF7DFDF0F
+                               FF05CDB058AB08D7BBD720723E969CAD
+                               79F16D26DF0222CFF4249B839EB9F9F1
+                               422EDAFB8EC285F27E347B7B4C9B2C23
+            stream[448..511] = F15F17F38917DFCA9141314047595C17
+                               047F91E4859D849E9A6339F640E3633B
+                               6A1B62D089B24062BA5987C3FAAB6633
+                               99698CDE6FE7A461F127AF67B2C5CFBA
+                  xor-digest = 68B2369B45F059964A1FD3822DAF61B7
+                               82A9FBA7EB563F83DEC4D058CA5D8931
+                               EC74AF4043FEA803B696791C8E0A675B
+                               DD8982AEA862BB76847E1DE12F2A5E86
+
+Set 5, vector#162:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000200000000000000000000000
+               stream[0..63] = B090CC267B29A95ADFAF6BE3E147D647
+                               21ECACBF6B7D0C4061D17FB7DE0A6662
+                               6D6F9FC167FB3FFF237C240AA03FAD55
+                               13B6DA848F22796DB501A8FB89F2B85D
+            stream[192..255] = 1CB95ED9AADFA0E1FFE5704BE69CBA3C
+                               9593746AE87F36A786E5EBE18A1D3B25
+                               F4785EEF4DB439472035BF053687C5F1
+                               0B60EF55A76DD1994FBB482BBD250755
+            stream[256..319] = 826BE3D679C872536D55C3F0E49C2624
+                               D41726A4525A50CF91EB71E7CEC5AC47
+                               F3834358E2296CF0D04B8D8CE8A701B6
+                               6AFBBB8776DB2B75F1CFA01231B365FA
+            stream[448..511] = 244DB28A98619907AFFDCCAF303A3795
+                               3B6D21EE6D22780C4D3C939C084E4181
+                               1FFCD8F2DA2E6A2243BD0B5428FB86C1
+                               F0EA2E8C8B6950ED961F4FA8CDFDCD17
+                  xor-digest = AAAFCEB42F2EF40C4B5462307085434E
+                               E4399F87B4AE5CA828A952A851F47913
+                               A51430A8BB9B3CD0A4B2F12E297F51E8
+                               FE0B1A6FE0F21177EAD9284087D3706A
+
+Set 5, vector#171:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000001000000000000000000000
+               stream[0..63] = 0F4309F63F237DBB51567573126F09E8
+                               E49990F26E541EF888B9F2922FE9D280
+                               C8FF4874C0D4FA3F41034B82E2E026C4
+                               594A79C2B689BC502C41244DC1AD472D
+            stream[192..255] = 95DCF9685E429DEC2833E1B5E78823BB
+                               ACD9332D668C4B342B89A290E1CA6127
+                               B0E5125E44445A1156A70B27966C3E0B
+                               4E0BCBDD9F4561998A5CBCFAA05C7459
+            stream[256..319] = 0886E9887182156005548CA1A08B57C0
+                               E9FA76C2A694E1CEE22E9B715E99B115
+                               9AE064DE644FD580E8356164A45EA1C4
+                               3DD85E16158B5130AA103267C8118105
+            stream[448..511] = F8AF6F9992781BB09808B7AF404F6546
+                               6FA697C2A1BC9BF64F8D6B6D8CA0B856
+                               6B64E6BF0500F6D80113D9457855FDCE
+                               1791C7436F5FF41ADA87562C175942D6
+                  xor-digest = 8D32FFAA409C8CCDA6892C388D5D654B
+                               4AD50ED00BA649737BA8F350811A2AE5
+                               5C89463C7D63F1F1F16C4007826C2CF0
+                               E4BD9453A60D88BE86F60BADC3E71E98
+
+Set 5, vector#180:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000008000000000000000000
+               stream[0..63] = EBABC8B756971D46C1A5E86CC7AEB329
+                               4DEDACFC795F2AE02CCAF68B933DEF4A
+                               19E96BA64DF14EB6FE67CA48861B49BC
+                               16052E33C8B47556DFBD96037B7DE5F2
+            stream[192..255] = 0438A8CF718F4C52E33DA087FFEC01E0
+                               459D26757D5DF55D5D7BC9BA88F57EC0
+                               4B84D854374F95317CBDDEE928A2CCAB
+                               E4BA1BBBF47776B29890DF00D864FBD2
+            stream[256..319] = BC4A80F9CACFE63D2E54044ACFF39F97
+                               2C69015058AD3F81CBBA28FB0987FFCF
+                               9CD1F6AE4F0602BAE2B828D3FA162936
+                               23CF3AC2950BD651F7E467DF8B454BD6
+            stream[448..511] = EDC95FB80C9FED4A73D6EE9B2CD74BB7
+                               E6DEB9E7868D40FC49BD1C52838457F0
+                               88DCB29C2107066D55A80908EFD1392A
+                               B4F2F13C0A79F67E58C91A89A5C88991
+                  xor-digest = BECD7FD2014BB9A25701E69F9788FC84
+                               1AA9DA56CDE1CD93DF45D28F29D32E22
+                               F488B0C2D9FE95B267CBFD35EDB2F6E3
+                               05DFA5A2CF09D7E2D13348BC0C9405E2
+
+Set 5, vector#189:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000040000000000000000
+               stream[0..63] = F28A15A90386237127A5682EB09E0E58
+                               30709455034A7189AC9710DBB50D5012
+                               9EB4E0E9036D4504054B281F3FE9F45F
+                               C80116B8FFC0B42F9A636A399B7A8BD1
+            stream[192..255] = 1219EF9BDC250E88BD0A62DDCF9AA1DB
+                               B62E19FBA748DFE1035C6A5B3B94954E
+                               1370487A455916F7DAB451F79C5E1298
+                               F549CE005A1321E6B136B59BAD9EBCD5
+            stream[256..319] = EBBE81DAE5637C4C7EE6FF9251D5407E
+                               DF7E8EAE384D1E588CAD39AD9F763004
+                               9A8E028120B5065B658EF3E2B357E52F
+                               F18891819EEE3EE021BD1AF08A4B1F53
+            stream[448..511] = 50086FCFCF5EFFEDC4A52B0212B7321A
+                               8664F2976493868F13D7CFDFB7583E99
+                               EBA70778A83CB88850D45B300F7F6A80
+                               E721860560B2FA642B2E77C7F7AB0662
+                  xor-digest = 336516670616300FD5FB014C1076B53F
+                               6637AD0EFB453615924396785CA4D284
+                               B03F526FC2179FF3BFB0A1A2ACFFD87E
+                               EDC4C8360DFFC132CE6A502EB173A0D4
+
+Set 5, vector#198:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000200000000000000
+               stream[0..63] = 93261A7231FD030CEAA974BBF8F3A721
+                               33334C5F3B25D5831B203C353A566D80
+                               DA578081A047E28DDF8E4BD5B68BE4A7
+                               FDE4BB3A4875BA84553AE120ED77C9CF
+            stream[192..255] = DEC4B603E6A6F911B68E5C1265FA2004
+                               71B296A647D20C13E42202C1A3AAE880
+                               305F969BB88002C8FC00CC5DBE40AA06
+                               4AF85646AA8C7F7191FE26FAA2918A95
+            stream[256..319] = 849431145F27957D53CD355501363E4C
+                               5F191DA666B77364E5866CAA16A9DEF0
+                               DDB9BC266EF41DB0C2A7642B9E8DD27D
+                               60DEA6E69052D4BDE9FC83B2578C72E7
+            stream[448..511] = 5556EF9874E3150FC539C9BD3BAFD308
+                               8FB347D5E38DB318A72AE0C6B6FB4163
+                               082545A9AD8872AC383A78230729D083
+                               31BFC3F2C80DA20617435FFDF2529A7D
+                  xor-digest = BA9CA5F3C27246F931824A9A425F2390
+                               E183188FEDE5BE3591053ADCC933E1F3
+                               DDF5627A94F80F8922F53E951490E96B
+                               F51491ED2D6DA26F3BF69CC41B8C0C98
+
+Set 5, vector#207:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000001000000000000
+               stream[0..63] = C449AF4CD437641A3B40D0E0E7B5696D
+                               CE973B3B217E02DC20B2F5573FDDF78F
+                               E6E55D75CFAB8EE04C8962376D22A843
+                               A80BB79C8B8D8B500C4B6DA27748C398
+            stream[192..255] = D5C92B62B0818165096551DF2B007F66
+                               2DF953742EF0BBE97982FF9D3EE83E1B
+                               87EC9D710CF1700262B1CAA9C68A897A
+                               8AB4A162DB0443A43962EECFE5B4C0DF
+            stream[256..319] = 3B8CC7E847669AC6858B7BB716206386
+                               40D8C2DD259EE4970A5F254077101271
+                               DF745AD7F57712065E2D03B9D7220591
+                               5C8C033A4F9146EE561B4179DB465989
+            stream[448..511] = BA4ECB7D74CEE56CF1D5AB636BBD6421
+                               C30A51DABDCED17C8D50F5293424AFCE
+                               33AF71095CAAD3913A8A3A12286A8E91
+                               89DAFCC1E2E744FBF4B526E910B5F2CF
+                  xor-digest = FAD57A608E04CD71B176BBFADED7B229
+                               D855A8025E963B55FB83EC7311427779
+                               490F25D34C6385FE1C036FF0807E136F
+                               40C10588678E2414163AF1819EF7D3C9
+
+Set 5, vector#216:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000008000000000
+               stream[0..63] = 989F302DF6BF8C63F9EB69D2625115B1
+                               2CCDA42A2D33BC6F21BD55E0594DBAAD
+                               9A294DDFD6710E36000C27FEA7E03440
+                               C8A6E728716D0DF14E825B798A6C420C
+            stream[192..255] = 3F3140320AA02367512E7C1789F5C03D
+                               83CC634354237E78E16B1A64DBDFA6EF
+                               0697B28BDFFAEC311C6E2089BCF64203
+                               A2EC7BF3CA922080380241A47A673634
+            stream[256..319] = 6049048A5307D55D6DB387A6149C7B23
+                               0AE33195D53E0026103EB44489BB86C6
+                               BAEC7A0D920CAE25B1E7B9F07C07C4AF
+                               6485FF281C7B7FE1D61E660AE55C20EA
+            stream[448..511] = A6DCBEC85525FA19FA6066470B4CD83F
+                               17D42DB3353B327BF3DD6E7D047CD752
+                               71E79CCBD46E757F3654C2506C2B593A
+                               BC93B8985C491017A8E616D69E8974FD
+                  xor-digest = 55BE97FD8317A47742F8F3BB762160AA
+                               7FDFBA371864823D93EF6C029D457AC1
+                               2D679CB424DA9EAF8E4FE28271C66F06
+                               1E91D8F2EF41733AC1084F54330C9786
+
+Set 5, vector#225:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000040000000
+               stream[0..63] = B8989CF76BB1AE894699604320C14706
+                               E20C8BD86C016B5E2EF705AEC54C6023
+                               2A9AA961C10914A8D910D517059A93F9
+                               78C537767A057E0E11DBB5C9BBC4EFA9
+            stream[192..255] = 83FC232D21D0DB82747D9EDFEDFB58E2
+                               BB37362FA2B4E1AA0C9A58AE521EFC86
+                               C512831CC6D2E85FBD96FD3B60D1D153
+                               E83DDC6C5755899CF96FDF69E3732E4E
+            stream[256..319] = 201DDE5D82B754341A3452BF7DDDBF6F
+                               167B2A087900EF40E4268A80217D7310
+                               F1E9E25C707A1EC05219E3CCFEC0F6F5
+                               28CD98534F6C579A1ACD3171D131D87B
+            stream[448..511] = C2F68B5F03B0045FEE0FC92DA08F8545
+                               762F73E553D2F539C64B88D4FAC9B011
+                               DE0504D66007A115E428F627A667FA2E
+                               296F222734FA0F905548058897DEA990
+                  xor-digest = 7DFA65F57FD58891C5576B3CC7002513
+                               C1A983E9D31317B681604DA09F176AAC
+                               4FD78CE84EB9427BE8D6A63058582F16
+                               148D55B3C2544CF4DB9306699CA74D80
+
+Set 5, vector#234:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000200000
+               stream[0..63] = 307B13F3D3EEEA4C8FAF34416689F354
+                               AD26336D6B33DFC5AA004420D2DEAA69
+                               F69E531EB6D672AD62B2A6A136046373
+                               F70272E84E14CABA9AEA3102863A0B10
+            stream[192..255] = 8E4DA19FEDAD4C842917ECD5E7256097
+                               C2F524324D8A974D4185D8B11B611C72
+                               6C39DDB5E58180971DA181D36A289CBC
+                               1937E8F020645EC8D0363A58C6147F38
+            stream[256..319] = 012A99871D6C4CB7328C1374F37D0BE3
+                               DCC2232F6484A22C8F330D77316A1756
+                               71DF7CB32773F25D772BFE9DED5981B2
+                               0C3F0DDB2879AF61E7549F03AE26D233
+            stream[448..511] = 47C6CA462D35580BC0C78C6427FB96F3
+                               BB762662F5B52FB3938CCCEAC35884C1
+                               54F5BBF513970FC08F51C91059A757B9
+                               A8B6F1EFE467FAADA8D4DF68C6AC1942
+                  xor-digest = 6409F8C255BAE6167686F5F9C7EB2349
+                               0FC7BA4DCBC80006B57A5F56CA9F907F
+                               849C2A0FB0D74CAAFC0E2D4367E2912E
+                               BA6487D8A48DA60E48277A20E326266A
+
+Set 5, vector#243:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000001000
+               stream[0..63] = 543BAEFA799FA0CF5295B92EF3FDC07D
+                               69B87C1B5FF0A9F25B32F8FCC473D04D
+                               54B6E467D6183F25E3664A330889889F
+                               A530E354B6E53EBC78354100637A62C3
+            stream[192..255] = E15997D1E7C0FA38333DEE2EE2477A4F
+                               AD32F0810E8D3D65EAFB110C2B8D0948
+                               59DC45C4AA38B8050A87C23782E1A26C
+                               C193985BB0C3E754A528BEAAE1508D76
+            stream[256..319] = A94F1BD38219097B70EC0700A64B0ADC
+                               7BA8883B5C2C3BBABD0497E80D53121A
+                               2DC5A5C6A77913330EF5469871BABF86
+                               0A09F1474D893ADC28B473EE508F473F
+            stream[448..511] = A43AC01FC186AB42241ED3729E7EEA39
+                               F0823D124E8CB696E2F4B047A6B71164
+                               5B803623CD0371C4975217B3CBD7D9B2
+                               FD89D3B6BD23FD11FEC0B03B9CC22AC0
+                  xor-digest = 792A5EDB6E7FDBE99B7EC2119665C2F2
+                               34038F561BB1923F3BF493AE35CE2006
+                               55B8EE47490B53EBB481AB7C6B82FACB
+                               233AD86D74385FA108C94666CD34C164
+
+Set 5, vector#252:
+                         key = 00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000008
+               stream[0..63] = CB4377099B2D7CD6A982A1B1A53E05F2
+                               E097164EDCB381468C21D8F0615A654A
+                               45A4D09B7C0218A19496EA71CEEEAE5A
+                               886307DB0026C96049B60E5154F99AA4
+            stream[192..255] = 25FCE0B7E28D5D0D1654D912DBB21AE0
+                               288CCC71396CA5AA36AC44AB08EC72A1
+                               01E5B189535C1987B79DE4C4E32DB7FA
+                               48ACBC8F854868FC287E03D54752230C
+            stream[256..319] = D3B02A39A4E467C44C109E1E25593278
+                               2E9B3CCB02D6F107C9263A24E113FAEF
+                               847A9064E1AD1EC8881EFEB239CAD6C4
+                               E90ACEC36A7E87E002F35D477CD63F2B
+            stream[448..511] = 7D4282D7E11439C04ACFF087708DA22D
+                               236F1A08A6343704DA4D24EA3582253A
+                               35419183A915B571DDE80C1DEE2B8A13
+                               76EE973234FFF6A0DD91D31037F51C72
+                  xor-digest = D52720D8DF114235D99E5292E14DE96F
+                               9D8478E016CD40EBA25C4B9D8E11713E
+                               FE9AC151E1F39377FCC07D06E9BF6931
+                               6EFD7E27F87E9F76DCBF7831CC3FA98B
+
+Test vectors -- set 6
+=====================
+
+Set 6, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                          IV = 0D74DB42A91077DE45AC137AE148AF16
+                               7DE44BB21980E74EB51C83EA51B81F86
+               stream[0..63] = 914AEBA9E4BE90FD07AA58B6E2536B59
+                               0DD63BA810A2B96BAD5DAC1818722BEC
+                               61725C75B9E6194F57D3D2BBFE795E73
+                               90405CA97249262093234239E35ED9E4
+        stream[65472..65535] = 346C1A7D71DBB8FB69EA78F07D60A9A7
+                               20D0ED544149AF102C12678D4AE0C5DF
+                               E3521B7344F91977799085008EA00432
+                               772C0B4ABEC1DB2C47608F9A29CC76EA
+        stream[65536..65599] = 6F3B93E808687BE8E37A635E15B13052
+                               60ED65488A59125D84726219AEE62087
+                               47C6672C585759BA60BFD7F55AB975D4
+                               B61596A506F8763F715F27A36082DB51
+      stream[131008..131071] = C64CAD1578C28BF19F11B14F3D33C681
+                               A85D28A4B2D547652A7179C31127C306
+                               DC04BE79BC1DA0279C69F9418311E57C
+                               0F13D9E993008796EA10607A63BDC772
+                  xor-digest = A67B88BA16F74643B49BB149E6E214F4
+                               624BDC9559CEE75DDCDA01CD343FEB4F
+                               A8F6D62492037A0939B7F745FED8C3F4
+                               93102B006D3AF8167E38D1A216B0AE0C
+
+Set 6, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                          IV = 167DE44BB21980E74EB51C83EA51B81F
+                               86ED54BB2289F057BE258CF35AC1288F
+               stream[0..63] = 0B739B0FB68C82FE4120545C8930AB02
+                               F7C1F08E6C5A1EF913F58148283C873C
+                               346703A489B00BACD14E9CF30D8EA149
+                               14937EEA9074DE932F4847E69D793D3F
+        stream[65472..65535] = ABA9A96B26DC34C1684B1B9E565D7292
+                               0B3467672185FC0C000710265DAD5A9F
+                               FDC7D5D42E412170046AB05591C19998
+                               F8AA47E5C634E5719B74936526EF6960
+        stream[65536..65599] = 286FA01C6BA9498FA55E3AB7B7481D21
+                               05D82DBD03CCD59760690DC89EFF5B3F
+                               9D3FE06CD3E8D9C2C77EA2581AA5790A
+                               6D1457D534A1090799EA0B1B3BAB059D
+      stream[131008..131071] = 8FEA40A11790CFB0BA2F199B01F68FB9
+                               33874E294F7A08F319B87D0990317915
+                               C12CE3C47A19001FDAEF72DFD5AE2174
+                               72FA2DC47D492393792C407716CD965E
+                  xor-digest = 7362D014CAB8247E7F5A7476238D5C0E
+                               931B2F9D79D03E773994BBDB93B4447A
+                               81770D6D1EFABAFFB756ACA945D929C7
+                               5CFE214A53F2FE7EF78D76B2FDDC2267
+
+Set 6, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                          IV = 1F86ED54BB2289F057BE258CF35AC128
+                               8FF65DC42B92F960C72E95FC63CA3198
+               stream[0..63] = E6A0C18EE34238191E39B2DD0F0066DD
+                               D7C0033F82C388043CF13C72CCFB9DBB
+                               553D782AAFC983F419649CC9B29510C6
+                               03302235278AC3F1CE5405829F7E63B5
+        stream[65472..65535] = 16B4B4A51FDD9B41DCB8A1CBDFBE8D5E
+                               5E2F60F7ACFE5761826E68F7C4DDACC6
+                               7E0AD9A0B431F089FFE1E5780A66945D
+                               9E3C32136992ED78B8D8F9E7C38DA359
+        stream[65536..65599] = A450FCA398BC87C0079DA4D71E1BF0D5
+                               490FDAC094BF45C7F0FE0BF28017DD19
+                               BD3894BC0E54DEC98F57BBBE71EE25D4
+                               D96A2E1A003CADC37775CA370DA2898E
+      stream[131008..131071] = 17D7D66A32B7A47676FE3BCB180CBF52
+                               C4585015CD9D994C56E6DFA854D9DA76
+                               9AB45C8CFE938901BAEE5CFCE73D8604
+                               A0773736C3336C40355472B6F9208FAB
+                  xor-digest = 9727B576E6090D39333BCC2B993D0F16
+                               CD0508D7273BE022E907C99E93A17FA7
+                               23AB9CDDA9A4D310C8E5A9BAD26767AA
+                               8FF3C514AD1852DC6749F10FE663C9EF
+
+Set 6, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                          IV = 288FF65DC42B92F960C72E95FC63CA31
+                               98FF66CD349B0269D0379E056CD33AA1
+               stream[0..63] = 857EB9871D1CB2623103A4D04443CEF6
+                               5AED61EAF8264866A7B3276F6B5DA8B8
+                               D2E7C63E3213CEA9BD3333E4687C6962
+                               5D2B980D0E28EA54492148AA16EE6FF4
+        stream[65472..65535] = D498F0830A147DF5D15C6DEDC76E0687
+                               20D8A1A57F27DF19895CAFDC92846955
+                               CA942F39F64524E5F70B4B1D3F7B76C9
+                               55877A81311CFBE09AA0E9EABF0403A5
+        stream[65536..65599] = C850035DB7C0750E015EA60DC1EFD84A
+                               79C830EFD07675C0664039C90EBA1442
+                               5C523DCC60A47E60716F7F302BFD4BF0
+                               2A2DBB2CE29DCA01A1AC7B1EE9815727
+      stream[131008..131071] = 6D580F0D0C722DA5F901321F57C3F438
+                               109F2D2F46ED5572298B40F28C204252
+                               6429F5436DC67F15C0427C8EE7FBF49A
+                               8B5674674E1840E0E664E73C429B36F5
+                  xor-digest = 65367188C7BD2B0064CCED9E64FB7531
+                               EFE91EE531F4203B9C367A79B015B4B1
+                               F79349D68DD316899F5B39A867765747
+                               49461826B9511C99C0BB569F7455601C
+
+
+
+End of test vectors
diff --git a/crypto/test/data/hc256/hc256/ecrypt_HC-256_256K_128IV.txt b/crypto/test/data/hc256/hc256/ecrypt_HC-256_256K_128IV.txt
new file mode 100644
index 000000000..46a86d7dd
--- /dev/null
+++ b/crypto/test/data/hc256/hc256/ecrypt_HC-256_256K_128IV.txt
@@ -0,0 +1,2783 @@
+********************************************************************************
+*                          ECRYPT Stream Cipher Project                        *
+********************************************************************************
+
+Primitive Name: HC-256
+======================
+Profile: S3___
+Key size: 256 bits
+IV size: 128 bits
+
+Test vectors -- set 1
+=====================
+
+(stream is generated by encrypting 512 zero bytes)
+
+Set 1, vector#  0:
+                         key = 80000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 240146C5EA6C72A8DFC93E54E8811C32
+                               A85E0BF7291BDDC0DBEAE086D051D5B0
+                               5CC9DD5C311ED2F7E8484CC477C68BC8
+                               C5D3F3450553F5327253768E958C0C55
+            stream[192..255] = 26C5976C37B009E57BE86064A99E8F59
+                               F9536410FAA9BF625D8DD2ABC9AABF09
+                               DF6B5EFC76CC6200F9E321E327AB0703
+                               2C78B351C5F7EEEFF2C6E374521CFF6E
+            stream[256..319] = 2F72E0E6E710D807D5120AD686DAADC3
+                               A5C1544557A4BA6B1D61F90FECD55328
+                               3C8F91B801DC435C5FFB1F8B33A23644
+                               8E21217C367108893D13AD41EA8F20F5
+            stream[448..511] = 68320BFC459C78596162EF5FEE2CF46C
+                               79EAFC681AE91F875672350C59D33D6F
+                               9E0CEEFE42EA9A0485E3E41C241CDE84
+                               9849DEC99219729D91270358B2F83F38
+                  xor-digest = 19E8083DE3499286788AE3A6DFE90AC7
+                               B77084682ED86D8039A67663CDC9ACCE
+                               D297F22C10FF7E4FAD773337B008A32B
+                               A7176F733045DE44782F04C1DDF28776
+
+Set 1, vector#  9:
+                         key = 00400000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 4B1E2D728E06D7356F151D10DE9CBFB3
+                               C66A1E5B5ECD926E33F56B14CEDBFCC5
+                               40CD6D1089DD8E5CF008E4AAA3C4C89D
+                               11B136FB5656B5D4818D1BD1E562BB38
+            stream[192..255] = D5E6B5482535DB7F9352933242C164D7
+                               6528DF7AA013A4FC2F2B8C2D7DC0202F
+                               85774C16FAF22D5071A875B6A671D4B1
+                               A8C396AA5D2F14AFF9C4CD6C1DB89175
+            stream[256..319] = 3D0FCC3C90DE0328FD0C752458996FF2
+                               DF822E496CA42A7D7EBF3D958676A41D
+                               83A16EF3150B8C4C8F1763560B314287
+                               54B4A2EA5C4F74783BF8809F3A624664
+            stream[448..511] = 2D68526D25483C2A1F0B6F7101507804
+                               C9619E267F1FFF28C934D19201351465
+                               31D13592BC9F1739A0B090718052E4A0
+                               CAE9E0FA4555F2FAD27EC8AA2F14CC60
+                  xor-digest = D3C3131E402BCBA54DCE0AD35C5FD241
+                               3ED7056BF67B5163CBE6C9EAA9D27535
+                               7D2BFB7B2843DFE92709F047675CE06F
+                               5201611BCB8FF15C76D0E328D46345E4
+
+Set 1, vector# 18:
+                         key = 00002000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 4A0CCA5AD387D49DF33FE8BE69FAD669
+                               270E3E6CF724F53FC3E509A2CEF1D174
+                               A67C2EF4B9D2C9B8A8177BBFBAA2C45F
+                               BDD25CBECBDB59A402FE3C4835854CAF
+            stream[192..255] = CA0F19D9996E6D3518D28D8169968ED2
+                               B03D118D4BC1C5E1847BA6EFE6A32D6A
+                               32BAF71A4C27B0BBC9B9BA03FE044D7A
+                               C9785A69E3B0E5B3B26AABE3AB093965
+            stream[256..319] = 6FD1A9F1EA228C39625FC0CBB2D4BF8F
+                               2C0EF1F37D4FAC56D8024D1B4F2AF33B
+                               8AB0D452F5155ADD5F0FEEED8104AD55
+                               9946D2E274ADE44170F5113630200B57
+            stream[448..511] = 5DA1476A1CBADD0797DD7EB9C0E563B9
+                               EEA2C55860C42C2C0A6B38B9344BA0C2
+                               345C7143D9A7E5BCDF9FA2606098DEA2
+                               142632258F844AA1A77CC9950D5ABD7F
+                  xor-digest = 0CCEB42D4045C09C45CD6C27B88606BA
+                               ECF7F6B30F50004AB2ACDAF89849519F
+                               61482EC4AAA2CF58C4206A228FA23AFE
+                               DD3BD50BC9C04744940A238966C2926B
+
+Set 1, vector# 27:
+                         key = 00000010000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 77CB199A639DE60664225AD1DB954B5F
+                               70DC01305D2D4073BE772B0863175EBB
+                               64FAB80EF324DBC85A9EF827EBAC7A5F
+                               CB088619C246CECE6F92B89A2122B6AB
+            stream[192..255] = 84C1E9B365F1CD23AFD5711BDF2B6F26
+                               F988A6CE29450108FD6814802355217D
+                               F6F329FCB3F5997401019BAE0AE43760
+                               ED6B658FCB4280F5A070728411EDA4CC
+            stream[256..319] = D0AD4A851E7A60DC789762A554A8FA76
+                               77FA610F4D868CFF1AB6025B2ECDECE8
+                               C554B4C0BDF543F58A1DD7CC68FD7AA6
+                               7EFCFD59D55372E85131D6284E7949AF
+            stream[448..511] = CF7F791090D04350930AA1E1A53B70E2
+                               691A231595E83F8BAB9613BDBAD868AB
+                               197D5E06B3397CC3D81F56B87BC7521E
+                               B0BE346552DABEBA863D5C81D7245C8B
+                  xor-digest = 2C77C0ED1F5AE20A97388ACA5300918D
+                               6246B04429F298E64A75828EDBD01900
+                               FC70CC103C31E0BB67B06D04128686AC
+                               5C5FA63FE714FC4DF18C551BDF81862F
+
+Set 1, vector# 36:
+                         key = 00000000080000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 54A5A2E883714170B471C0651D74A9F7
+                               D51287C89FB345DE0AF7003C3871425E
+                               FC885F033D79BAC9716B1ED5C637BD9B
+                               0F16FD8D613BFFAB634F0EC2497D7B3C
+            stream[192..255] = C7FBA70B19B749BBD0C84C7D31A5AA44
+                               155623116C44CD53D2E640034211E730
+                               277402F62D1FF1578236A2646AFE6108
+                               2C958D9D01C065D7335EF9C29415AD42
+            stream[256..319] = 2385E2A7070FEC7399BB3CEEA43C8D0F
+                               54D3607FC1C21BF173642287C1FC2C96
+                               D37695A7B1310E5E918EBE37113348B1
+                               707BB39E401A10FF14EF020CB7C44261
+            stream[448..511] = 5A87EF81C2CFA70D86B147E9587467B5
+                               22FCDB4EAF0353E11F73F3BCC1EA6C09
+                               E962A87A0842B9225E164DB0CD1A3BA3
+                               DA8C02E6746CD3AE0BC4754ADBE7EF6D
+                  xor-digest = A65BBEA2E397048E4714A8AB3C19EE6E
+                               91B9EB8048F35FA7AB9E003E9359BE0E
+                               C3EDA827AF485C23A941F7D656C76CA2
+                               5D12044923E43E61E7DDEBE7D9C87E3F
+
+Set 1, vector# 45:
+                         key = 00000000000400000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = FF81E156907CC2C01EE23F79F936809E
+                               3F88AC15CC01BDDDA378CC1BD2317444
+                               200E4E2C63E15FF07B0B40721970E7CA
+                               68F748A95A965EEC606318447BB31C2F
+            stream[192..255] = 4C4C42A330AD444388FCA4009CC0B196
+                               84AEC3EE65138A747FE86526A263969D
+                               87CCDDCC4C9A0EBDE2D088CCCEBE76F0
+                               52BAC07636937B1567637ADB498F7F8F
+            stream[256..319] = F550BCDF67C8E9C17B800487DF83A4BC
+                               73B809C4F3279D4CFE857780412F0F7B
+                               B838A9F0322BBA84D7AC51E469C5012E
+                               D774E52E3507C7D069F5169F0403C577
+            stream[448..511] = 9D92715109A301AD47BF2376D65E2519
+                               78E12098B0DEA5B779079A0FAAC4DB42
+                               5BA9EB00301A5F964336F7EE9C0D9667
+                               C4F0DBAE14BED3E49A6A746FCB186C65
+                  xor-digest = AD2264EC651E311BAC5FB36434773F5B
+                               4A4777B2B7F811A755269FDA8339DC97
+                               7A8C6A5F66E8737DD16A88DAB8545110
+                               EAE275892A767BCAC0757C396A690F67
+
+Set 1, vector# 54:
+                         key = 00000000000002000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3DC3C1A1A40E721F8A3A66960DB2C0F0
+                               6D8B7C07FE90D67C26F86200D6A1A1D9
+                               ADE4D53A35F7A016A506D9C62D344D49
+                               5C6DEAAE053247103B8F202B85A5036D
+            stream[192..255] = 9B83E56BB5E10B5C6C05C4B450B64FA5
+                               9C52AA63E207592999CBB48355517F05
+                               C93EA878BFAECE58CBCB948E81BEFD89
+                               AE0C5C13359C6CF5A673B4EDE28FAF0B
+            stream[256..319] = 388163F9F26536BE1221A46834CC77FE
+                               03D021C570A9DA36CD528E887ECEB2A4
+                               7146A8A930D6AC04694A0B9AE50FF55A
+                               41AD3B3D3E53F982563B5B458C078C0E
+            stream[448..511] = 3B0FF94C0C9FA0EB8B8CC1C691D04180
+                               5AB6436BAFCE8C16A1351883C88E945F
+                               8F912FF79CFCEFF7374936E830C9440D
+                               C676A5F00BB50EDB34F810AFFD9CA8B3
+                  xor-digest = 879534CEDD8CDBDDDE2E2216D55529AC
+                               1189B1C34A76ECEC179B8A240E890F8C
+                               640738DC37C14E4B950B9D8C507685B1
+                               28CF4782EC424A3712F54F6265A41E7B
+
+Set 1, vector# 63:
+                         key = 00000000000000010000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 12F0A17DEA167676992DFF2E7D812878
+                               629579519578EAFD885F212C7E04F035
+                               AF03732C3DA8CFB7B73054662F0593E7
+                               E40133706F04B1329BC3155DACD296AC
+            stream[192..255] = 41BB89D0BE44055E23813783C3EC4487
+                               2D102D6EE94475AAFFC7FEB8DE6849A2
+                               6B50DE77EB9B0B96EC9EA0216D13D64B
+                               1264A83D6B571A92948A5E35446B0503
+            stream[256..319] = 15E9C9168AF4AEF7F2EF1E832F40110B
+                               A8C08DE71D4F0AAA3A5C2FC59BF41005
+                               ECA654EB7F316B757FEAD5B0F4BF41F2
+                               C6D035A88B5477632F34D7F904B2939A
+            stream[448..511] = 8A2D446044F7930B696DBA896BA6CE69
+                               8F8B01E4282BCCDC4740BB6AB6ECF7B8
+                               9CA1CFCB5745B6577D0F440AAB7985BE
+                               BEC5DBEBD8B028B15DEA138F09018297
+                  xor-digest = 89CFE7E84993C6B608EAAECBAECD7847
+                               472703F3CD97F9315BA9CA13204B616C
+                               AAC0F37EBD1C58186620710FD6AE5EFC
+                               B7CBADA19AF8C0F7E1FB24913C2300FB
+
+Set 1, vector# 72:
+                         key = 00000000000000000080000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 7BC411ECF4AC2EF2C9B8C5B7CCFD791A
+                               E8250119E08C1B7F7A82F576FF66FC9A
+                               9D9BDB7570EAF276A60A3BC7E7BCBB86
+                               7A791A48F9E742D7D7480FBA67DCDA6E
+            stream[192..255] = F85A8E3219AE1E5F20A4FFC6814458C9
+                               5A4ECFE7FE739E151A45247A136E3BB6
+                               9C11987BB5D13B1B9A3077C8F4ADC9AA
+                               A555FC9725339E02390B9C9F75E1F38C
+            stream[256..319] = 8A2E88E0A773EA00C11138710BF12ED2
+                               7797AE7863B1EC84801D11B5B3914786
+                               F1D547382DAA9D5215CD4CBC783C700A
+                               9B09FCCFED28899D2F2EC148CEFA39B2
+            stream[448..511] = 95E3BA3237F370A4E0850F2CA0FCEC89
+                               E9D832CA6DC6A062BE7ADA8D8AEFD55D
+                               2BC7A3F46BF81DEA5DD9155E8D8FE918
+                               B5DFB1926460AB69663856EEBCD4C338
+                  xor-digest = ECE252DA29D20602D138E13C004D8B66
+                               8B09FD764B7D84FB83B8F4D924504D60
+                               277BAFC521A8AB0464E4EFC6BBB9E4B9
+                               A206C38154AE3A57B84D2D39CF45616E
+
+Set 1, vector# 81:
+                         key = 00000000000000000000400000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 139C2843F0BCBDD32C685F4EE2C7AF4D
+                               E6BC79789B77B1CA6CD94A01645EA243
+                               5B491F27C27D4EEB96FEA0ACE65C0D8B
+                               BAA642B5A07245BCD0930588FFC92A50
+            stream[192..255] = 5C76EB0D5323A7AAAA228F7718BB6736
+                               5B344559C24BEDEB2CA66414B5E81795
+                               428D55868611AF9AC7EA0E7424984037
+                               3251BF5206C361AA3631DEDA52DDD519
+            stream[256..319] = EAB18EFED266D4788015DBDD20A75058
+                               FA4DE35C1DC774ABABC476BCB0AA2CB1
+                               214E5463F4E20E7B999ED475D77DBA9D
+                               70FFCA0C7971CAEC3B285EE8F9F37C02
+            stream[448..511] = 081083D9AC30C9DB4E53597D64249D7B
+                               CCD847495A928CF4CE876237D92ED5E9
+                               E3D723EFC663CA0DDF34DABB941F42C1
+                               B48EFD59DDCAE71A1B82358A3328644A
+                  xor-digest = C08714035439EFBE455BAE68EEDDA0D2
+                               A6968F18827B214A097221C3A77F80AA
+                               E1DD9F3C72FA66C16EE278A76C19107B
+                               37CC32346DBDD29FB30059A8FC732DED
+
+Set 1, vector# 90:
+                         key = 00000000000000000000002000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = AD897A3C509B66728342A817D745460F
+                               6A258386FECF71DB95ADC716B8BC0462
+                               22C4EE887334718534E719F36454E440
+                               F9EC44A2DC38345CEEA9425BF5F10123
+            stream[192..255] = B32235522391A0BE105A993923760C6F
+                               BBDA849213C628776BCC5364F28EE5BA
+                               D498F186C3C57A8DBE5355C2A38DDB82
+                               54B321636EAD186788DF1BFC5B6F85F6
+            stream[256..319] = 499CC51B20538B14A05E490B6D5D10D9
+                               11079F58E3603A84AE6689293E3AEC56
+                               7545823F0B085469CAFFF01D2AFC5076
+                               C155F8B4B7DB4C49A9A993964928D11E
+            stream[448..511] = 65983D36E97AEF89C3A75616F7C098B7
+                               5CFD9C531AFF8184010E2CFD45163312
+                               FFBCF5AC70139CF12D97325CCEFD0B01
+                               FBE571FFBD7DC21B54D4B277A2205E56
+                  xor-digest = 90CD243B35747378B85B99474EE0BB3F
+                               CE7574CC19BEC5220255523276CDECE4
+                               5A16EF44C414ADF1D1CBE264872419CC
+                               EAF664CC74D36072E9B975FF40074006
+
+Set 1, vector# 99:
+                         key = 00000000000000000000000010000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 26F731F36F626943D4CBBD605CB67FBF
+                               E9301F24AA4E93EDB2D0DBB3FB17E8C8
+                               623054B3003BB12E1C8607FB53315AF0
+                               A139CDC381753A14342AB90AFDF43E67
+            stream[192..255] = C3B755D009DE9965D36B4111308B25EF
+                               39A137E373BA0E90E5AE2748115F29FC
+                               562A6F6894BFEA59587F991DD105DE1F
+                               67F62A73A72A4802ACE727335467F503
+            stream[256..319] = BA815578D19B3B384BA7AA7B972B1FC1
+                               7244FA75A4CFDC8C30ABBFDF6861F356
+                               6A9B68A6F60A61E6DC8E046FE75373E4
+                               B45EAC193127CBA3AC4F22345BFDCCFE
+            stream[448..511] = 99C68AC554291FCDC03F300D69CE68D8
+                               C4D4DFF5FB2D4C3079992D40FFCC9683
+                               DE471E6F2A406DCE03AF8EA17B7AE905
+                               12F1368B8EFDA838274812C4F134E2E6
+                  xor-digest = 01AB73AE53306196763ACB9ACFF9A624
+                               B83A7B339DB517AEB408292627EEBC43
+                               FCA6397320F50E96ECC3595B13BFED85
+                               1309458EFE35FA1167C2CCCC6A4CA83D
+
+Set 1, vector#108:
+                         key = 00000000000000000000000000080000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 031A1BAA02280255F0413D76F945138B
+                               C0835BFE7CA64B16AD090454F098B8CF
+                               34B1EE138E03C3CCD9FF918A58D06AD9
+                               2D7F3FB57D2E161A863A0C25391CCABF
+            stream[192..255] = 6810368C2B2A091C6FB3EBB76E960AC3
+                               BFD678F028EB6FC0F5B36C2D386A21A8
+                               FE46A5AE09DB0BD75359A8482EB6F5DF
+                               ADE199B796520807D60D9D93995EAFE7
+            stream[256..319] = 0F2CDD428FF6DF2A4621A8423E09939B
+                               014BEBC0ADBB8CE71B5E587DA408ED43
+                               04A12BD535257322122EEA2840A9447E
+                               CB1B6D3550ED14EE31424F5404B2B5B0
+            stream[448..511] = C63FCB06883F3AC65612EDF28C875477
+                               1D383D42A553EAFA37ECCE26061EC5AD
+                               C6FE3BF23E06CFDB14EC1DD996A7D4E3
+                               FCF7A0B9ACC69F37ADF428B434994595
+                  xor-digest = 463386D0F7A1306E87F3221C4ECC0597
+                               9474F620AF3563686ED5DEE291155225
+                               56B9372496638BA1631982D6B3F58CAE
+                               27810BB7AA93351B838D54EE761A8C94
+
+Set 1, vector#117:
+                         key = 00000000000000000000000000000400
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = AA4E7E8171A8E0AEDA6049999E0A06C2
+                               FFA43B9ADC5E9DCE4ECD8FC1D27BE792
+                               6FBE2ABB69A6B69D8C213A793C77096F
+                               D4DF7BBDBCDF007C914B7C817837D99C
+            stream[192..255] = FC90E3C82B8E7228C1ADC2F555068372
+                               4307902A0750149CE0B2EFD2CCFE9875
+                               DABE60E1B85CA117D05E4BD4F45B42E4
+                               55A9F42C60910C9BFF8DF8FAB53C81E1
+            stream[256..319] = 9BD976B88E9E5E23D0D40779644BB3F4
+                               CE5C6B16FA6D955C32369DFD19D632BC
+                               7730683D562320E39F75D8D8BD074968
+                               9ECAF0DCDCD99FF4C3939092E9576144
+            stream[448..511] = 51BE9CC1362669C0F79D2D88A42DBED6
+                               C3315002380AEB647C8F9C4036590527
+                               1D8915B985B8BE9CC1C5C7652139E609
+                               651EAC8A14DF661D9869982AE5735E9F
+                  xor-digest = 0B0C84D430687F488F8E45DECECD6D7F
+                               1947E32AC49BDD2139F5413E08A88F31
+                               F9AF6599498431F155AA10B7EC09F095
+                               8A5AFDAD486D2E6D50AF77FE98E33738
+
+Set 1, vector#126:
+                         key = 00000000000000000000000000000002
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 52F49050156E957C605656B2DF88EE1A
+                               5E3ADA99F9793B65456C4C6C322B8B5A
+                               28DCC91EE0E711BC33E0C13354542227
+                               613665CFA3A825B943444401EFB06ACB
+            stream[192..255] = D0907F5D5939D7B544476E299605972F
+                               FE422C64BC6343F9C81093AD0E3ACC72
+                               F4B67314892E36764736C0715E4D3438
+                               36BDB105214F5F8925F321F5FD865EE2
+            stream[256..319] = 96EEDA75474D65615795185B1BEE8D44
+                               A687420304B260E4C70FE7F542967325
+                               1826EAE010981F6262EE6CB639996467
+                               5F6B23825748128617721752283C16DB
+            stream[448..511] = D926085A441E507207850AFF3008D59D
+                               F7C9D3B69687D18CCFF2C2E09D4E4EA7
+                               FF0B72C04A86B80923DAE187FFB99170
+                               DBD4902AF77EEC42866A83B519F092FF
+                  xor-digest = 1E068ACCA6062CF26ECEC79F149BE139
+                               24AF8BF44377EAD1550B1560E4A1006A
+                               A6986C61581FF9E47D58F2E52434911D
+                               5AFCF914DBBAE183D02DDA3210768984
+
+Set 1, vector#135:
+                         key = 00000000000000000000000000000000
+                               01000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = EF5BBD7A620E8052F05DC269309AA7CF
+                               8AFD4AB2B941D905AEEFC721562E00D7
+                               04CA70113C8A90FA12A0C9B9CD1B9F9E
+                               6176602CC08B66410A8BB0F5E9837C27
+            stream[192..255] = AB843B43856FC77C1EC09C0DD2248617
+                               820344BD2CA0B025C39B0EBD5A750A6C
+                               7BDCE863C068E0D3A937A5B2C5B6ADFC
+                               609F6DF7778D88238B89288B2768DE99
+            stream[256..319] = 5E6AFBE41F47F35CA9298C973E613174
+                               529D9BEFA6D0713A5BFFD96B70D39044
+                               413E24FE57B01C426E8988EC365FEFEC
+                               1422CDFB956B12C6A799F5FDD4EE43D5
+            stream[448..511] = AA960C189C0A20870901D4E2F1901D0F
+                               A28AF3D974E14FB70736C191D4C9CA26
+                               48EEBA776339F80D57A8B783419E61B7
+                               52541CB296B4CD31C55DE3D34CEF0D31
+                  xor-digest = F163BB7ABD3914204ABAF08B844ECF05
+                               A36B7B37B8345115EFAA2AB2E7763E6A
+                               E044A83597C023FB41EFAEFBB63E4195
+                               B60AEA6399DEBC94C75BE883B3623733
+
+Set 1, vector#144:
+                         key = 00000000000000000000000000000000
+                               00008000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 9198011FAAD874AD77CD0C98DD99C7BA
+                               01B75CF9DE1E26321EC6AD293C73C675
+                               69A349157FD47672C5326276BA40F4C5
+                               0CF8D98134D0BC13879E9EC267110FDE
+            stream[192..255] = A9B3BEEA161ED996C44F6D3B93431C6F
+                               54DCD5DB88E62CA10D1067B9CB5D21DC
+                               D7E04C48D88DF54E1370D1C24C871BD3
+                               BDF9B956315996F95867D1E2494370CD
+            stream[256..319] = D09ECB5DF5B0526372B57CDF5DCA6AE0
+                               F005D2E2F27D50398E3D1D7FF2100BAA
+                               D6F2C03E431345A4F41CEF3E8D3F14CD
+                               C76A423720A936D27322559289F13D92
+            stream[448..511] = 5E8FE7964B052B6D27216E37C49CC913
+                               450FAE159C087E34CF67E8B0B8F516D6
+                               3C0B544CA29F9BCB2B48D3894D69DE3E
+                               1460783E82EB67990FFB7F92DA48E449
+                  xor-digest = 5515E37A3F274746847F551ECB7DB4BC
+                               2BC32237050BEE9AF2AD1BD8577034D3
+                               4A23AB8A2FFD00C7B8CB7D5CA0AB2421
+                               E7CECB2801A1B73A44FF3E798ACA8443
+
+Set 1, vector#153:
+                         key = 00000000000000000000000000000000
+                               00000040000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 02858548ED24761DC0AEC6752076D095
+                               7E78EF1FCFFD8E756C747586A3B59C22
+                               F42A9FCA9F103C3054E0B4F6EEC82101
+                               971F2A6F9611F7541152FA3BD7774474
+            stream[192..255] = C32ADE80873D1190E9807C25D73EC5B7
+                               C208AC693D98A664FF4D11205650F7FA
+                               A36B153BC1A3F0EE0F4319F2100F7F27
+                               31856BFAE36110C12EF0361259641D74
+            stream[256..319] = B8F74AD5930D1F2CEA6B9F7E4E775DF0
+                               AA97744677E5C96B9E55AD77BFAC5E8E
+                               E9BA7A19607D9EC52DEEBECD185DAE13
+                               E304743019D831849F111602EE6EC34B
+            stream[448..511] = 513303A57165287E793DB91F49C9A8ED
+                               522389F03634930512744884BCA45F4C
+                               ACB60FD077BF2C050D4002162FB811EC
+                               4AA855793CFF2E30665188471FFE0847
+                  xor-digest = 7EABCDBDA34E51E3A61D2F3340884BBB
+                               600E1D30216B7117081B3E5D04FD4523
+                               706D4F34C5FD604134DC89F570D6119D
+                               DBB7C5FB7CA90E38AC157832C3C956BD
+
+Set 1, vector#162:
+                         key = 00000000000000000000000000000000
+                               00000000200000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 689E48A85A40BD161BEC710F9B2457FD
+                               276F1156EBC10BB851A8517AFDBD692D
+                               E4827BAAFF218AF886439ED976147EBB
+                               BB1074BD599A80F6324C87BAC987B8C5
+            stream[192..255] = D9BA3E74CBAA58CA97DA3D3B1051BDF3
+                               29F6CD837B72022D2EAB5D20B02F53DC
+                               4755C764C50756A7101998C187E4F0F8
+                               F17A0C6797976C4FF1BA17B3D03C2218
+            stream[256..319] = F6F9B6F0F6E1D756C0242B48BC55EDE3
+                               3038BABF72FCDD5122C61804996F5ED0
+                               86A78B33C517CCED9C34580AA54AC03E
+                               BD0F9698A234787DFE97FCD3D9B7CEBE
+            stream[448..511] = C31091C4C5AD605BA90963B1D469E501
+                               412FEECDE3EA8EE834F188793A98F830
+                               81F8C941F11676E007074B40EB15DDB5
+                               67D93E954422376F2E3039F4E4115D70
+                  xor-digest = DF047B3EE7F2AAACE9D5A2B0F6A1EA0B
+                               97E815E9B9BDD3B7862ECB414E9C08E9
+                               BA0109B1D6866C9D7D6D3DC9FAE5F51A
+                               48DE7B9077DA489B7982BA69228483A2
+
+Set 1, vector#171:
+                         key = 00000000000000000000000000000000
+                               00000000001000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 1F8F707DDF0121AE4DF26A6ABDC195A7
+                               CB9CC8479588D2D436C52483DA54744A
+                               2880E3DC622180D36B64CC053CC245D8
+                               0700EC62ABCA6944BF89C7DE1A532A3C
+            stream[192..255] = CB2D934DD1414C60550CEA6FFA776312
+                               3C9336F99F16F8B5B8E60D5D0CE54A35
+                               E752A4887A03EEC95050E50B58F5C8C2
+                               FD814DE76D3F66B907C77C9B646EFD13
+            stream[256..319] = 10306DD8B3EA307496D7BEB7A679D53C
+                               3650ADC53991D0565856F51DA82CEB45
+                               AFB460D6F90877557E17F534C3375FD9
+                               F96D13AB77FA3996998F5DC6F5D3C9A3
+            stream[448..511] = 42F4D1F669741750B24A44F82990E6AD
+                               065E7B07B2194C96E7578F7A754E52A5
+                               86C820FFDDBA671A7B08D65B51D8736F
+                               D0DA8E81CC69BB8A56565C43845C0AF4
+                  xor-digest = C0535BC269BB39AC2ADCC50C62F87B6F
+                               2C9351DAD49813529A27BAEC163A1D8B
+                               778670F0FF1610A4688F86851050C9B7
+                               275B087A0B5CE01B602F8D1D25C29392
+
+Set 1, vector#180:
+                         key = 00000000000000000000000000000000
+                               00000000000008000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 899C1C50A80E374AE884F10BBD17D036
+                               1632D89938FDB7E4BCFBE1050D5E948C
+                               CF4631EDFEFD2F140FC3FBFCC096CD68
+                               1F6C1B0CE9E395FDEC56295AE331D8D0
+            stream[192..255] = 2F60CFD4D07E58DBC5127A98D2B1DDD6
+                               1F216F61F70AF12427108906AFEDA4AB
+                               B439A99765EB84E43D06EB7B3D984A3B
+                               53D8C054745A6E3B61F8444C84C7F30D
+            stream[256..319] = 1A92F3B4F6C4684201FA4AF201259AC2
+                               53637B41B734062C298E6F932DBDAC5E
+                               999FEC21B63539B5FAFC312D0CCE6137
+                               04AB3CE65E241A1C34D12ECCC840973C
+            stream[448..511] = 83A75C2E2C6D40FAEA049322DC1B2251
+                               306A8906A37DD30182C328D50E7B7AAF
+                               89671DD776C9C730EEE0DACEAC7D7038
+                               4A93426090F31EB851976B8B2ECA1FBA
+                  xor-digest = 6D85E7DA2069F1308D20A56DB17F3629
+                               09E80EA6A045DBE61FB037C3C8B9D448
+                               526A37A431A8BE49CE4F10B8CF6A33B8
+                               82E6ACD6309BA1B716810715666C6CDA
+
+Set 1, vector#189:
+                         key = 00000000000000000000000000000000
+                               00000000000000040000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F9E151BE5EA0F532E56958F173B8F104
+                               DC9E73D8FA289CC2F84C4BB10E8EA769
+                               57FBC8F539365B9E9518F8787D6CF927
+                               55F0C2B2845318337F36B80E22C59FD6
+            stream[192..255] = 27FAFEBD2EBCD2B67AB18BCFB7F8DC96
+                               F54C8A765B0E4B3DDC3013B599DEF791
+                               287FF3C0F48F339DA04B667E54696485
+                               D48751A001B548727338AD6FB82EAE42
+            stream[256..319] = 09DC2AFADEECB86278C64DDCA51EEF97
+                               C10B9852DB5F33A19C99C0D4F36D2959
+                               DE247E4DB356E67F2951E0309F18D6D7
+                               27D2A1BADCC44DC320E2AA80E1834198
+            stream[448..511] = 4103D8455B6DAE658915FACFF2F3F1F2
+                               856E2343143671565936301E9D1F635F
+                               EA732C9A096C3E955D33770E244ACEA4
+                               094E390239489F4D4F0A1F3C26A1589D
+                  xor-digest = 8DF4EC7886C386E5A0D7201A3E731E95
+                               5D1E281321C2B592E31681CC95D173A7
+                               C92E6112197C6A605F494F6E9C4AE73A
+                               21B966CBAB1628794F0E44202742EACE
+
+Set 1, vector#198:
+                         key = 00000000000000000000000000000000
+                               00000000000000000200000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 8B9B0CC804CB353F49564926E3FD846F
+                               A4758692FB110A428FAA3132F4C606CC
+                               A41CA937FDE463D9FEC51F419D60AE60
+                               1E8EDB30AB09E0B08D0143D885161B16
+            stream[192..255] = DC6DFDC4E36FC1D4BD87F731F761BCC3
+                               9837A790DBB766040B4508778C5CFC82
+                               8EF9EC4D76BE3AE0967DBC844A2D252C
+                               B942E97A2C6A185ECF4E1200BF9BC826
+            stream[256..319] = A9DE78C2204B712A9803594B872F29E9
+                               5E8962D7D719702FB3279F053D311292
+                               26A14FB06058AEEB6D283EE0A272C6F2
+                               D392B102E294A7CDF24928D5281D024E
+            stream[448..511] = EB822D7BDDA456BB6E109ECD330D4FB5
+                               1259D7042935BD5DFC787E903758C27C
+                               E9E9B191957E721A7013D36E5A29C09A
+                               3433205956A55460D1498124B2800423
+                  xor-digest = 10128D9A5EEA1D93E65462702DB15A8A
+                               23D0FDFCC5B0871639D704DEB9F580C1
+                               C88213CA166F3BBB89D0926CAE7E64C1
+                               0A24041A42B9D50CB0537A0585EE574D
+
+Set 1, vector#207:
+                         key = 00000000000000000000000000000000
+                               00000000000000000001000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DD4CCBD0B5068DF0193F50C11D2576E1
+                               A70040D6C2CDB98061498891D1791E63
+                               C4B5103A52146CE27D8F721E147EA612
+                               7E5BAE1FCD3DCD9053D5FF5EBA328BBF
+            stream[192..255] = 541F008D78EC1ADC5D1B930CC99D4A3D
+                               61BD60AAB9DDC8AF8594FCA129410232
+                               92BC44EE064E44E88A07ACD1B742666A
+                               D147F14102D23578E3B7DC00905586D1
+            stream[256..319] = 6834D2FB6BF3B46C0552AD83275CE6EB
+                               9482C2DFE40C6B1FD6F743CAC8F40A91
+                               5BA9A90FBE7CC0153D53C444D3F7A23D
+                               CDC3134E237F63E5A07C99C10B8EE87A
+            stream[448..511] = 9F75BC84091695FDAA2579AF9D34B2A7
+                               2B82D39A1E7FCFC4D18D6898A9CD3296
+                               0D50AF1B720E1347A0848782BE6AECC4
+                               684CCA05B893951A65EB7CB37F5FE240
+                  xor-digest = 12F358C7C4C697199F9AF17040115522
+                               062514A5DC3584BC515AAA4474A1D85B
+                               47A6A2D8C39E8234A5D11860BC1036E3
+                               957920C03E9A47E61AAFB058A9850559
+
+Set 1, vector#216:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000008000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C5958694DB1D54B95101A9F48660CB26
+                               8EDADED85C6239098248E0867117607C
+                               D5278E5B5D9CDA7BE8A6BBDCE61215B6
+                               2A93FFF627B28B271CF2275E54EA1CD0
+            stream[192..255] = D9B69B25B5729759F3180FF17421092B
+                               0740B2E1307FA9141915CB8C30C0C322
+                               A1E4710674EE715DF3AC89F447442A7F
+                               845E154393273BA47F2322BC661D1755
+            stream[256..319] = 49412E5F3C9B5B52FF790CBE82D6F037
+                               217A13B7744740A887F7C1FBE3714DEA
+                               2A4EA4A5F444B2EC3C0B160A251CB44F
+                               8DCA914FBB80F72BC8D009F1C7E001EA
+            stream[448..511] = E1C2BE8C64D6BFE081EDD30681763928
+                               85939DD7EBC13E16D83C8E7FF65EDBC5
+                               90FA3904068784806E20F0A61CC73839
+                               E3BACD410F59D3848F5A628EE030FC4E
+                  xor-digest = 54092B3D64197BD598F9050B44D2E785
+                               029F29F46822B72ECA40182E8ABDABA8
+                               751054FC50250DF5AF5AC75F4C51D1D5
+                               D2BE298770C353A7C5D608D1149F1452
+
+Set 1, vector#225:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000040000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 633A6CAC516B7A84CFF8F5702CD9BC81
+                               BCE328741675EBA0FD1368190AB6BEEA
+                               7C8B0256CEDF9E5CC6F9249511AB87AD
+                               ED95BF8E11182B8BEB75FFA279C3F706
+            stream[192..255] = C3F700538A4EEA17773E74D10CE4493E
+                               FB0417B380ED4229F651D6A9BE0AC617
+                               AF66C576B7D06F2210EF226462004D90
+                               E753D805AB198B73B0CCD752C7E57A2A
+            stream[256..319] = 30A11289A9E0C854B980BE044F07E945
+                               06D772861896D0F75D739647FFB939C8
+                               13FE4BE5C8DF84F64827306D0DD82415
+                               E104F787F30CD097EED7DB9340A0F47E
+            stream[448..511] = C2134984733448DD577DC48B5EE5D761
+                               0A54AB6C32E3BB782849D8E7E8B522B8
+                               0D6444342ADD9709D7434F9B4C18C6E0
+                               15AE97DF8F3D29FA6D85DA387157E223
+                  xor-digest = 8613454AD0B424AB6EFCEA96C0802B6F
+                               47F1E98C52BC68DA25E653431CE31078
+                               1658BC45DCC2EB43C4ACF8395727133D
+                               12A127D4CBAABAF24BA44930A58A87B6
+
+Set 1, vector#234:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000200000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 6A0F095C0E23FD6F8DCAEDAE5314141A
+                               0F1CE1C1BD6A16E81FEFF72F0753A5AF
+                               C1C54DFC0DD6ED99F1D416BE3C5EF341
+                               454C18D49729E80EE99F37734817658C
+            stream[192..255] = 05A4DF5BE8A35DC623D107728F28C789
+                               3DE0E75268B3E1F94C07AE50CA0891D6
+                               2B1E764CB41062391B33929273CE6B6D
+                               1C9CEFB35C37AB2FA8EC18749B5292B0
+            stream[256..319] = 41C8AF9ADA46F7BE8EA72BB3B8661B78
+                               2BE5649F18F216B75A0071A6617200B8
+                               463B08F986D706AD140E27C8F4E040BD
+                               6BFB4872D758363281C62AE8C4B64E33
+            stream[448..511] = 58CDA35476767EF58748A504B0E4A38B
+                               64162AD422A0DEC0434D879898558C77
+                               1A8243DC43B15FF996B4C8CAD3C47C6F
+                               26F00C71ADFB538D9A983B7B624D6E62
+                  xor-digest = 240A699AF4DDBB56A4C502A9175C0E3A
+                               BBD654D0717A1F6F6847381B978AE8C8
+                               0EB7CA07A481DFF8606A31BD6B489AE7
+                               89763068D641BAEADCBDA9ECAC465ABC
+
+Set 1, vector#243:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000001000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B3C91DA5911D7D7A4BC16A66988AFD3C
+                               8462A9E9BD0D95C9B9884DD14801E464
+                               C27048FEB5F70B28013099F0A31255A4
+                               9EACE528A13CB5DD067E520D183133BC
+            stream[192..255] = 756EDB0542FE1F11B159C7081D9CD742
+                               2F0E5862D39E2CF1517B2F6F39AE5245
+                               D659A5B93EB8FA8C8FB751B378BB0DEB
+                               481B874663624C8DC15E6A1A64376340
+            stream[256..319] = 436613C9293D5DCB204B46899CF23E65
+                               698BCC3003FE064FD1263EEBC59DDBAC
+                               536566855510FA802128F0A968A2E359
+                               FB68EAFD6AA89D394B32BF6069E92EFC
+            stream[448..511] = 033FF40203ACAEDFBF561A674EE74D97
+                               A535A448AFF94C8C167200E5CA626388
+                               DB1BD6EBD4A1D83CF352E97CD8F02671
+                               18E57B71D33930EC2752D2F262A55F9D
+                  xor-digest = 2CEEE4705688B20B3AF71F285DB9361B
+                               0EC945296B97F3A050C31C54E9A07CA6
+                               498B92917617571928E2663CBBAE21AD
+                               8DD880A037A024E46B6581974838AE1A
+
+Set 1, vector#252:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000008
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A6AFA8AA02C3AE7F29E61202B4A5C25B
+                               6F74BCC176702C9C1D610FF722527A6E
+                               721ED90B871AEEC71EB62B24A8F24357
+                               07765F7724BA03173F51C9B66C9F4BDE
+            stream[192..255] = 002B8929A54C1370067A36DB9057807D
+                               DB747C2A4CE19BC085DDC517AADE3B97
+                               BB1B35F2BAA6A18E8154CD80DA6F9F4B
+                               0DBFD3EA5F69D5ED3B5770C6221A8D66
+            stream[256..319] = AADBBFDFC6FCC6072747BB528EBEEF34
+                               6DA76885CF1616ECFB89D3A134769902
+                               904AA12744DD404F268B0B4B34700928
+                               E3C4B3665B9CFBAD9C528EA06F89CCDA
+            stream[448..511] = DD5453BD0D99E7D2CFC558EA969A4E35
+                               743AFA96D570026106C5CF40037B1325
+                               40C909C1278DAC8369B1AC257FD8D868
+                               3648B4F22F7C66282BAC49D8D23626EB
+                  xor-digest = B3F2AD900155FD5D39768B4F4B7F8E5A
+                               1C557936F2B5F06966DCB884AFF7F01C
+                               7AFC073C20EAF85363DFF41357E626B3
+                               B19607224467413D185A05E7BFBC5F0D
+
+Test vectors -- set 2
+=====================
+
+Set 2, vector#  0:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 5B078985D8F6F30D42C5C02FA6B67951
+                               53F06534801F89F24E74248B720B4818
+                               CD9227ECEBCF4DBF8DBF6977E4AE14FA
+                               E8504C7BC8A9F3EA6C0106F5327E6981
+            stream[192..255] = 30DA9453A90909A5675D6B691CB0990F
+                               C423CDD8222EB47245BBB67BCA2B9C10
+                               8D1F016DF0CF8CEAF6829910916DBC1E
+                               113D11E91BEC3D85C47E3042EC865658
+            stream[256..319] = CAFED71B892EDBE13388CEF6A3365797
+                               E0D88C0D3A5B91BE4CBAF5162F69558F
+                               DBB45CA6F8C8D4C371D62736EC244584
+                               60131F54854F3EC804AA9A38E6ADE281
+            stream[448..511] = 531A0ED5D2A51DDC6499FE1BB6E2295F
+                               2C3EA0F56AF46ED93DFAA4E16F5F0831
+                               2D77BD0E9122043CD6A202CBA9351F6A
+                               0E8E6263F4017355136A0C551E6FD0F8
+                  xor-digest = 023D719F61C193E4CCD87755C87F9604
+                               C5A29DD7E31637B3DD70D43441D48CC7
+                               D474013C85EEAB1897C80ED0A0272543
+                               F951C72E3954616CB5D6B51FC24F4B0F
+
+Set 2, vector#  9:
+                         key = 09090909090909090909090909090909
+                               09090909090909090909090909090909
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F5C2926651AEED9AF1A9C2F04C03D081
+                               2145B56AEA46EB283A25A4C9E3D8BEB4
+                               821B418F06F2B9DCDF1A85AB8C02CD14
+                               62E1BBCAEC9AB0E99AA6AFF918BA627C
+            stream[192..255] = 3B3C6E78A8F381EE2C159FAE1C487C58
+                               11FA9BB02CECF7440239FBB0497347EF
+                               D8F1A8AA71AFC70ECCD64E81388E6E87
+                               9521C2B47AD84F9CFD9E240D8D2F3001
+            stream[256..319] = DB04FD01BC18D91E2D31237AD0FE26AD
+                               3C8D6A2EFDAA9CC11BFCC61D94F6104A
+                               4091B3634FA57AB0AB9B209F22DA5529
+                               75C3C322DEBE4AE68623BFE1B2BB7F0A
+            stream[448..511] = 35B290F85EBA78A978750690C4747E8F
+                               72621951483772E8B89876CC5D55F3AB
+                               02D9B8FB35C741279FF9B5B571B26329
+                               4D011F813CB5B209CA1A22D532BF09B7
+                  xor-digest = EA9BB65E87C987EA64BC3F4E710CCC34
+                               F6CD0A795B8347E1441CEBEE35540D41
+                               64FC2B95D71FD47A2C4ADF732261EE52
+                               8125BE374FA4A90132CC1063971A2862
+
+Set 2, vector# 18:
+                         key = 12121212121212121212121212121212
+                               12121212121212121212121212121212
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 397F8EC015ED573967938D1CEAFE9BBD
+                               BD8853C329B3A881B489090853FE0F43
+                               89DA105F0ADFA9CF51DA2521C40FD2B8
+                               FB0BF80B93E3F2B3D8A8EB1C615E0FA6
+            stream[192..255] = 68E7DBF465E3C6994D58B9937A866E4D
+                               43A82A80DAEDBF29C048639BA38B690B
+                               7ED11323E3C0A8E77A16356705431EC9
+                               9F2CB7F7E1ED3B83EAF2CAEC00B00755
+            stream[256..319] = DA51CF3A07EBE7E86E9DDDE5A47E7417
+                               376F334E6AEF9C187012C8AD2B94BE7C
+                               00A876756EB232510FD0798E72EEC87F
+                               75EC1467C07B3A1EFB0D51A5FA65E382
+            stream[448..511] = 0BF3C6FF6794887F2776FD632B83682B
+                               AAFD131432CFD7D2F675E03320395313
+                               AD4ED96E9052FE6B2D2A17428660A25E
+                               EE642B712800BE3F7E44F21A1E6A03AC
+                  xor-digest = EF4E84DBD66497B142EEAC56B830FF78
+                               0465CEE20B9CFAF5727D4B3A588F4D00
+                               AAF718330CFF35508C44C1ADB8476625
+                               2CC3AA6AAAE74F8BF1DDB6D4AADA425E
+
+Set 2, vector# 27:
+                         key = 1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B
+                               1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 72BC8A6E1E61E704B142AA00812EE676
+                               263C1CB9AB941119B19D15EBA3462F56
+                               2F69220595DE5E0E7C595FA40F1F06B2
+                               6EC32252AF05310809DDDFAE2E24B170
+            stream[192..255] = B29A740B51B4EA1080666337D5551484
+                               FFED6860A5125DC0573C8F90F23A98E0
+                               BA7B3E4C28C2CEFB1C33D2C36D1B7625
+                               64B9A67240CF174347A4C8D868F00F6F
+            stream[256..319] = 555ABD5577A8909797FBA9769C03A0F6
+                               537C06AFB23354F054E25457B729B534
+                               CD10B2ABD45BE3E38DAF1B7A9103268F
+                               4FDB4C0FC9A80A003FCB907E8F249AE0
+            stream[448..511] = 3B29A43D9C795DAF1760CA9EB57C0B39
+                               F62D54311207B617B727FCCE1B2E762A
+                               060810C4DEF672E7D76083E3E4BED0D1
+                               0BAFD27CDFD2C937E660190D36B3FD7B
+                  xor-digest = 0B3B0B3C69F2E4BDA22E25AEF352234C
+                               18CC5E1E3F6A317ED7257887446EF734
+                               65CA15F51AF5E077B7915062391D8497
+                               8F437985DD08F5FA3A8D74B3227A6EEF
+
+Set 2, vector# 36:
+                         key = 24242424242424242424242424242424
+                               24242424242424242424242424242424
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C845BA29D542FBED2D021C85188E119F
+                               D34967B79D9F44635DD45D2E41DC5AFB
+                               B237AD2FA0E4CF4202D83DF3073C578D
+                               2AA8A32D30FB45DE28F23CEB85E50FBF
+            stream[192..255] = 15C910FDD3C590AED1ED7DA2A7969297
+                               FD12081B4B23F0A32CE5B3196173C7CA
+                               7EDD03F9637E08CA501C4850C15B207D
+                               7AA724377396CED2357B572BBF9E69AA
+            stream[256..319] = E484AF567EF80BAE77461855294E9280
+                               EF57E7366605785034D639D6DE3EBB0D
+                               E21886D0E1E0679BC2E2C9C2D9201484
+                               4A452B6AD3F1AC8B7762FF3C0E405B3B
+            stream[448..511] = 595D9855200786BB575FF7977509F395
+                               7879CA1F19619A99174BF013CB62F85B
+                               FF2C3C4FE724E26DD0C10D7635A2491A
+                               9E7E868D9DAD9201465AA178184D06AC
+                  xor-digest = 08737B82505F46F4FF282EF42F387AA8
+                               0450058F5314389BB73733BC163D75D5
+                               D32FC6408F8DE5F6ED2050027D605FAC
+                               A7119FC2DC1B6D3E84E8048DCC42FBD2
+
+Set 2, vector# 45:
+                         key = 2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D
+                               2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CA82A689535CA8BAE01BAFEBA6504B3E
+                               6E6320101999BCE5550C2BBC9BC65D91
+                               FAA2D72FA4BF46B6EE916244048B1D09
+                               A115E3AB6C00BAC8EE382B58859E8157
+            stream[192..255] = DE787B1CE01B0BC09801D78D1FFA3A82
+                               0C18B867C561E96DF4ADADC5A4375E44
+                               5A34F9457E5F8C9A337A0C88DF0F723A
+                               D4509F1449DF2C6AEC0EADF4C7A8139A
+            stream[256..319] = 7E1854FA15DF9D5827F1555F12B292C8
+                               452A1A893EF034C51750388D294947EE
+                               3F505839C69C1708E8323C449C39A96B
+                               FC9EC91B0E1CAA8112057EB0389FDFD2
+            stream[448..511] = C85B42B838FB9C3D4956C9E22FBD8FBC
+                               EDD92C4461EFBA5CF1664B9AF54857BE
+                               C3D00319E5E8A89A8322831151EE1D52
+                               D8585AC79CB60B61ED2C852D04BB0FB1
+                  xor-digest = C65A6BEBC4FE898DB8D6B8F6E8F3680D
+                               2363BC12259B0FDB2BD8F052A572ECA8
+                               D1EF62AA9A48497805A413742B5AF5A2
+                               6DC9FF624B49E5D6FE58BBE5251B4983
+
+Set 2, vector# 54:
+                         key = 36363636363636363636363636363636
+                               36363636363636363636363636363636
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 9F6BCFDE566A1B67C608F11B8461E340
+                               42D4F07DA4D5EB05554CB7426D65C5EC
+                               A93C2D321175B6F72FCBEBA6E38CB098
+                               B72534F7D534B1AADD97B77E8513B482
+            stream[192..255] = B2466A173F436C8433F264CBF125B8E4
+                               C10BC81BD46B5C21FA161CB2AE07D27B
+                               F66812A2C2FCB2B14C23E413CEF4E591
+                               AD52EF810A000B42E5C1B76EEBB17739
+            stream[256..319] = ECBED2058DC50223614EB8635B834C3B
+                               B176719C18CA5E3D087A93E5CDF81123
+                               C6FB819CCAFB5042AADFED5E3C33116A
+                               FD92AA21031165A22F4751C423B8B945
+            stream[448..511] = 758BD9435DE607867DA256064C304C8E
+                               DDDF5B64173CF2C98B2842992F8C5FE1
+                               A37C3227B7F37D49A39F9FF929A883FD
+                               56DB8B1A174E1E55FCB21C9E1164C20B
+                  xor-digest = 31761A49503946701D35306FBCBE10E2
+                               02967E7EC14A328B4DB19FE79F03553F
+                               13A012B7297B2D02F18A216AD24A682B
+                               299518C3769123EE86A4937DAA9FC39B
+
+Set 2, vector# 63:
+                         key = 3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F
+                               3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 85C7FF83641ECF1C91B2D996D4EAFF6B
+                               26A4E7E34C0CA9CB9399F655E566383E
+                               246143F57776C8E08951E87F76091FE7
+                               2356CC901F09A07895A890AECF047B3F
+            stream[192..255] = 4CE0C6606195F7562D485E32E8E105AF
+                               C862100A07E55FB449BCFA2D9BD48658
+                               958B37B3EA3565FA66824102A14B5770
+                               5E3914E0680E116ED58212CBF61028E3
+            stream[256..319] = 3BB772A5A8DE2AB14CAC1ACBF45B1701
+                               057710F24C01E680F58090B8E949AF01
+                               8970A43A698A04C0C8639FAA665DA3AA
+                               562B2C5C3A03BCC38FE75DC1821ED718
+            stream[448..511] = C73DEA1F7BFE42DF75EA2681BEB31948
+                               821FBB049DAD15B988A77C0247868A38
+                               2056B66F47B0195FA30C9DB5A2334A9D
+                               CD7C0D22E479FAE1BBCDFFE60F261C7F
+                  xor-digest = 94D41CCAD940CED3C854DA0796DC62E5
+                               6B566A980E34F353CFFD0F53AE9E34FF
+                               A6A057645FE66D86BE30F93805D9E2B5
+                               D78C68EEBF61CE387277A51EB2EF835B
+
+Set 2, vector# 72:
+                         key = 48484848484848484848484848484848
+                               48484848484848484848484848484848
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E45194379659D1D8904DB3698AF8B245
+                               762910B7FBD019AD1AA20A6C433B4C80
+                               308A9EA68697631646BF3A2107C4E7FE
+                               2235E8F3262A9DFD3F5CC23FEB0B2DAB
+            stream[192..255] = 012611EBCFF9F839DDABF99D9D4757DA
+                               4E947598C4757976F6F61DA5F0DAC8BC
+                               DDF72F08BA2F446FA37F9A490F6A2B6D
+                               79227C93271D6B763DA7B2A907220A42
+            stream[256..319] = DDE54F9170D6A4702CAF45CC6F799F74
+                               A43D83AB8ECBAC5206D108F869561D70
+                               F151A0037F8E28951B5026643F8B2D6D
+                               56A62E259F04A5EA304791A9468E66AF
+            stream[448..511] = F70794C084E6EDC07BA0347413B05FC9
+                               FC46994CA820CE4FC037ADBA50EAA9AD
+                               55064ACB7308CFCE3F35AD5C7C628362
+                               F4210FBC2D3264F734728626BABF5356
+                  xor-digest = 31815B36BA034BB1941DB1E45A941A59
+                               7C3882F34BD3BF441CAE8A9790B05BCA
+                               72049FD10C09A14AC9DB867A82C38A5F
+                               524C72F783DFD16980DBCDEB486FAE96
+
+Set 2, vector# 81:
+                         key = 51515151515151515151515151515151
+                               51515151515151515151515151515151
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3C04E21F6937C4EF472BFDDA89F9CAF6
+                               FF53889A9979ABA8F23AA51DB1EDB8E9
+                               D08F696C1100799A7D004DEF1CA94110
+                               FCF0C054B0C131E6FAE0FE2F2DBF22B3
+            stream[192..255] = 9B4ED3EF9639B953186FC7E732E7A9EC
+                               55A5F3F19C5A10E12EBE46DD84F10385
+                               33837693588D584FDAF86E3A217C3CFF
+                               020278736F1A90CE07F0DCE4329005B9
+            stream[256..319] = 135FAD68B5282FE59B28D2DF66463632
+                               06CA92E84A73FA131EDDCE89A5C23B4D
+                               08FA57D455BDB32F8ED58DAF3EF288A2
+                               7C72020E35DAE19B446E4C52DCDAC5B1
+            stream[448..511] = 7D08FE1CAA0E8A0362669B310B99127D
+                               18F2111002891D3229102D72605B9BEE
+                               F5DA36059B0DBBA7646927650305431B
+                               FDA4A97570CD0C484BF1E974B157ED7F
+                  xor-digest = 5125E77698C0DAA89A7E47DC5D038D40
+                               7B732CE56CEB674CE653A1B6661B2740
+                               0C092AFF83BEEE4FC4543B9D725C9387
+                               2F89AA338222ED677BF59397200AB304
+
+Set 2, vector# 90:
+                         key = 5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A
+                               5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DA2E6F7FF0D1F1C87A97E028D3E20E21
+                               75E9AD91482965B651B495AEE819CC6E
+                               C42AFE2C20EEACCEC4E90710D17210E0
+                               4CC6832905985322C8007F872D3E58E1
+            stream[192..255] = 09B0A38E19DDDA08F7DFEF7D0FC80560
+                               D692A020F0A66F609374ABDCD1343722
+                               05F19CA04EBDD3009844BC540C1B2B41
+                               66D45E8A2E822B906DA34649E7FEEBB3
+            stream[256..319] = 6C8E2CE1D7FABA414432E75BA2EFE4AF
+                               CE2CFE99506677A956AEC86BD290B6AF
+                               C5298A448D0DEFA99AA5CD26D318982F
+                               E786D809C713D5A55B42CA6650191DDC
+            stream[448..511] = 845FEA0A88B521CCB8927C9457AD3225
+                               EF6E3C21705EC9FB24873916A2C24668
+                               963C03FE097DA8224A42A99E5DFFDC17
+                               68CF518DE49CCAC8A70216C62C9CBA6D
+                  xor-digest = A46BFD9D2D0BCC688A032F54733AB7C5
+                               5FF58B296071D5D39349A531E41F0BA9
+                               893A1722B6102740BC5FE394A49363B9
+                               6A626AB43FD6A288CD9B23F7255279F8
+
+Set 2, vector# 99:
+                         key = 63636363636363636363636363636363
+                               63636363636363636363636363636363
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CF0E05248AAD82F1C8CD2095ED2DA333
+                               BCB02E3AD8797377AE1F1B4D6DDB86E6
+                               2A59791CB553550E0492FAB42C7A2C42
+                               3157C5092D2DD37D46589F17FBD86584
+            stream[192..255] = 9E946626F1EAAEDA42E52422B4A84D91
+                               4122EEE5736BCD12061C77DF5B0122B5
+                               1784E946B4E93470170ACDD7E2779591
+                               57BCC9B9F3E11E88BC2F740AA0C10C97
+            stream[256..319] = FF22D8196AB3DF662210D12D0FE79255
+                               6DCD39611C07F089979CF7D693A30CA3
+                               5B795B7F6D64931916E717C8BFB92114
+                               DB75118BDB51D142CE8133415C6B3456
+            stream[448..511] = 971F007EFE17662D95F47F4F28266516
+                               B22A1E50755EEF19149DE3A3121F5FEC
+                               E0D9DFE7A055026CA44193542D7687EC
+                               695B97769BF02F92C1EF3D904A8010C6
+                  xor-digest = D1C4878BEFCE48888A43C6DDE7CC8163
+                               C8D54A4CA36748C74721C7B6E1649A31
+                               4B5B7A4BD43E7C3D2A22F0C8446C7892
+                               90D54D421D37CB16400E59CC86215CC8
+
+Set 2, vector#108:
+                         key = 6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C
+                               6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 54F122FC8ECFB176E7F4CF172B2D78B6
+                               54BC11ECF0010D2AEB9F899130F4AC2A
+                               38EBC15C8831D591E6675DC1CE7A471C
+                               4B869FE83CBF37AC70BAAE5D4AC607F9
+            stream[192..255] = 518F298A6008532EEFECB3DCF72103BD
+                               5E3F84FEB6EA2311E8C19A2E93A9C3C3
+                               BB1DA7DBA78D5618D1C4FA5B0B202728
+                               62645A361E55494D66C9359E41E5809B
+            stream[256..319] = BAFFFC9206D1D813F3E2768F08D78B2A
+                               89BB20CCD92E7F13FDD816DD4E4963C2
+                               C5FC2570CBB8BB5C70848B73001F508F
+                               47AF179528200F51CDC6E4854EAA63C3
+            stream[448..511] = 844B1D15FBFD1264169279ACD525611F
+                               A39C7BB41F1E7A1C09090625F7926E51
+                               23A4CD7FE1A3F37ADC67AC437BF0A5AE
+                               FFFC6FB0ABF39D9908145004AA5B958D
+                  xor-digest = EC67596C9DEF4012A2D543842829306A
+                               4285A3B8038818F265065DC848BD80FE
+                               C27C2F66A57B27F7FA8AC912001EC954
+                               05BC6E93D7E555C59060F5D2E294D103
+
+Set 2, vector#117:
+                         key = 75757575757575757575757575757575
+                               75757575757575757575757575757575
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 91D2772A18995DB3C0801DD3740F4466
+                               F9535E5BECB93DDCA0E94D19C0B57BDD
+                               0FFBA9DAF0B11D55C852927F8BA560EC
+                               4999E25848D08FCA7275E7E8571A5F1C
+            stream[192..255] = 72E64FF10CA9F07CC493715724DA7610
+                               9E4358E8B0CAE451348B784A162DF036
+                               AB9796724D17FDBF356031D080A6631C
+                               D1E8D217B041AD2EDF427972653206B2
+            stream[256..319] = 4054F770C93FCAB533143FFCA8E4C0F3
+                               344956C29D10374E502C2EDD177ECE5E
+                               6625BAD9630DAD57976216CD69865058
+                               130B132FEC1AB0C350DF4DACE4C7724A
+            stream[448..511] = 40B4A4DD63F7B6E932482D0E6F5BBB90
+                               E402466550B518A177CD05985D238827
+                               BD92EE7EC22C274F19E682F85ABDAD95
+                               D0EBB3DB6C6134408353C8B0472C9A1D
+                  xor-digest = 9A6C893F2108D13A29373DEDA65386C4
+                               AC356BDDD4A3178952F9126E322B7AE6
+                               83C94F1A131CBEAFF26549D9F84CF04A
+                               1241FA374B055B0ADE7E49E8EC669E65
+
+Set 2, vector#126:
+                         key = 7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E
+                               7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 87A7773A3514EB7F882F2C491E90DCF3
+                               059C5CC575D806B9029CCE3FA45A246E
+                               0EBD3AB2F2E324FE36ADC3B56AE2F7EF
+                               C710AA964CB87381386C2A88B1308035
+            stream[192..255] = 415D6F59DD004944D4E45FECC6F1F06E
+                               20BEB18D9C84187C347F43B17E0924F1
+                               2348F825E106E57A00258CE4415294D9
+                               4323A9812D8A71359CEC1001BAA0D567
+            stream[256..319] = 8E20F0D03F37EF4B2C5EE12B5F81F7C5
+                               32D62E779FA0D2D08F8ABB6B0183A4DA
+                               4EE0329215F261D953150B9AB9FCBE2F
+                               568AAE361EAA8636ECC01A63F007977F
+            stream[448..511] = E7C44F44E06321A20E25F73E2069757C
+                               90499DB7E60025CF6D2D445E53A665F3
+                               08EC96F6FE73C0AC90D7E4A712E18C2D
+                               3DED46DFBAFA24C4B0B329E52C525976
+                  xor-digest = 22035341489FA6EEB2A6488CA42F4043
+                               57477C3F55569A1224EC39B1019E90C8
+                               21D37D78ED4DCEAF6EA70724C3751760
+                               38CF25DE4F84BABD80424D83A310881B
+
+Set 2, vector#135:
+                         key = 87878787878787878787878787878787
+                               87878787878787878787878787878787
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CEC0C3852E3B98233EBCB975C10B1191
+                               3C69F2275EB97A1402EDF16C6FBE19BE
+                               79D65360445BCB63676E6553B609A065
+                               0155C3B22DD1975AC0F3F65063A2E16E
+            stream[192..255] = 5E12BA9DE76F9ABF061782EC1C4FBBAB
+                               3373B816DA256CAAC37914B0C161E4E4
+                               5F5ADBE444098A5B2A4CFD4251D79918
+                               987BB834BB50F0834EF4985F356B92A2
+            stream[256..319] = D89642D25DF97D149AE07EA18BA39497
+                               8935978AC34C1DF9F444986D7505DB4C
+                               7E08DB3616B84CD52E7DD7FB108C36B8
+                               B50C2573172F4D3500B6D62A9D20B82A
+            stream[448..511] = A2C17FE7371604556F796429C6BE0688
+                               8611638B310F3E9FAF484BA9EE29C16D
+                               2F842EAF33AFEC557B68D2F453569187
+                               A6F4CD204A0E7A733E81AB7CE9FCAE81
+                  xor-digest = A7C93087CA70DDFE5FA5F1F2F954320B
+                               6E3A61977A7C6AC2F033B826AB9A9957
+                               66671D2A1025CDF8E2824B2F58CB221D
+                               2A68679239D90152FF7D0D39B33FAB93
+
+Set 2, vector#144:
+                         key = 90909090909090909090909090909090
+                               90909090909090909090909090909090
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 7118889F6E46A6523BBEFCDB006B3BC6
+                               71A6D390BC7099A708D370DCD0E3D143
+                               A0334619EBD5C7DA9EF6301F29273F85
+                               2DFA3C580ED65C6E952F88A0B7FE368E
+            stream[192..255] = 31D61E133CA1AAE400CB2DBBAE93C75B
+                               445792061AA0539DA69ED0B77B970C0B
+                               482156A5DEE4082A61364BF06E692399
+                               FB9F4411FEC515291F8949B20F57229E
+            stream[256..319] = 993E815F299D4841518119BFF88F6EFB
+                               F3DB9BAE60238BDE2845DE4DBA6D79DB
+                               C9E42BA5C3C004AE4546FD86C660FFC8
+                               FD6A8A349669FFE3D9E5BDF8E50A407D
+            stream[448..511] = 0F9CEAC6BDCBB56B7E97DDC95877B2B2
+                               1274F4A6D814B5440C74D53A3FF0735D
+                               EF01B14AE4188E215CE7337C04871688
+                               7159695A241BFB9D6B489FE9E23B2AD8
+                  xor-digest = 0BD5739ED28778023E6303FD88DAABC4
+                               0FA0A211A1A5C5F230D9E67DDD9EA517
+                               FEBCDF0BDBC107291B6CF3ACD8B862B8
+                               4BF15400493A54036E97FDEBB9A1DB2C
+
+Set 2, vector#153:
+                         key = 99999999999999999999999999999999
+                               99999999999999999999999999999999
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 236ECC5AB83DB1C5CD1C5A888CFEA2DC
+                               BE99E7E515650511FF7016A0EF287ADE
+                               5A03839C4F83F05FAC3B0B24D4E3F602
+                               3251F8D9CC4530A805F8A6A912EFAB1C
+            stream[192..255] = 792823ACE2C0DDB266A118068AE295CD
+                               716E424D3B98A9DB2501A3F5DF7DC70A
+                               3BD2C6E664D5E13317D6F57B8774C903
+                               D407D2BB6014E0F971141E89569C5868
+            stream[256..319] = 2D6ECCF738FC00ECD5475EDA959A73BB
+                               304C81FA9DDE0C21592247C4098D9347
+                               1DA30294DE8C100E5B17A199F744CAC2
+                               4E33490FC7F223FD6B4923056117C6D9
+            stream[448..511] = E791A6BE7F7593788E5D627F5CDAAB59
+                               349AF2BB1DA2BA622B9824F729929098
+                               BD19DFC05D0D9454F604960C027752F9
+                               7812E53DE6AC6CD2751AB331703646AF
+                  xor-digest = B7C5CE0D2FF66533A1C948C425F33FF2
+                               DC458E7E517637596FC8FB710E2E5636
+                               DB1F14848CB12793D54ABD0856B22F3A
+                               ADFA8C33AD08B8CC5292DD76913CB105
+
+Set 2, vector#162:
+                         key = A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2
+                               A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 74490D19F13E7C6D1B25C6408E23F229
+                               8A8806402755660C4A30CD216A500BB6
+                               AE975E08EC62D08425A8A62A71B00215
+                               DE35E5178902348698528CB82296F009
+            stream[192..255] = 51A6EC18829928EE94C37A5CD030CC4C
+                               E4F7E1B3E78C3A5DF07592F45B968BEF
+                               F95B8B257DAF2B468284627AF4481FD2
+                               67BE0B164DD86721DC8C1607A0607EF0
+            stream[256..319] = 75C565D5A5A240B003273F99BEB3E4B3
+                               9C056162B626F383F3E77B5C98C0FBE9
+                               119A7C335C333E6490126AC2510CDFAA
+                               86441C72D1DD9ACBCD3FEFC0D0C794C7
+            stream[448..511] = 2D90CCF0B43239D725E3B53C31B82754
+                               246C065AD23A8D709161FC74B34E23DB
+                               B918EAFA4465125D3780BF0B5803AACA
+                               037AA0A14D977141B611A6CA2278B634
+                  xor-digest = FEFDA1A6E95920B93380CC24FAE214C5
+                               6B009ADCB176D519CA4B8538EDFC95D1
+                               6CA06B730B28A230F0085FE43CBEE2FA
+                               2EE5DCD74D66F5CBB59F256CC1ED885A
+
+Set 2, vector#171:
+                         key = ABABABABABABABABABABABABABABABAB
+                               ABABABABABABABABABABABABABABABAB
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 22E1A884ED2C67CCB2977105649B6544
+                               367858D1A730AA2FA96703FA406B337A
+                               B2159A389BEF48D8A215D870B2968E16
+                               B11571F12BEC0A07FA7D3B9790987EC7
+            stream[192..255] = 4C98DD259D03A40AF38E0ED0F37CBD74
+                               B27776E9250B8B063E52E169C7B76A15
+                               0D699278AA4124427B5EB6AFC4AD5DBF
+                               600FEAAA98A88DFF297DACA5ACB4878F
+            stream[256..319] = 5FC732A26406FF0DBC764ACB05C83484
+                               976B640E60CCD6ABFB908583ABEC3E75
+                               2878371EBB5374C9B37A63E0768AE10B
+                               D857253D940AC408EF49EDD590E806AE
+            stream[448..511] = F012E429C44D5DC03B88123855B62C0E
+                               90E06759306017B5773752973850531B
+                               C480316CBBAEDE6353AD5FB298349AA9
+                               16AC0221A4CE1E4729BFB9C230AAF9FB
+                  xor-digest = D73B872315F9052C67C4CFC5CD912DBD
+                               60DA32FD06D9C8E804968E688898200C
+                               1D979DFFCE52E1C3B3309B58D12BDBB3
+                               D3EBA2954D1587D720E004E12EB4A13B
+
+Set 2, vector#180:
+                         key = B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4
+                               B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = BEF4DD0101F80A8F880BE0613B2AAF88
+                               D2EF924014F7445ED922E9C021571909
+                               D7E6BFCAEE0724F2A9C522C4BDE4BBE9
+                               FE53FE592C0FEB80D2C7A51FB8BE9EF3
+            stream[192..255] = 6B1966D3EE460999FF09001B0ADEC484
+                               0D22CDDFF39EB0E3D5FDF74C6E7B3394
+                               A0A4271D780DE6DEE9AC58B4903EEDD2
+                               6DD14E14A4DFE506748D5DCA6DDF4C5A
+            stream[256..319] = E79D99119996FBB5163335E2F79F0502
+                               7AEA5372136E7B3C5BE1F4A673A2DC74
+                               60834B81BE6C4976C4A727C8E6046A64
+                               4CAF42EEA6A068B7E532581E9037BE9F
+            stream[448..511] = 5C4F52E0E94884C829DA1FE88EF34614
+                               9F3EE55A136EFA3B417DB63D2487DF82
+                               794E161B3153DDB2E1E4F385E1A848C7
+                               729FF5CB1CB58D5E73FAB1F2DCEEE5AD
+                  xor-digest = 2F3C231B0228C274255F3BD314ECC7F3
+                               1B9C49177009AFF2CD88F807092D77E3
+                               C74C1B9B8650F581EC7603F4D6E70955
+                               1B00C3192414C04AB0AD8B0B9BCFE988
+
+Set 2, vector#189:
+                         key = BDBDBDBDBDBDBDBDBDBDBDBDBDBDBDBD
+                               BDBDBDBDBDBDBDBDBDBDBDBDBDBDBDBD
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 05AF4F98E9D526CD7912F3E8CAF45410
+                               DED6D4E331633C5621B94E7EBD15E856
+                               04AB202A553EFED55A548C7AFFCD2550
+                               60315FD50A305D8BCAC9C077229D34AC
+            stream[192..255] = 786D24EF3FBFF6883A4ECC4F40E445AF
+                               3CFD130D5B6A9CE37BEBA429AD137A82
+                               44D0586FEB16D086F533D1885A82F73C
+                               F2AD2C645591F80ED09942F0A08D898C
+            stream[256..319] = C214B6AC700164FA66DE346A27A99463
+                               C5B6C0E43A9057384BE168E163058FCB
+                               6E7DEC871C6531EFC8B8D581EF92757E
+                               219294D39E0C9C8276440BE56C3D9941
+            stream[448..511] = 22CF14F5BD70E719AFE76C53E5D611AE
+                               4C8D2171695C9CF97E2936A8BB320670
+                               015825547A508EB43D96F2EE1EE2CB34
+                               4E120F001500F8ACC3E19E30455D09D0
+                  xor-digest = FE5928C74EA21F23E29171E5AAACA20C
+                               DD8571E907763C96B99A8C11F9A1D2F5
+                               78F68A6C440996995F7AB6E69B3CCE33
+                               CF8CE0C16F54355696D47DBF82EA8D56
+
+Set 2, vector#198:
+                         key = C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6
+                               C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 75559677D7C762F6CFED942D800F2FAB
+                               AB5F3892DC2C79922E96FD34FE511C11
+                               251C8EB7C639E531CE08A8C99F62E7BC
+                               F68FBAFF99D62348FF91CCFEC2710055
+            stream[192..255] = 149806A4D862EEA81F0208D927339E5E
+                               C98E9C2A6E0DB85CC0380DED7EC5B8AC
+                               4ADAE76AEB9C7B7264C3834316209615
+                               25221D58C0174577110596FF89C8FC69
+            stream[256..319] = 137E527A0ACB8B96A9FA07890B60B78B
+                               3CDD19BF89B31FF75A814F470BF97E0E
+                               1293B750B769F5BDD750DE5025D7534C
+                               AD541A1F26C6AE9AC2FD3237C156AEBB
+            stream[448..511] = 0958243E88921B81F04AE63658E52D76
+                               CF2638495B3A6B970633A7C8F67B8CF9
+                               AC378082F72FC63BEA02881CC5B28D9D
+                               C8C261C78B2872B5EBFC82336D6E1A28
+                  xor-digest = 0084D7BED4953402FE8F7FF71A28CEC7
+                               0028A08A00EF935C06A8B3632DAD5914
+                               84E44E372A753F8E630741266C0F4218
+                               4923608103042C70ED4ECC5112B9AF6B
+
+Set 2, vector#207:
+                         key = CFCFCFCFCFCFCFCFCFCFCFCFCFCFCFCF
+                               CFCFCFCFCFCFCFCFCFCFCFCFCFCFCFCF
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0C46BF67A3DBA5DCCF8E4A7A65B6FE28
+                               98C701CBF5E88F1F3DCB6B873E5CAEEF
+                               23024ADA678E1A2CA9E25AA8B476CF4F
+                               9FCBC297FF03A9B94A5A736274EA776C
+            stream[192..255] = 73B9891D1770289A67D6338909FB6282
+                               9A425B7947FC30DC52B11E398E85B1EB
+                               537E1C02898FEBFC15A9172C254CA55A
+                               AA1B56EA856F47E37E2F252D92D94ED8
+            stream[256..319] = 6522D372F90F2DAC155D48F165B6DFA4
+                               38B63B9F436FE00CC075C585297B8F90
+                               E6062358D29641FF9C28EED4A23FC53A
+                               6B5C60C2AF1E8146DB27CCF5F43BA838
+            stream[448..511] = 642541A9733946827D79BBD815C03C17
+                               6357BD6E81E9A61FFFD4A0BF6863AC71
+                               72AEFB92C1F235641BBE1457B724A6AA
+                               AF9FAC687552A778B034C4A4F8E41ADE
+                  xor-digest = 9DDBC1E7D31379D027B4F3DFD72C3668
+                               BD0BC5A97655978E79056B3D25DF3E79
+                               5D5D8BE5D1AAE877F2E7D03225CB6609
+                               6EFE11CBCB728039A243E326437CE73B
+
+Set 2, vector#216:
+                         key = D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8
+                               D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DBD4E866F4E24E7F66816CAF625BD07F
+                               1F7BDFBB81428FFEE9FBE14DF5F5F3D8
+                               A044EF53A868D989E16165A0F2B95E8D
+                               83439BB4805A125AD0CA7994AE11B852
+            stream[192..255] = 7CACC4E7B9B1957ABB22ECB9D9D67184
+                               EE7A7F4B822A1C955A69E238022AA313
+                               276C2003E27AEF1B4F94B33A6428685B
+                               F048B357EAB297B7DD98E612F054A317
+            stream[256..319] = 286B484FA80A45EE4D5300DFBE173E8C
+                               978B976BE1B6CB0D15C0324D6B70D265
+                               385B615B3EA97A55D94C47F53FF40861
+                               4460857AC9568556AE54A52546B41B5A
+            stream[448..511] = B3AD999394343F6F0BDDD0B1FAE2E3A6
+                               5BE2BF56D2B78A401D5761E2F3AF8B18
+                               A2B1089864999D9B99E5BF6959F8F802
+                               975FBF204D6159CF23F3706CAF0D9BA5
+                  xor-digest = 0957D6887501D4360C430614B67D99B5
+                               32849E2F5C69CE8A9F3F707A2B5438BD
+                               0C1237B5617FB525CC9C043A10DBB265
+                               3C3F0A353E89A19838B8F68542E09526
+
+Set 2, vector#225:
+                         key = E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1
+                               E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A6DF8DEE1EF7D1AF773AA3E9651B645A
+                               50CF101BF065F69F3E78BEF5D689B1D1
+                               D306FF41EB3E78BEB75C4200937CFE60
+                               E89E370680C519B2F64E23516ADF8062
+            stream[192..255] = AA30580A210B87727BE17EC52AAAD037
+                               3E0DD11FBFC89B37825CA4D6F9E8D433
+                               E3EA54C37D678B58CE834AFA310F6D4D
+                               06B4603F12DBF38595AC76511D0B13CF
+            stream[256..319] = 5F3E1A55116CB67BC91C8E37182EEEEC
+                               8FC9B09DAA6F418D3434BFBBFF6BFFFB
+                               F93F8A963F2F51CC487BE868F010EC0B
+                               EE17A480542A301E33B36F59BEE13D91
+            stream[448..511] = 672048756C221C12DA6178BE711B3371
+                               525A92BC9A219CABC5501B0DA4CC248B
+                               8742E8BCBD6F5A1CFE522F3DF3BED6B6
+                               5D60D1AC737ADC582C2CB9751521828B
+                  xor-digest = E7CA739E4DE0E74274E491CAA9BF5CAB
+                               3F418EBEB69509D69B2594E964759D15
+                               104F674CD44681AFECC3B4939CA0A0C9
+                               DD7AA5726653ED3FBFC833DDB0C87B42
+
+Set 2, vector#234:
+                         key = EAEAEAEAEAEAEAEAEAEAEAEAEAEAEAEA
+                               EAEAEAEAEAEAEAEAEAEAEAEAEAEAEAEA
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 2479A8F2872A813D16D15F060D300237
+                               25297B812F6F3B97D74D9716E4403A5A
+                               684D2BFD1E15275470FEDADF1578277E
+                               44C6C06B8A5FCE3D0CCC5E13BF49947C
+            stream[192..255] = DB2F9B25F9523FF5C2CCCB808EFE07F3
+                               132D4B0065A563288F848E05EB45E48B
+                               D15C069C02F90B4FC10AEBF1AF4BF90E
+                               2CF7F48C8CD7A8091014131EBC21FBE8
+            stream[256..319] = 84FAF79797E25BF2CFD54E58F5C7AC1C
+                               EC170B064429EB832924CDA9C47B5174
+                               9BFEF80D96FAE36DDA65659FEA1CC06B
+                               4EA3A1601A3304AA4DDBEB62381FD4DB
+            stream[448..511] = 2C8FC8D23E7DBBC37BB0811D1BC71145
+                               BFBCDBAE19F5281CD0E6AA37419778DA
+                               64DDF68726DD7F4D78BBBFF4576C2AAD
+                               93F477A2AB2C3CA8A381F30BB944C7B0
+                  xor-digest = A6D5F0DDFC0A43491D6D0A17C095C070
+                               9EC7E9B89DB8EEA11045ACC5FF003DC9
+                               CD3318BB6F9675EEF20E15490F525066
+                               AF8380C663B60EDBAE30663C94C39892
+
+Set 2, vector#243:
+                         key = F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3
+                               F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CC3701E703946194401D1BA23AD99B5D
+                               F3F856138E142D4B9C23DC9F252A277B
+                               D62DAA33A71A0C61079AD5A20562291A
+                               B6EC92C66D7BE6A17E27D4DDB48EFD31
+            stream[192..255] = D00665FC0A4ACC78758EF25B0B0D6903
+                               D565423614409AD11E821B83F5B35D83
+                               F26F3EF9EC1766FEA9C21C09E0AE248F
+                               4BA01E48BCE09D06471593B3466703DD
+            stream[256..319] = E8B4EEE2C8BBEDBA758C1C2D0889FDDF
+                               96CDC215EF1A62FAA29A5608C852FFA1
+                               18B473C5A7319446F3ED2E8AB39A533D
+                               714325D1B14E838C9EC6E037DB0DD93C
+            stream[448..511] = 4FF3B43841B17A279002EFB07324625B
+                               7E937D480DC73F12836195110ECB4DB5
+                               CD31CA4F92F612A95E82815328DA7D5E
+                               4DCC5BB6791603EDA64C57B5A5AAA04C
+                  xor-digest = 9202B874C48D4B1A9E857E645EE8F884
+                               D971CE97923AC024ABEFB944E34550CE
+                               31712BB832F9174F86FCD369E75CA9AD
+                               85095F43A4B7F33AB641BD6912D2C59C
+
+Set 2, vector#252:
+                         key = FCFCFCFCFCFCFCFCFCFCFCFCFCFCFCFC
+                               FCFCFCFCFCFCFCFCFCFCFCFCFCFCFCFC
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F374DA745A5CF93A567027609E5D3B1D
+                               5C3C8A4D15203705D978AD42279F6548
+                               51FF713F5120CC93D044EF717F5A75E4
+                               98DBEF559E5F157A8C819E213E93B3F4
+            stream[192..255] = B270F638AAB88DFF69D724F79B70CEC9
+                               175AEAA99D55485954B265B5CAB86509
+                               C810E664766A8E6C90D4BEE3A58B1815
+                               9076959FFFA2F30EEB12343E9E7778C5
+            stream[256..319] = B2CC84A1127B5333B30EC81CC14307FC
+                               418DA96336991A27DADA74FDA987B867
+                               B125C53C0E4E2889FDFEFBFB48797A22
+                               2836B2EA42793CE2BFFD568F6234B368
+            stream[448..511] = B70F4A10A1B75D499E8189C8B92AFB36
+                               4CD2D730DC8D7E183EC55A777C2445EB
+                               BA7E9CD95C8F3A206B73C422AC2E2C08
+                               15A8C6FED156FFF93B63DE512EF69725
+                  xor-digest = 467EDA43B849054EE747A532ED0D9AA4
+                               6EA1BF2B6AF19F481D6E3D55EBAA96FC
+                               6629FE65B5EC4B5EB6A155A6D60FEA32
+                               F04F8230E26390F1C8FA53D47B68FEAE
+
+Test vectors -- set 3
+=====================
+
+Set 3, vector#  0:
+                         key = 000102030405060708090A0B0C0D0E0F
+                               101112131415161718191A1B1C1D1E1F
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 7CB997D6E1B46DD7C0A9629B441C3771
+                               14D6C18F230291FA7EF0B039AEDCC9AA
+                               A4AE05BA13F3931E3F8373AA320A8BCF
+                               28E825B2084D0FA486BE52C92C3C6F14
+            stream[192..255] = FD4DC85E176D76062323B2F5B31E219B
+                               786596F3DC0A2AFD31AB48C5F911605D
+                               556399114B0779F43221FE5BDA899627
+                               BA6498C210D5AEC5FEC8733357571F77
+            stream[256..319] = F00E84A92BEA966DC8359FA63B12E8E4
+                               F5611F6C8CDD04CE9D605D770B2EAE49
+                               D6976272057CF275EB5B4CC434EA9B0B
+                               8CD9FEA22D7E919097CBB36C5D239BE6
+            stream[448..511] = 110560BCF38CC42478036CC228E9DBD7
+                               4C44863DAFC81B528AEA2893FDBAC7BB
+                               2F68CCDF566E1602623EC9AE283EA69C
+                               C032E90E409F368E28401AE6905BD4F8
+                  xor-digest = 9CCCCDF3F7D712D6E3931068138F9A9F
+                               8640478BEDFC3C7CD0802954234DD07F
+                               99F4B072D9847DEC2E16FAD0ACCB3609
+                               16243175C84A317191A98AFF5EFCEED2
+
+Set 3, vector#  9:
+                         key = 090A0B0C0D0E0F101112131415161718
+                               191A1B1C1D1E1F202122232425262728
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0889D6D9E155FC208941B945F2B15362
+                               3CE5C79122C1085FC172836FA9B06C0B
+                               50910CACF399EFC9CD9CC484786AAC8B
+                               377972E9A90D7EDD40A59FE1B942710A
+            stream[192..255] = A540BDE9860D8687A45D8CF22E00299A
+                               36BE590AC92E70BA03B8A5F2898C2D1A
+                               B9B1E5C87C4B10C9B6E08EB868AE3B10
+                               3BB95C30831B903A3A9620ED16B96210
+            stream[256..319] = 90E2A684D3960A4B1DA5DF19BF569288
+                               5A23892F2003AF2319FED9C8D37B8702
+                               7E61290E013FDF93683829DB99C177F0
+                               222EDD6A0FE3D5F7F903D3CC15C6C6DF
+            stream[448..511] = AFE7454BF77E3CE1050ABFC2E25F9B15
+                               011F33B93660EA4AB5E7BFC513F2D787
+                               27F8008ABC1E14B06C36F7750AE88C1D
+                               7AA2F6EB9F2E925CD6CBDEC5FBA3EEA8
+                  xor-digest = F1A8C58EA8459686DC5BFA2A81E80653
+                               EF6141903898D1A3C7298358A79D674B
+                               A971C106CAB035722F246D3E67D34543
+                               3E71DD374DAF73036EE55E6C0ECE5FA3
+
+Set 3, vector# 18:
+                         key = 12131415161718191A1B1C1D1E1F2021
+                               22232425262728292A2B2C2D2E2F3031
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = EB11D29C989FB09961A673D8412360B4
+                               F4E6DF0169A3CE207656A7C72D6FB8D0
+                               95CB3A7A6CECDC2E167CD35F62A00110
+                               EF09FD32B61A8B405A3F55A1313F0DFC
+            stream[192..255] = 8ED27EA005A3E298560C829380D4F1E9
+                               F0C7FD5285F04AE6FD66C94CC07C8C51
+                               EE8163B7414A52B0594C5F7F80104D95
+                               0858C9A52F3C156ADAA025C00B180429
+            stream[256..319] = 12DA63247282599F2C50B172CDB4F31B
+                               20952134800FB8BCE743BBA90E6485BA
+                               057A9C5E0989A8FDCEF1C88DD54E920F
+                               7028EB284306FE6A87B0FE063DAB9557
+            stream[448..511] = CD447E9F58BAFB77F6E02AB5A692120D
+                               EC4F7BD597DE5C54523A7944DBA6A3C8
+                               D00000D3E70F7D9292B7135A7F054812
+                               4B98680DEF6631D2D10E0E7B08F188BB
+                  xor-digest = 6EF765CB84937D5E829A1A1664EBD23C
+                               B474FEA3C5AB137F2D9B35BBE0816EDD
+                               B26EC14D74EFD0F9768C521A6FAAF122
+                               B5E34A36344FF0F0DB3CC2F2780D05E8
+
+Set 3, vector# 27:
+                         key = 1B1C1D1E1F202122232425262728292A
+                               2B2C2D2E2F303132333435363738393A
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A71D4189D1338531D3C03D00A480C8B8
+                               49C779B7E113FD8D59516164C161EAE3
+                               AEBF74542FFFDC2FF8C2666FD5AAE413
+                               19072673F958F498F8FB9743BE46863B
+            stream[192..255] = B0B3803396AFF1646369B6FAE62EDBCE
+                               5254E7C8FEE88F9EEE5D8A7B6D44ADC8
+                               B89895198E3C147FAE0C9B8325EB3501
+                               6EADF77C5D7F402CF3168448D2A59E23
+            stream[256..319] = C1CCE6956C8257947C004528F568E3CA
+                               BE9ABF891E2FC2B52D9A1E6EC97A22B1
+                               FFD1C77E50A17CB47014C9EDA1853AFC
+                               11526F6268102780ACB3E0F120398AD0
+            stream[448..511] = 765857312C8994EF6BC7259673F02E38
+                               B7E0A764FB70534190033FB1BA86D5BA
+                               3BC6851DB596970A2F60831EA1A31CAA
+                               96085680CBCFADD9C5F0330CB72AB5E2
+                  xor-digest = 30EF19DE0E750BBF6AB3FC924742CDCF
+                               62B2FE5F25983BB9777C727679CAA39B
+                               1280AB468051463E7EB287AEEFA5AD0B
+                               9C9DFCA45A3124D5F41F4B0AF5849E62
+
+Set 3, vector# 36:
+                         key = 2425262728292A2B2C2D2E2F30313233
+                               3435363738393A3B3C3D3E3F40414243
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 2B9B987B7CADACD2FA50A53A9F9F44CF
+                               4ED11B3E25FE57F1372C6D570B470AFF
+                               5FCF3BEB89D0692D873EFEBD26EAF3E1
+                               1B6892913F0CB27F3CA9BA20AF7A98F8
+            stream[192..255] = 0148F54B1D24F3D69A2086D6938898F5
+                               25BDB1B1F78C5F92BA21FCE803A52591
+                               FCEC9A1AFB0FB3B081CDB1D79D254845
+                               40EB9D624B5E113A4F143716722687ED
+            stream[256..319] = 271FF1107AA8968E0ADDA5371F40224A
+                               D8E134AF80D5ACDC9803B1B3A9819BF4
+                               8ECC3A68B303E1275FA97222F7E984EF
+                               9C73899433230FD746DA6101DE37ADA2
+            stream[448..511] = A66D3BB64C35C71BBAA3F5410F388253
+                               2B32897B1CC1AD610F3AA195CDC1EB82
+                               0262E817374384BFBE200339B284ADF4
+                               BFF6960B6A41AFA9D7C9B67B19C14C37
+                  xor-digest = 3CF10A4A8BA3E0DA3C0B63F1B913B57F
+                               BE47580DF7D90B13459A9BC98B93B014
+                               1185E910EDC0A5B37206542B17CAB8CE
+                               F050A4ED3D7097B6A0738095E4BF7A77
+
+Set 3, vector# 45:
+                         key = 2D2E2F303132333435363738393A3B3C
+                               3D3E3F404142434445464748494A4B4C
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = F32665A4C73608E133D85712D2CC9A76
+                               6D2B83311B3F44564A56A97ACC9B6492
+                               B282A2E62A435A7B7799073E010C78C9
+                               4B7B5BD1B25994D1CE31B51CBB13BE90
+            stream[192..255] = C9F24592930A0A9148486D77C1FFAAA4
+                               4E4EECB088D6AD38D73B195E576BEE56
+                               E2CDA968FEB85D19BF89391813501B02
+                               EAB39A2E78B8CC7456EE60EAC3454051
+            stream[256..319] = D8E1D09F074708379189BBFEB1E24053
+                               E0BB5980FFD0371265320C3047F0ED36
+                               A65CA8D0DDF20DC25B552E1882811C77
+                               6613DBB4297DC6C89E31529DFCD17C82
+            stream[448..511] = 8012813E7879B3E99C40821A97469BF3
+                               9D2EF3B888E3118275F47F8C78A5F7CA
+                               19A98B1817D2D7734E69C5ED43773D68
+                               FA100E2C37F40FF8E018DBA52C5C239C
+                  xor-digest = 8AFB9CD876AF4F9693FF4FF511D89957
+                               C8BB31D9DE3F21B726667681F805FFF0
+                               4B50850696D6C2E5C271D199CF49F1E6
+                               D366C7824273E99360BD5A294E415F0F
+
+Set 3, vector# 54:
+                         key = 363738393A3B3C3D3E3F404142434445
+                               464748494A4B4C4D4E4F505152535455
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = C72B0F98EE5C2D44260E929C70DBF174
+                               02C03543483178C8BC129D67FE2746E2
+                               E881F8439E2A11EBB3716ADB16207BBB
+                               91454A71C444445CE64003F0BB1F481D
+            stream[192..255] = 5590F4278E78AD19293525095C2F76E3
+                               B35A3858CB5912B62304180225BDC985
+                               ED955521436DEC441B9C742B3C5F4CBE
+                               94B99689048AF93E48472980D058807F
+            stream[256..319] = FBAB34E9F432546EC8C52750DA4D2278
+                               4C1323D4E3F4E9B63E65A7E3C8B2637B
+                               AA5D0A3B897113F68C63CCB78B5AB40D
+                               0A0DC3EF1EB09DF5C4770B343B6B5155
+            stream[448..511] = 78B0144CDF2692F0D0F164ECC8621F5D
+                               A00C401007B82AAE7753712FD6185E9D
+                               7ADC8CFEA6D5BBC2F3EDB8BF2C77718B
+                               6A424BAFD30C30934FC645FF05704BB1
+                  xor-digest = 835B5361A9C1F88223DE7BCA09030CD4
+                               67065AAE99198645029CC0AB9B9BD579
+                               14332392ED7A433A64D95B44CE228860
+                               7E029235580276BCAE88F37418FB641C
+
+Set 3, vector# 63:
+                         key = 3F404142434445464748494A4B4C4D4E
+                               4F505152535455565758595A5B5C5D5E
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 804025A410EFFBA58647A9F4B443BFC6
+                               1CDDC30CA04DA8DAB3EC6A098A830D68
+                               2683B59B76C60C09938E67CB41385315
+                               E2504B024DB808923B0909EFC25F0927
+            stream[192..255] = 7A4661190129E3F349DA7B44DAAFC388
+                               5E4BEEAC9308844DDA45E8E06637246A
+                               0E6C8C7D94C5F710CB78CC6E0CA82870
+                               8CA77B6266B41E3ED6BAA2940F1977A5
+            stream[256..319] = A3EBC22126B6069C674DB604F8C22B54
+                               DA68FB4390617E86C4FF089344BD0DB3
+                               887B3438E8EF8207FD89B2A485C0B383
+                               22AEB69750AD054F843DCA7995BB58A9
+            stream[448..511] = BAC68211F125B57B8CE5E42E644997F5
+                               2FD4B8A7D5CBF89ED2F6B5F4D4C7FA5D
+                               0CC34212160C6BA536BB7604C184367F
+                               2E088528F3B3A0A1B20F9249711162B1
+                  xor-digest = F628E74D1EB94591694631F1B2F12234
+                               38B056789D5C2ABD8CF34D9FA7B8C304
+                               5A8C2298B7BEBB90C7CC86895693118B
+                               2A43B7E8AC7E534DA7965EA720F19180
+
+Set 3, vector# 72:
+                         key = 48494A4B4C4D4E4F5051525354555657
+                               58595A5B5C5D5E5F6061626364656667
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 40409D9AD4CFCEAEB8FF613D32B59180
+                               F5DFBBF44C1B7209AD1AD5AE94DBBF3A
+                               83EAB34D2617ABCC396880BD5F5D220F
+                               F434DD575E66CA74BA32862293113C5D
+            stream[192..255] = 42D9EDDAF89B93DAB4AA790BC9C45BAC
+                               5E94575E175C2EB1CC08BB39019E25C0
+                               9B0F4F435ACE371BD9235C61C56A362C
+                               B1A64EE58F4938D59073C5A8A1BA679A
+            stream[256..319] = E40477D1B6C901AFCC4A2C429845C7B9
+                               0DF890C317A5B9D6368672C58E0BD5B2
+                               7E42DA77BDC2BF47F9AD195F7C192B53
+                               24FEF88E6B3DD1669A068E3FCB58B203
+            stream[448..511] = 7616AA094DFFD4BCF94E03C9CCF95C31
+                               8F247AEBDE281334F8E6F46271070BC0
+                               1AC838D8FCFE18865DD30949C68052C8
+                               6E93815B4EA9480B2D0B6A5D9888E597
+                  xor-digest = 1FE60024F188CC243F7D8221D990ECE3
+                               29E89847C9BD60AF23061E9C27C4908F
+                               B00D8813E680F00665658CEB077BEFAB
+                               5DEB41D3547DD645DEDBB3BF5D7B651E
+
+Set 3, vector# 81:
+                         key = 5152535455565758595A5B5C5D5E5F60
+                               6162636465666768696A6B6C6D6E6F70
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 1B8DA47812BF2353C17C89AAA8695E9F
+                               F553BBA44087D262FA0C710B69765F12
+                               FFE190625F58DA899B56FA7AB5E0E674
+                               4CA2B073517B9577712D7155E16A874C
+            stream[192..255] = CD2BB4A6C3D7211773421014611B677C
+                               C0A8107544ABF4F914F825891E52DDDD
+                               76EFDBEE614573FF9674EBC154A3283B
+                               439ED8197E1EE0705955A8B6C8AFF8BD
+            stream[256..319] = A626C40CD2C48AAB016C29020096DE28
+                               F03842E785BCE9D9E385D0B13B63F82D
+                               789588FFAB07B8CC0FFC62AA86D37CAE
+                               5CF8FD43B575F9F4D6E07465B700D47B
+            stream[448..511] = 16A3C84858207E141022D228079D6067
+                               2784EBB56E3B84F7DF07EFC69060E27C
+                               D1311E51F5893AE6BFF80D34464DC60F
+                               61985F8F88164CCA69EFAE568BEB546F
+                  xor-digest = A24EEDA74185884C5B287663C3F5F031
+                               2743CCAC657C702A29E0C20BDDE304AE
+                               A54A9292B447039D50479B6CE475115B
+                               8791854540E15D642859D10561AEF26A
+
+Set 3, vector# 90:
+                         key = 5A5B5C5D5E5F60616263646566676869
+                               6A6B6C6D6E6F70717273747576777879
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3F7261A3A4691A73441762D113EB7817
+                               4C515A96C5C93C514EE559E7F78A633A
+                               01F0891910D44A7EBB18768E3B912488
+                               6069CB5304E79ACA89F62EFEC4EAC11A
+            stream[192..255] = 5F11904F72123CE29D1D883AE5CD2A89
+                               2AB26C9167A24A57D6F64BDE3A8E1A93
+                               7C5347C585226DB44B6252AEBF3CCAAF
+                               2D5E60C56FBBA6068B35AA6A61C84A44
+            stream[256..319] = CD6C5B784854E0121933E77C700D9C1D
+                               7452999F859798499A339F78FCF84615
+                               A3190A2F558CC529E636922A1B75A3A1
+                               AF280FB3F486303093DC1564EA0B6D3F
+            stream[448..511] = 61B8163A84540727204F0B18D9CAED3F
+                               B5FA87089FF4E721D2EC34D21C59B93F
+                               95297725780DF04A5FE405FEBAE80AB9
+                               B8307B9A74774E76063F9218CE243002
+                  xor-digest = 944EF8435F32FF2A67CDA5FBDFE02C81
+                               0997D9C8192633A193D6122A051B801C
+                               15555BDF410917B9E5DB86F4DE8B9874
+                               3E9F92F903543AD14087F4E13A915DE0
+
+Set 3, vector# 99:
+                         key = 636465666768696A6B6C6D6E6F707172
+                               737475767778797A7B7C7D7E7F808182
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 71BA7454CF7F6CC93C89EB22B9D608EA
+                               0FACBB4358DD007421DAC1E65EE99161
+                               C542DF02611AF497B2D53748D0129C0F
+                               5B9704C8A6017507EEFB26B6287662CB
+            stream[192..255] = 92D5D35B2E02D204E68C1AD6C018DBA6
+                               7A1C90F563AEFC3D031FD3F7D4F5E2F4
+                               C47D326A9C49A0B2ADF03D9E7E429AA3
+                               ABF253E623BFB9EB040B5F5CF1FF68DF
+            stream[256..319] = D6C22BEA96DF94CE9D5D34E6231CE4F9
+                               A2D2F6097540F9A9160DE139E2E80D0E
+                               5AFE08131FE10F0DD7367E43D314D7F2
+                               2321B5F89DC64F286576BA599A58F48C
+            stream[448..511] = 43DC3ACAE02DBF68AB5B65A81630474C
+                               639FC4DD36FBED518B6471F7C3E70FDE
+                               23CF1E128B51538DE0D5A47F20A554F2
+                               09668FE28B0C4884888FAC438960CE7F
+                  xor-digest = 7B0EF650F3847E3EB15EA1CB64EE7189
+                               AA5B04F527661C00F4603E48CBE59F7F
+                               48498D80F6C5ED956ABBF97E6910EFB8
+                               341C7BC2E81E66A4B9474BE420DFA5A6
+
+Set 3, vector#108:
+                         key = 6C6D6E6F707172737475767778797A7B
+                               7C7D7E7F808182838485868788898A8B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3C4CBA573D803324D099BE1F436F944F
+                               EE506CE77EBC01FAF0060B76FA5D2005
+                               05CE94AA15F3C4B1E0194264CF13878E
+                               FD36288EA4C2ECBEEB76828EB460AED7
+            stream[192..255] = FFA464FA648309E295314DEF7169DC60
+                               F63C90AEE9F27B534E11D25AEC454823
+                               DF6BD39C1F9CB46276C630C129536506
+                               187251D638D3867E96A84BD570F78461
+            stream[256..319] = 6BE88BD0D2257CF7EBF7100B442F68C1
+                               ACB94B6F8991C1461D318BB80E59A6EB
+                               8009DFF46B8E339A0CD4FB285ED1E433
+                               5FDBD65537D9CF1FBB0F9F10E17952D0
+            stream[448..511] = 909997D084DE4F6C910D57DB89E1EB56
+                               AB3F9974E3DB5935D59917CACCAA31CC
+                               E009324E52334BDD6CA971AF49982122
+                               B195229DF0BFE2C508E981D303061B2A
+                  xor-digest = 8B2B49D564662BFB29A9F4E1A3DC7664
+                               774D41168EA27505A2A518DD94C2A507
+                               0D28E1E69DA2F084DAB024E8EE2D022D
+                               BC73071B8559BE2FCBC2AE3605696482
+
+Set 3, vector#117:
+                         key = 75767778797A7B7C7D7E7F8081828384
+                               85868788898A8B8C8D8E8F9091929394
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 6EE8B7E51036B951205064348C222881
+                               624E9FF59DFED40AC6CDEA0945A39E72
+                               AD05FA929F7AB69BE8234567734F8F96
+                               D74DE6038A463BD8FB86224F5CEA0D45
+            stream[192..255] = DD9CD1757A95E616E99590E76620E9DF
+                               0BF811F73B70C5CE982FC9CECEFFC6BA
+                               F7DCA30517A9BDF44515262ACF297AA2
+                               2CAC3F216C12A9D0D6912578DC672D18
+            stream[256..319] = 0B7DE245062DCC9B1D8A945CD9A04938
+                               EB9BB258B4B7BCC263487B3599B1C6BE
+                               7FDE752D65345F00DF90896DF53244A5
+                               AB111134B36A99E2D2200B4D2003A520
+            stream[448..511] = 2566E8427BBAC7F0A35C6E4BCDD326C9
+                               D7164A9E1F767038A09A75B5076E05AD
+                               C51F008E9E3184FA4DC6E4764B381944
+                               BCB96B57FCE2339A01501BDEED46F8E3
+                  xor-digest = CC16803D36710AFDB1DEBC653DA7DD12
+                               F45B02349B87C3006DDCAC1635956846
+                               E4D7D6064D19012724BBF836A7DB7A3E
+                               3C12E6288F546EF316406D9C5E844BAC
+
+Set 3, vector#126:
+                         key = 7E7F808182838485868788898A8B8C8D
+                               8E8F909192939495969798999A9B9C9D
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 4F4169DF51C9865A20D7E79DEFF7B121
+                               BD61F4C79AFEDD0598F55E9D9A3615AD
+                               19292095DDD83904B3683722A3337BF3
+                               4E98F63EB19927155E176F2E8D5560B3
+            stream[192..255] = CF82F8F2A46A898915B3E371BE941811
+                               682A8A0A20837AF471B5CAA4B4FB01E7
+                               F2B0CA9ED3BA70BE305587F1ED995946
+                               223032F94BB2ED7D418C95F202887E6B
+            stream[256..319] = 219C121E08F7458BD657AC4131221C78
+                               43DB5817B17344922C54A002F3F67574
+                               BEE5F7FFC7EFC5615444B51FDDEE8B71
+                               981FBFF658D2504BB53C13D0342258E4
+            stream[448..511] = 55C2A93F43F260EABBC1A173AAF80A95
+                               A7EA74CCEF6E29C52957AB2247126336
+                               CEA5BD0D08F873AAF733B3A11885F04C
+                               58542B4C8ED3E1BB7F7918C4E92926FB
+                  xor-digest = F69FE6EFBB4A6E65B517445069859EAC
+                               A9C19FCB9C1771E75266E5B4C39019DB
+                               E959AD97F2B8D7F1688FD0AC04AA7C2E
+                               602F28A63DEAA49A7BE1422B47CFBE00
+
+Set 3, vector#135:
+                         key = 8788898A8B8C8D8E8F90919293949596
+                               9798999A9B9C9D9E9FA0A1A2A3A4A5A6
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 3305344A71266B450B2CDEB049A048D2
+                               6171B39A88C25CFC0821E4F4EFE378B0
+                               702DA31652B5E1BAD9FF4C19C20BF329
+                               639D5942DD2209DB1D1474B6A7B41B76
+            stream[192..255] = BBD9714BF2C343B11DD7943DD8CDA8B4
+                               C6A913F1DBE21A0582B3FCFDE91B61A9
+                               8863AAC17D07D8F98AE8E71BA5636251
+                               49FAB3EA775D3C7735BFC732C3C42571
+            stream[256..319] = 473F161607321838FEB9359B0006068F
+                               9D88B1A073DA14E60AAF1501F3A27350
+                               53E3FCC794893257CC3C1D4E1E3CF609
+                               975E865CA46C892823C838822AF0CD2B
+            stream[448..511] = 89F37A53F18778084307D0BB71E5712D
+                               32F0F3B7C2201D01D892F6BF6068E4B5
+                               394995CE6BFACF08587ADA39CC647DAB
+                               9B12F5505055F372FDC4607F0355DBAF
+                  xor-digest = C9E7E4A4D6782C02AAC4F47AF1D142AF
+                               FAE569B755E880C6B8A5773EFC0E63D2
+                               3D7A113738CDB1A0544175861401149C
+                               753D723CC1EF515A9323DDE4B4A765C8
+
+Set 3, vector#144:
+                         key = 909192939495969798999A9B9C9D9E9F
+                               A0A1A2A3A4A5A6A7A8A9AAABACADAEAF
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = B7954C45CF301CCAED3F1E7E77DCE45F
+                               2D41B3B1C1F28F0308B8AB4293B64A60
+                               AA7936DDF062613DC1C454033D2A40A5
+                               E99BD975A26185A7F419E7B337028FAC
+            stream[192..255] = 27AF957AC6C514514C24664AA0C9C23D
+                               B1EE30950177389876FE4FF2E1739912
+                               A09E20A2098751049C8925334960A324
+                               5ABB50F3D333587B67F153DB145B5F6C
+            stream[256..319] = D94FAF9FCB753E992B898178373A36D6
+                               23C6BE2420AC2EA848130073F086164C
+                               9B4E69B024991FFA8FAE94E3C2FB16F9
+                               D747320A748DE9FAE4FE9E6A7E7D5659
+            stream[448..511] = F664AFD3EDC0FAE88016C8A028E98D34
+                               A27843372C6BF8F51C7B49B94A11274A
+                               6A161D776E6C1FF05358F28426C3579E
+                               053B4137F8C4CAE07B994B80DA06DA27
+                  xor-digest = 521594487B583F5F71DA10E2316187F2
+                               2A4885A69D522F82F7FD0D5F93F69B2A
+                               060EB60965AC010BC489B401F02C26E4
+                               FE3F82B83C964B4DB4E0E6BC2CE4B865
+
+Set 3, vector#153:
+                         key = 999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8
+                               A9AAABACADAEAFB0B1B2B3B4B5B6B7B8
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = A5E320FF65811FF5E8934F3AC73B3733
+                               77D3AC52446F64646946BFB8F6DEFE3A
+                               04E859DCCD9F421D2DF541F588B9C204
+                               A9846C7AA1C017D637D7C5E244602105
+            stream[192..255] = BB16A9BDCA0D4BCA589A34F9278AE55D
+                               6A7711EC87563C9F394638041CBB0E40
+                               4CD2149218D501D3B62421CBF81C6576
+                               FA659C2878839FCD6C8DD1BA38F46E6B
+            stream[256..319] = 58B4004C53EE64CD45BC4A1F11F700AF
+                               0EA5ED86C4BBC145C8F588B7F708427C
+                               D2292D76329E4DB1F289DADA687B7784
+                               DABCCD29B8C464CE021856FD06554F76
+            stream[448..511] = 1113D37AB2964AAE6586AEE1B060F0C1
+                               02EB3AF048A59CB709792C9080183CFD
+                               2A1A47277F413F1219B5AAD7C8BC8079
+                               246BD1D6F98C11997E4ED0F68E165D9C
+                  xor-digest = 512F4852425DBF91234DA31986732CC3
+                               1F9649A1965E22E18CF38979EE6D92B0
+                               83333422A92F841C25F827782FD7BDB2
+                               8F4B40AD5EE53C37192651A86F03A17E
+
+Set 3, vector#162:
+                         key = A2A3A4A5A6A7A8A9AAABACADAEAFB0B1
+                               B2B3B4B5B6B7B8B9BABBBCBDBEBFC0C1
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 96328CAA099502092359F397972568F8
+                               EE2FF1C4305EA06FFD8CC125CB10BE85
+                               65EA30B621437AD4CF9CE731185720F2
+                               0CFE17DD45E6361A8212EECB346D391F
+            stream[192..255] = 74F26B7A37D673DA0B78B38938C5C1EA
+                               2AC666612468F63B540EE7B17548F8BF
+                               60A9845BECCD7222620FDF7BE904FE24
+                               7D2B7EA749C9590133CD6A218F6EF624
+            stream[256..319] = 8F8AA7A4C64C3AEC5E85581C53E3FA64
+                               22CEB927E370C7B0F98F038E7ACF4D05
+                               B54430D91B0A2CDC001BFDDDCD0081AF
+                               35B67E5BEE6B8E113F36E3B23CE29F57
+            stream[448..511] = 53E20B4B90B2DDAB40DC30643AA5F539
+                               70ADB65DD0B64CECF3D3B4C0567DC818
+                               0362FE9CDF920526C59725AE861940A8
+                               A32C35382571F2FF20E7FBC504E1DF9D
+                  xor-digest = 8C7C45F50A151D551E9EC81EDFDD5B2F
+                               E676E14253FF38EBEA12395040643211
+                               3254B0B7298AF77F8F9F4203B971EBC9
+                               B9850152A96C97BD4FA7BE8592670903
+
+Set 3, vector#171:
+                         key = ABACADAEAFB0B1B2B3B4B5B6B7B8B9BA
+                               BBBCBDBEBFC0C1C2C3C4C5C6C7C8C9CA
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E8DBC8E5D18C5BB2B152A6AE9487AF35
+                               E2044F30EE8189659043923E579C70CD
+                               4A5590968600AAB0F021F7AF283D61B4
+                               13C739DCFC22632E1F6CD553D4F21976
+            stream[192..255] = 8675941731B385016430C9A157007EBB
+                               E9BD8BBBEC44081C1F5E73C7E783AE90
+                               1A7F56A20E5DECD1E94E1C92A07CD2B9
+                               91619BC3358AB812D58E0B98EA288D03
+            stream[256..319] = 8D09462E5B1154175513CE7FAE1AAE89
+                               EA2AFDFDF1B39D69FDF60B1954BF81E1
+                               62F29468E07C251E2D174E9CE924A5F4
+                               8A470D1808C68ECE534CC08204C5A2E6
+            stream[448..511] = 60C5FD4C1831F0EFD70EFF86A5D38D96
+                               2C402453561D0021A51F07D40A7D3B8A
+                               DF455CE484E89437DFADC52A52741B80
+                               ED0EFA9AE4FC39659F8300AE9292B9CE
+                  xor-digest = 12E57044A8E7F02EBF6912BB73836FFB
+                               C4A2F47AE1B824AC97C1237B1B14DEFF
+                               12B5B87DF14A8B5B6C85C0481BD69DDB
+                               FD76FA307F4C1F7D21E60C0BCFECD3E5
+
+Set 3, vector#180:
+                         key = B4B5B6B7B8B9BABBBCBDBEBFC0C1C2C3
+                               C4C5C6C7C8C9CACBCCCDCECFD0D1D2D3
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 540980C2A3794C04B93696B90E48999D
+                               ED8E1D3F4720918C80C95B9AC0E911F4
+                               6593C4A920AB291D98891374EF286286
+                               2386B5FE17654278EC413AAFF1C384DC
+            stream[192..255] = F3E036D7620669F851A1B58BCE57B079
+                               F5D75829EDA4E68C36F086CBF2E5DD78
+                               F7F30C1AD9E4CB3C01B7F2FBF53A8AFE
+                               957786B2D3E9CCFE7D6FB24397803BC0
+            stream[256..319] = 1AADB95F07E6268BD82ECF3453DB5014
+                               9745CCEEA9F1887B5F257594ABBFFF43
+                               C3187BD9A9FFBCCACEBD7A21FF90D18B
+                               57FCBAA64B8FECB56D5A7FE05BF03E3E
+            stream[448..511] = 4170D41CAC2A7AA5A3C9228BF386B9C5
+                               57795DB5D1AE547A31C553F55DE02E6E
+                               B69D76A984F4F1D84F29D5CB98190C01
+                               441DEEFABDBFE405F22FFDE734D9497A
+                  xor-digest = CE103B99AA95B51D2D6CC54A15833E34
+                               A11778F5E05BB7AB61505D473228069F
+                               CB40015BCFDD3E1D0D5E1F832791C8DD
+                               3184273D1B4C67D800EF5FF004660440
+
+Set 3, vector#189:
+                         key = BDBEBFC0C1C2C3C4C5C6C7C8C9CACBCC
+                               CDCECFD0D1D2D3D4D5D6D7D8D9DADBDC
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = CA30678AC97B4591E287FF8B5E28A838
+                               611D654A4EC592328039E3A1DFE90FAB
+                               BA5A37133E821E0960520EEC850B6962
+                               B0378E77770681ACC0929D16DD260925
+            stream[192..255] = 79FD1893EBF30CC2CA9C5AE92B0C063D
+                               894EAE4BD50BF462420081D1CAC57A5B
+                               AA92E73D3B3CEA147E1F7127AE1F6FA8
+                               E9B302A068F26157C904E0AA7B7A072F
+            stream[256..319] = 6880FCE56677345CF1CFB2D38F890C15
+                               FE33D377922AE43348F5590B84426EC9
+                               0DC2A3863136790EBB7BD9493D2F0808
+                               CA9287CF95AAF366A11D6E7A556FDB02
+            stream[448..511] = F385299A7038DA8A90058C510727F3E4
+                               524A2D95D217A1C199552753F253D45D
+                               81DA40431910DD54B619A15C5C302411
+                               613D28D53493AD836251F0047FB911DC
+                  xor-digest = F3D10E261AC596959B4AACBCF335D043
+                               FFF65E2651F046D300C19510E1677F1D
+                               45F287DFB8C17055A012C234B6EB04C5
+                               76ED2EDE12DFFE6EBA4A39A64DDC573A
+
+Set 3, vector#198:
+                         key = C6C7C8C9CACBCCCDCECFD0D1D2D3D4D5
+                               D6D7D8D9DADBDCDDDEDFE0E1E2E3E4E5
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = D5EC301FD496586D54D9B21FA23DECB2
+                               B25DCC0784BF77DE84898AF96023647B
+                               F1618234A239F63FBF3478FD6EB79299
+                               66BA9B670C64118444C95D31405873C9
+            stream[192..255] = D455D37F435FD0FDD6E1EDF8BAC28D2E
+                               DAF587F938C49A5F58C32CE8D5B8A4EB
+                               884B016E54277300D461FA21512E7695
+                               D2D7489A4560FC7A72A510219DF1C5C4
+            stream[256..319] = A7B93D8B7787B6C8F80EDCE72D4D644F
+                               0C6400C3AD0443FDD19C3F3675083F4C
+                               E5ED87032B1813DDFF758854C8D889A4
+                               6FDC61C210058DB72D838A0913D80611
+            stream[448..511] = 94232F4284F46DD2E7933F9635C26C48
+                               6CB935031095777F59BDAECC4FDB4109
+                               9037C38C91620586DE93B66EC7376502
+                               6853B7390CA516B694583447DD863310
+                  xor-digest = 8596C088FA66361FD90A2132CE33FD52
+                               34910610DB006D223B0574F21BF1CD4E
+                               C282C67B24AF6DB0DB70BAFF65D5D8D2
+                               1C3955D466EA2B49C5E8EB7E07475919
+
+Set 3, vector#207:
+                         key = CFD0D1D2D3D4D5D6D7D8D9DADBDCDDDE
+                               DFE0E1E2E3E4E5E6E7E8E9EAEBECEDEE
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = DBA2DF9ACC53C3EDBB566C28F689D7AA
+                               EF631CB44EA91610A94685FBD862C9D9
+                               BFCF512BCECF36E035E2E577F6BF6EF9
+                               E4B0E7623E0DB23B10055677C7B9F857
+            stream[192..255] = 8C78C9714577E497E3CDFE3ADE19F03F
+                               D2DAA3211C1E9E5D9F21FD1ED696354A
+                               B7552BFC7FC675FAFE7A739F6E60A839
+                               547F8F15BA5EC6F75BB05606BBF209CC
+            stream[256..319] = B23F187B1BFB5A728BDBD78B75C3265B
+                               B04C6B350A4DA4EB021D6191263F052B
+                               CAE73E5776002FF05DEC3D341AA20D2C
+                               FA523E6B92329A979BE06CF4F848A1B5
+            stream[448..511] = 7E2ADEA91939388D36B3F97DC87C2A86
+                               BDE7BB4884C40D8A202964ECC7440987
+                               1C64B03EAD0F46A3A1CD2CB935DCCD67
+                               0B43292D5B852B7A1B3D1F853EF22EC7
+                  xor-digest = 1AC1E42C2DF9858537D0A1BE3B2AC094
+                               54136E53AE56B006395969C7F999B2E2
+                               DE1DAE62740FF339DFC8769F67AEF352
+                               C4726B4AD4BAAEE56AB8C55FACE34860
+
+Set 3, vector#216:
+                         key = D8D9DADBDCDDDEDFE0E1E2E3E4E5E6E7
+                               E8E9EAEBECEDEEEFF0F1F2F3F4F5F6F7
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = BB00F8ECA9A10D2B137257E86B455DBD
+                               F9A6A861F19533E38C3C9F54195AB803
+                               171D35043FC9C4204AFC9A8E72EDA4CD
+                               60220B2EDDEBD5482D7833979C15B685
+            stream[192..255] = 6CCE94C2BEBFD223AFB7AF1110F0F6C4
+                               01AFC533BABD84F8C4A54E8A239A194B
+                               B56E0CAFDCC59B9B5103471DCEB9F706
+                               7801D79530B7CF40F2DEC73A169C7481
+            stream[256..319] = 5144745E042B76A6B62E78C92FFC1C0E
+                               E59979CE4B2E4B2CAFFDFCC5E75510A9
+                               201E8A97A6A1729E35CA81D8645FC118
+                               177DA5FACA0293B972AC0957C43BB1FD
+            stream[448..511] = DCF9B6116FA5EB9CFDBFC8C97EFD89B5
+                               268C0D529141FC3C8262B8BE38E94973
+                               A21919D498FCC3896B0FB4CEB24D9E2A
+                               F728003C36838638888FFF1D0D526B37
+                  xor-digest = 99EF8A7D0B8D08E976EFBAE56F7CAA91
+                               B1FFC7428EA56B7A697AA3B621AA8DBD
+                               52681C7A9A415049AFB6B7D8AABAD024
+                               0F9C3112092816F4C69D36B1300ED3E6
+
+Set 3, vector#225:
+                         key = E1E2E3E4E5E6E7E8E9EAEBECEDEEEFF0
+                               F1F2F3F4F5F6F7F8F9FAFBFCFDFEFF00
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = E3DAA6E498609DDC5A31BC0B6ACC880B
+                               695097D2CE2D1FD162C7802DC0D00BE3
+                               C0126CF947CEDBA7833421D70A914BD6
+                               C33B0A77BE8BA10879D664F054C29302
+            stream[192..255] = 0015EFCCDC554D042531FD570C6B26D9
+                               059F4F4DA675BCD12C038E4A8D16737B
+                               AAB0D7992340F4EE4324959E96930934
+                               21234D41F56A995C928F82944B46BB19
+            stream[256..319] = 8CE7098F4C64DF2E8A170DA3D02CD99E
+                               0169B99A261D1072FA116ED39244EDBE
+                               73EB9F1CDCF8CCDAA9E94C0DA9C6EDC5
+                               426751AB8300836435BC6F727F793281
+            stream[448..511] = ADF85AF30894BD0207DB4BF72D9DBAC9
+                               144EF6B24E515D96475897EADE40A92C
+                               79B818499B8CC328859561D79D727423
+                               BA81055F3387608E56173AA27D286924
+                  xor-digest = F47ABED85910334919B5868D4531FC15
+                               24D61CB16C23920750C73E2B08A4B5C8
+                               C621482F6D9F01EB59763C5F89AC1514
+                               F6CA4C40216D6385F304E9514B014C02
+
+Set 3, vector#234:
+                         key = EAEBECEDEEEFF0F1F2F3F4F5F6F7F8F9
+                               FAFBFCFDFEFF00010203040506070809
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 4728A29A2F2BD276FDE176CF4A38BE65
+                               B84BDD41F065DAFEA8302334CEF92A5A
+                               306EF904DADFE92E3E975EF9EEC9B3C8
+                               4AFC167545A0CFCCB6B1CA688967D8EE
+            stream[192..255] = 734153A78089B6E6EC0F520D39BC3FAA
+                               E1DBAD30CBDA32395E51E500CE4E118E
+                               23BC8CFDB08D443F1932EDEC52CDF3E2
+                               1D021DB791A56A7C16FDA02912FE744C
+            stream[256..319] = C511914A4BD9B29488B7FB1E62DBF905
+                               01C0D85C5A238448065C188F0A4134CF
+                               6A1FE1DAE57DB8BDF89FBF7FA66F3E32
+                               14CC9658DB292E4562A1761B9EA77570
+            stream[448..511] = 946944DF8E41BD585723CA1C03909E01
+                               783617D9D1129220ADAE7E5487AF4B54
+                               FF6593B37BB77AB0025C28727AE5933E
+                               E3873824E46F2209D26936FC5566B21C
+                  xor-digest = 34E04FBDE6E3DF6EE14BD179226D51B0
+                               1513510665589CB794C0C08391FA5929
+                               37B390E86BB4A72D427F58A1EFE10F6F
+                               D8A14A6F38ADE34331C8AC6AECA5DAB3
+
+Set 3, vector#243:
+                         key = F3F4F5F6F7F8F9FAFBFCFDFEFF000102
+                               030405060708090A0B0C0D0E0F101112
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 2AC7F22D838F68107877E90869F98797
+                               493171C8A5EC2E51D536A1578659DC16
+                               BB2F644C290B0F006BFE3FA0FE0CE917
+                               D32E94643848867B230270F54D0037B5
+            stream[192..255] = D21F7FE6E368989CC75E8D9080579385
+                               E31680302BA8B9B2F56984FD49B01F4A
+                               DD36AE4A28EBE23B5567BF5A539E2621
+                               1AA8588507916CCB572611C352E73E42
+            stream[256..319] = 25823586A7212D44811C75023193864D
+                               85DFA17EB7D5A34BD1CDD3260B5D53A5
+                               56EE2E2A06F84E95CC7323379FB924E9
+                               9E1A3F724F8C480A1F40B2C4A6FCD433
+            stream[448..511] = C1DA25F3B4FBF8B2917103E6274FAE81
+                               A5BF4086A161A7786BBD5A33662E48AD
+                               6EB9A944CCA57C51AE266BAF756EA506
+                               AE077AF0AD8B577A5A02F5563FEBA2DF
+                  xor-digest = 6176BC64072356BDF719676CD2ACF288
+                               CE2DC1272ED9C4685A5CBB7327669724
+                               DC8BB64BEBA04564A7879F7B9AD5A936
+                               C4BC1AA4007A0F85A5B5B945B418BC61
+
+Set 3, vector#252:
+                         key = FCFDFEFF000102030405060708090A0B
+                               0C0D0E0F101112131415161718191A1B
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 0854D9B674256934E204484C6D59668E
+                               1C94891FEAF6E08A92038E41EBA38292
+                               D19FDBF852400123237BD7DA620767D3
+                               43C2FAAEB08A394EFD1E7C1A3776B1A7
+            stream[192..255] = 4BBDDBE675E0F9D7DE0BC1B0E0C64FE4
+                               52F95ADE61D5CF2EB805894B3CC3285E
+                               6C6AAB72DAFF826D945B05FC4D4A6BF9
+                               37B352262AC12B7E6F92D5FBC4ABDA05
+            stream[256..319] = 7BD11CF4273EA16E01154EF9615B88D9
+                               C52535D2F0C7FD394D94AA7EE542B448
+                               9A046F2625011EE75F874641D1C5A709
+                               B7FD1DDDCCB2A6F1A47B65361A9B0D6F
+            stream[448..511] = 0AB902B571D11B5F2F24CDC7616143F8
+                               45E7DF2050B263D7A841DA170E17C00B
+                               4A20221D7ACCDCB0E131108D94D903FD
+                               7E2F7988445A7DB54F653186D69F3CCC
+                  xor-digest = 1266CF54E8BFFC95F1CD3C532BD8EAE3
+                               BF000577A811DA58A41AAD9164CCDEFC
+                               401C1B6BD2BDD9E992707718A9802B55
+                               33D7A8F490DF116FBCD8C85E9B580487
+
+Test vectors -- set 4
+=====================
+
+Set 4, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                               3083D6297CCF2275C81B6EC11467BA0D
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 1C43EFA7A2CA90F5E8F9A4F09D4C9077
+                               D5ABD79341FD75BB2DF9F13CA0B1CD6E
+                               065FA86938D971D8FAC8A3C34D08CA2D
+                               1BA08BE56D633951BD0338A227321CAF
+        stream[65472..65535] = 428908B703282E38E1BFDE62C6B0D8A1
+                               BD2AB1F5117C85703E9B656FDEAD2660
+                               4B7B8EAAE16423A3BFE542AB13748DC8
+                               35D81F981CD344015E0DF47BD180541A
+        stream[65536..65599] = 9D6D72F46C846D9BBF3AEEB463B9EF42
+                               F84915D664A20FB78AD94B61FEB7D63E
+                               5411A81D1E8F32BE3044E109C68B9EB5
+                               EC0BF180EF18BF3191D933F86045036B
+      stream[131008..131071] = E462CD92492726928381769FF205DC17
+                               AE7D31E1B82810F3CCB541B58C5F58D1
+                               38DB708C5F5BF07A0432868A1AA40A07
+                               601FCD1A07DE3071E8CE082833F0B02D
+                  xor-digest = CDCA2F92BF75499E49B586BDA7D9306C
+                               12F111D1A9F183A83B5A07549D5F976E
+                               815F96BD716CCAC7178282CA8BEFF4F5
+                               85DAFA9BDDDF8E6420DFDBA2573F0494
+
+Set 4, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                               3588DB2E81D4277ACD2073C6196CBF12
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 4F7D4E56036A57A303A9C7D978290216
+                               297AC26C187E4F07678EC0069C34F93E
+                               072D734DBA239D81E566D1E6DCD09B5C
+                               A132714291631C227E391EC0385A3A64
+        stream[65472..65535] = C508DDD76C070F712FABA944BCB0F5CE
+                               EB645825C520197867623ED5263E22B5
+                               6270F0A878AC7FE03145DD2BF528E1AD
+                               784086FEFAA0D82F0F3571CEEDD3341B
+        stream[65536..65599] = B10CF49FE9266BBCA007C8DB526E760E
+                               79AA4D6A3B29FE82B8698C732FBB81AD
+                               1A27B2AEB06D05F3CF17E875BC0BBAC5
+                               67762275EE650D03F62B29529F3C3E23
+      stream[131008..131071] = 42B4F20EBAFB2C792006BD163064EC7C
+                               F363DD996CDF839CCE61E739C3817B4E
+                               36D311A4C94C7918E82F5158D3A75844
+                               A5603742E33D7FC3AF018660E6B1185C
+                  xor-digest = FB3EDA7C75E0AACEDD95B625F7EEDA62
+                               3DDC94983A9B084645253C0BC72FBF9A
+                               67072228194F96C1E81004CB438D6381
+                               A5C7E9E7D134FB8B67DEF27462AD3335
+
+Set 4, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                               3A8DE03386D92C7FD22578CB1E71C417
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 23DE914D641DC0DCB4F818C687803858
+                               A6673E284F8323787756DAC9352BE031
+                               28BC6149A59785F6AADF92FC68761E8A
+                               862AEDF29E851BF5422A83EE5EABFEE3
+        stream[65472..65535] = D12E0C470A955DDAA7E851F43DA35B08
+                               15D442DBBEDEECE3ADE18FABF08B4443
+                               77ACFE9F138F8725CEA27B0F0ECCB4E2
+                               E5D6E476F88CAB4743E8E43CE2D48F4B
+        stream[65536..65599] = 26635796620003DE67406BF741B93D68
+                               318F9A23FE823B2374E8BD8008EDD7BE
+                               2F750707A3835BBA7DAC45E06537DF8E
+                               53DFCDB928EA34CC08D2841FE3E492C3
+      stream[131008..131071] = D3DFCE281FDC69F7800E765CB0B33D78
+                               8BBDC17DFD11F929295C26AB7ECF21B6
+                               7D4B4EFCC18ECDB8134175A7F198EB12
+                               F7913DAF22D73A4139D5B807C18310A9
+                  xor-digest = BB2C8E7BB894DEFD1D5A7D37C01E8EE5
+                               FD4E052CDF1DDF5FDA90C9818DE71B3E
+                               34392EC3858ADF718F463808ABF841B6
+                               90F49D35A51BE5067B162E72D0101F97
+
+Set 4, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                               3F92E5388BDE3184D72A7DD02376C91C
+                          IV = 00000000000000000000000000000000
+               stream[0..63] = 818C35D2FD72D12115F91BFD32F843E7
+                               ED4D7110D1ADF517226BE797E037AF93
+                               C190025A5E82FA0341667D68FC09E238
+                               49D5A7A9526CA142D60F71C3AEE3A106
+        stream[65472..65535] = F011E9CEE99D94BDD4484408A0FF91DE
+                               EFDC8D8C04ED2B86C51F21058E912C11
+                               F19890E174018308962F5827D2FC1E2B
+                               82BA65688C111AAB5C749D8ABAEC022C
+        stream[65536..65599] = EC2EF21014AACB6215083F784E3ED65D
+                               774124FE60188930E1A90405EAFC8F1C
+                               E75D54AA7D81400E026D799CE06EF532
+                               8002BCF5A10D43E6FB6F80A9D72634E1
+      stream[131008..131071] = 80BC6F7F6B0A7A357F770E7690D94A9D
+                               B8CBA32EA36E124FDCC66ECE8786F95C
+                               22263F09645864087FF4AF97944A226A
+                               CB63DAD316F8CFEF96504AD306C512BE
+                  xor-digest = CB8D4C35D79CCF1D741B9DA09EDA305F
+                               5FA43F9AE9D0E1F576D5C59AFB8471F9
+                               7822C6ACAA197FF01347E397C0382195
+                               865AFAF5F1690B373AA2603C39A13CC0
+
+Test vectors -- set 5
+=====================
+
+Set 5, vector#  0:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 80000000000000000000000000000000
+               stream[0..63] = 04740F92C2470701F289669A25BF9092
+                               EB4212FEACF66DAB6B1D520977945F8C
+                               6D350BF26A1CA35EB37FA53B0BA2CBF6
+                               6AC07A8C75D494B4B8281CFBAD4937BF
+            stream[192..255] = 5E47F5F506AA34E7D296C6911FCD3D43
+                               31A032269214ECEFDDB492C47A51C4B4
+                               DE9EF0A63A6EB32AF1DF1C5576A93F19
+                               02B7BB89F10D8C7CDFF9C097D3D49148
+            stream[256..319] = 015494CB3CC9BDE8A2981B25C06DD18B
+                               52FA7B94CBE24C152FC60762290329C9
+                               E58C4E5148585F417733737059E310D9
+                               309D0CEF48D2F1589994657A081BA6D7
+            stream[448..511] = 3B67C1B37D96E1076595660D61340EC8
+                               DDE8F492134270951D9D4B260C8E2254
+                               A7FE8C10DE837A617A8E261FBBF42259
+                               C636B3DEEA0F373FE7C2CA2B01EE3FC3
+                  xor-digest = A8CC89F06815EFF6A91CA276BEBA7F41
+                               75F842F85BEAE99F4335A3B85FB28394
+                               8B7EE3C659274C6B784035B94886BF9A
+                               5C1483941B20170EE3A374E39006C09B
+
+Set 5, vector#  9:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00400000000000000000000000000000
+               stream[0..63] = C25BA6DE4C87FE5360BCDEF864F3F778
+                               598A6A584325D5E6C44EEA4464D7580C
+                               9B8D42B5B3634F739D6A53D15FA41070
+                               D1DD4621BF87F53F42107618D9742FD4
+            stream[192..255] = 4A3808B0619C9D94E19F3AEA0BEF3839
+                               21D7E2BED05F1128A82D9DC010654ECF
+                               65199A645606CC44FDAE763694E6757F
+                               8FF864CBE4204D45102E465F16CAB8EC
+            stream[256..319] = 3097394E0CD0A9DAA28EA873566E42A8
+                               710C28366C2B41B6BF6687D881094676
+                               9970A5BA54D28D7BF772C4FED13A9F5C
+                               6E7AD3F6948667D6C2DF981955F73293
+            stream[448..511] = E685BC2ACD3A67791416E78699C83D31
+                               852EBCB1C1AF71B926D9161CB6D894BC
+                               8C5E85C7E30A0896369BAE50C1112D4C
+                               CC583E44A8275F44B7ED140E9721C7F8
+                  xor-digest = D9B51AAF4A9B75508FCD02443EFE2267
+                               1148C73264776B5513860BCE8547370B
+                               2BA66E82CCDB15F3DEB0F0728411B765
+                               1A098C23202745C19B045C58AB196309
+
+Set 5, vector# 18:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00002000000000000000000000000000
+               stream[0..63] = EE43BB5B79EAFB54B823DE95B71F3BD2
+                               F2A7CBB6D28E9BED590C20A2C52F9B2C
+                               74EEB9A1A48474D5DA4964EEE0BB98E4
+                               88030E213A4482BD1A8CAD4CF8A962CB
+            stream[192..255] = 150C4D68BF29DD27A2E6FFDFBD6984F4
+                               3AB56AACC08AC0C0149008F0882292EC
+                               A5359CCF4C257ADD4FC535E41D6F67CA
+                               E5210068F77A5D5F32A23B17F79EB7A5
+            stream[256..319] = FEA319287C29AB84585D4BF38DCFA71F
+                               A36253AD7F4BF58398731713614D0047
+                               F85A465C6915E05232A5FE5AE7A559EC
+                               42733403ECF6B11E4D5E8F4A8288A3E3
+            stream[448..511] = 79CE66DD3F77D40889906EAB1F671B2F
+                               98D9FBF8693C1EAFC89D19209408F3B2
+                               7CD83CB3B9F33151DD4A8D79911255FD
+                               3CCBA14918744B0ACB93A5F96AC9AB38
+                  xor-digest = E1E3F49B342F873263F585EC34969176
+                               2CC46C17FDEE0B32224BB77A8EC82A87
+                               816DC612439E998476F50E876481EE6C
+                               B32ADBCF6A5D50FA16355AF63AA30D66
+
+Set 5, vector# 27:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000010000000000000000000000000
+               stream[0..63] = FB8F4925A4F922119A6F29F8DDC2338C
+                               0AEF333B55919AF0D0D9B1DB61BA2E5E
+                               4CFB394E15F6A78E01B5C4AB043225FD
+                               9C8F50AB1BFDB16F944C2660995AA4DE
+            stream[192..255] = 87767D451D81D5B40503913508C2448B
+                               7CC093982642089843D7D9C3DA05598F
+                               7AEFC5B70ECCE327B20658D6301F4D6B
+                               E58FA5CE0525C9CE8E93FC0B387AE5C6
+            stream[256..319] = D146E4312CC11F11916ED9FF8EA8ABCD
+                               E0736DDD0A8AF3E067CDED397E429D30
+                               8F2DBF848C5C1653EA969B608CE01275
+                               53573C88DDD32937EF6F8B0864C581B4
+            stream[448..511] = CE919096A83BF3702D8899787DA7BC23
+                               43F1F10833F16E3EB467440B4921BA1D
+                               96845B6B4141E1CA85364E2D508456A0
+                               E399DD048E72685389FD7EF3F78B655F
+                  xor-digest = 00333EC3A59AD0B8FCA054A08340BF91
+                               906512917E72BED76BEFFE29FC011632
+                               082CDCB1A656FB817F968E26063279CC
+                               ABA796307912984BFC267325DB84F621
+
+Set 5, vector# 36:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000080000000000000000000000
+               stream[0..63] = 202723F8212AB20D9369C2E1EEF8553D
+                               C468854873D04FDD32641E324DCB4EE0
+                               883AC1D40D7C9C7783DF4132093724DA
+                               113B1CB12144E00509FD5D36957A4E1A
+            stream[192..255] = E6717FE0A77F9043607A1A7665716225
+                               C8D417FFE2CD7572083C7C552B79DB6F
+                               ABEBBC2D4D36AB319407982187C248F4
+                               83596AC071C0B0CED08686603B024E7B
+            stream[256..319] = 8C59D97F7A093EA2D0AB890923AE4DBD
+                               D40C33508838A3966FBA360E776670C4
+                               DEED8BC8CA57592463781550BCFD1E28
+                               818E7C33A3AEC43775ED0A984044E9D8
+            stream[448..511] = 0A3DC66754E02423C6EC1C1DD26CE11E
+                               FD70C386729C8290DF358C69087CA7DF
+                               D11F5E0D37A313F74B09F29C552CAC0A
+                               5621556828B0145A6A1D43F563AFF672
+                  xor-digest = 6673BA5866E8E96FB48FAC88D307079E
+                               77AC03692B23070EB5BB9D04FA94B9C9
+                               6C2F958E834DEB51C6ADCE432BFB9632
+                               9B3151E0A89EB72019A4522233B8FFE2
+
+Set 5, vector# 45:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000400000000000000000000
+               stream[0..63] = 95AE241C4E9B6690C319D1FD828BE454
+                               52F18F061C1B1E13AA409829E194D70C
+                               AD5BBACA2738B508A5398DF6C2552497
+                               6D143DF0405F68037C285A0E19FEC9CC
+            stream[192..255] = C0E2D5C6B614E4A498F46D5399DCE7EB
+                               7DFAFAC62794F5C39864C521B8DB574C
+                               149E35D1F0EA36EA7F24EF8FD855FDCB
+                               9CCC79F1ABB13EC33E00A9E137809C05
+            stream[256..319] = 285907400C1A86AA9942ABD7BEA8EEC8
+                               BB6AF2F9667D424C1DD56349C99FC65E
+                               8A00893AE529D7BA492089EB6B525964
+                               E9CAF15221A342C4F88697D818AC0F1A
+            stream[448..511] = 13D511737F3A092643E94E74F6C76241
+                               0007158FEF40C63B33E10360FFB3B152
+                               8BD8B33093D722BDCAC1FA99D16D1C27
+                               6E59E428601F256542BD3E7A4A135152
+                  xor-digest = 1D1352487AB5081A28DF23B1B19D5ED1
+                               192F08964E4C0F048AFA9CAA8BF17185
+                               D7B97AD6003E2FD2DCCAD492FF3FBE5A
+                               5CD7AAC627DFE7CC6D0972D423B67128
+
+Set 5, vector# 54:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000002000000000000000000
+               stream[0..63] = ECA0F29C3F5C4D62ACBD601C3042673F
+                               6F8B17C946FE8FEEEB0089059765F067
+                               5AF3E5DADF6DECDA20F72AF486E7E967
+                               40B2DBF22B57FCCDFE571B2D8989C95B
+            stream[192..255] = D2BDF6ED912478A3C53713389C9DFA5A
+                               9272D030543295E8CF6F0929F1A56041
+                               EA22BD04E0DD810F43D9D28D94254F04
+                               F73DFF3B766DB55100EFC9697FA844C7
+            stream[256..319] = C7CE1CD4D8C42FA36724A49107A78630
+                               A60E15673A42C57B609740EC8DE78EE0
+                               B48F2644DC0DD1E80FB8326DDBCC7191
+                               5E6C8DEEFCCB1FBE1456532840A89DB6
+            stream[448..511] = 337650A0B03D30C9697CE85449B0F995
+                               668FB2B73E37E1A550E07632F9F5AA3B
+                               04D61AC41F8A830299FB8F70FAA0419A
+                               42C4589D71C965DDB3A9D000667616AA
+                  xor-digest = 7A26C50BA37BD9F38281FD2DA3CC14F2
+                               E1FFEEC9D7776E87D99053B531EEF792
+                               0C0BF834EA9A0065AF38422A40A31BEF
+                               AFAA17AD565F685BD6E505C7E02FB895
+
+Set 5, vector# 63:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000010000000000000000
+               stream[0..63] = 567919917583CE03DBDA69907CBAE562
+                               107FBBABB4DFC81A3A15438C94AC0C28
+                               8CC35A91DED9A79ADF4EF2670A55699C
+                               000994EF33674B578F5D77928A43416F
+            stream[192..255] = 13D0EC5B7302C0D8AB329E7AADFC3FDE
+                               1D24A80B751948C4BCEF516D94DF7AB2
+                               2B1D9E076BBFE367CBED341B2A5A3BA2
+                               D48735F83855460F9D9953279BFC2AA8
+            stream[256..319] = 5EFFE922E2FE25410E8050A973C3FAE2
+                               EE372E9686B6E7B35294B52A579CDB43
+                               9D5CA7F1EABFEB4303DFD7DFBCC812DB
+                               9D70CD0698D1ED051E1E32C855EB39EE
+            stream[448..511] = 91A01C0EF63716515DB8B71273CA4399
+                               1654AAEF2AFD4DEF25E21A08D5385766
+                               D8C29514065FFF00B07DCB32D1A20830
+                               3C3402963EF252A4CAF5CA31A50BE591
+                  xor-digest = 9232F83FB054098FBED8474939476CEA
+                               5E9FC269E7B248E56B14F56CB396BE74
+                               C2B2203D1802D9515EEE232FD612FE21
+                               11C291A46A89D54B2E5437E643239636
+
+Set 5, vector# 72:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000080000000000000
+               stream[0..63] = 507958BFA08EB41F4D18F519E36FC476
+                               5BB8DC6CFCA36290CE9AB8B165D7AF72
+                               CBF49DCF8BA2D145D7935EDD2CD2242A
+                               7B7FCCB85B4C8625532D84B4BC602515
+            stream[192..255] = B2B06A7C3977D4A1A39892E832A32A55
+                               3EE6E52DB24DC453835893A55D0FF3A2
+                               949B8B96688237E13DBBB2D0C9038AFE
+                               8B9D18CCAF62019ACB908499D292F280
+            stream[256..319] = 1D28AADF7B262A1EEEC11D39F4325CAA
+                               6181F9FA1A6C65F3BEF4F1614B0DF599
+                               EC92E5B6B42A931352965CFFC025F68F
+                               DB2D6D0181F259F12989E5FB23ADAE8E
+            stream[448..511] = F60E3DAD5004E31F6DC89292ECF517F1
+                               CD18AF7E79E775334F4644A09346AAF0
+                               F2B4F5C1DD03555A6D27C43AE53EA7BC
+                               7167F793190071C7AB7B5330A6C6CAD0
+                  xor-digest = 5A65D44021E67626E62FE87B8547210E
+                               F736490C0D51485A8EF0E1CCBB512DC6
+                               0FC18114A29AF923EE3E85655771D6C0
+                               7CFE342A52190C540BE3409853F12065
+
+Set 5, vector# 81:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000400000000000
+               stream[0..63] = 2416B634134170CB4F67F431BC94612B
+                               5F2F72545DAED2356081C91A26554614
+                               5FF2526D8D8FC7D02D8BCDD9AE03187A
+                               9E404C360E115CE949667987AC73624F
+            stream[192..255] = 4D456233EC7E761891A56BF9F9659533
+                               22375C169D7F16DD81D8D69B12092F47
+                               09703B85AA3184827935B60C1E5987A3
+                               C4C2EDFEAD4F777B53989C469B575EB4
+            stream[256..319] = 5F9CDDCBE09CD759B346AAADA2436887
+                               0D47BD8859CB9225B61AD9F99197FB14
+                               B5D625F5DBE0955DCBAA5B874A7C89C0
+                               07BF926AEE571CCD7E20635ED4FF312C
+            stream[448..511] = 642391D8851A9BDBDCA37B9587D5D0A4
+                               877EDEC31D6EB78AA3F1E068B0ECE877
+                               D83EA29906D0C0816EDF7EC5BB417A3E
+                               F3DDAA2145CB37CEEAF8C07DDEE0AAD9
+                  xor-digest = DF93E4E01EA55D18AB8AB1A927A5B5AE
+                               9ACB871B7493DC283581262771852013
+                               EE54288580A03B3991126BE8BC20C5D2
+                               230F00D8216CFB632271750F4FD2595A
+
+Set 5, vector# 90:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000002000000000
+               stream[0..63] = 4981C83E26859DEDB32D84C7BE32830E
+                               784376A12FA6D0077D4CB47ECBA08A92
+                               C841D45D6CDAA3F1FB48C6FE747B0F67
+                               1B32C2B35BE69497737FE4B98770DEE9
+            stream[192..255] = 1FA51FFD0360615EFEB03042AE8E4210
+                               D3D38B4EF07536BAFE43C0585818F012
+                               8F8B3F8CA8DADBDF049688253066C74B
+                               01849C5BD85DCE27C0138D24E8B8B198
+            stream[256..319] = 2D8C58008EE94CFEA1EC545C26466D39
+                               D7BFD5B226E32F1270B5BD3677818B7E
+                               CFD98BDEA26488248B10418C1F854159
+                               8F42C6CC237885A1DEAC5C33F22C27CD
+            stream[448..511] = 94502058B5828AE4F4CDC0516E5B5143
+                               1F07EE1ECAD7CA266C931327BE6BF1B7
+                               A34810220CE00497D7BB9600FC524999
+                               CDEB6DDE8919B03064EB56B3766DAFCB
+                  xor-digest = 1DEDBE0B7B6099DCF285B3C30E91AA0F
+                               7859496E034A1EA1AAE3D3D13C2061C6
+                               0878E595B63D849B7DB77BE7E0C08157
+                               94232B645BE946E5D8278B14427172AD
+
+Set 5, vector# 99:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000010000000
+               stream[0..63] = B84C72BF69B601FB1804CE333C5A2C19
+                               25BC8A5877DF9E574295380611D03FD2
+                               46D2EBB58CC6E918F4DB1B1A0E39642B
+                               D6B39DC76764E18108497E4CC4394057
+            stream[192..255] = AA84DF8195B3F7564D0715517476085D
+                               1B40511A72340DFEAE5134C7BB8F39CE
+                               03E6EE15217986C7E4788453EF054027
+                               8CBF6336073092EF661C13C7EA8B4850
+            stream[256..319] = A7F0C413EE143F55C6356519AE620A9F
+                               4CEF8432C51E2677EB5D700CE333F314
+                               ACA374D86A8FD4A67BDC31C1B0DA2AB1
+                               B20E6DB91E7F85DC13E348314A4FC782
+            stream[448..511] = 3445E08F13D09A1AC09EEB65451F4504
+                               0AFFDE94F6C2667BC4D8FCBECD6C6565
+                               F09FD05EC660DD38307F856AACC95549
+                               AEBCF31B3FBE84FFB3261D7FEF7A3379
+                  xor-digest = 360199B22EB28401FB4F621E37800801
+                               FE69C809D83BE29A50FD1A476B6AAF02
+                               54B1F4B048CB6423182C390B8EDFF1FD
+                               9CE49C26727F0D68EB837C19F58F3F42
+
+Set 5, vector#108:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000080000
+               stream[0..63] = BC618F4A557E5B7CB75B3572FFC31CD8
+                               4DB96FD22E281C198DD33B5E9E419099
+                               BE30E84ED61C0EDEC04B1E16E06B40E2
+                               372E0EA1A48DC55BFBFBE3355B566AB9
+            stream[192..255] = 33372015C7E5749D98A92CC55CC22206
+                               90BEC9878D3CA0AC50765D0B4457CE50
+                               9BCE196BF0388599E692B99EA8169474
+                               546F10891A3FCE22DFF0AF9733C2A2EE
+            stream[256..319] = 382684F74B0F02F7B987D37F6BAD97F4
+                               20B4811FFC744CBB9F00C2855A609FC7
+                               7CD24D0137304B95217E25FF45AFA4CF
+                               28E4335D29DA392D26DBD341A44C082A
+            stream[448..511] = B0B2B619708435C5DB45FFADD2FE4449
+                               E603FA9785E1F521E364DEA0B127F72F
+                               6C8A956CAF2AC9ABCE9772ECC58D3E36
+                               2E758BDE3678D4F4C9804CAF11129BE4
+                  xor-digest = 80FC64E2441F6CA9C0F4C207007FD0E2
+                               5F1C0514D203A1B01A6EEFD1055CA355
+                               0174FAAD47ED0956A736A9404164ED85
+                               CBEB31F80561AAFC4ED8EDC9829D83A9
+
+Set 5, vector#117:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000400
+               stream[0..63] = 69FEF0D5DD7CFA6590821B6C12E239E3
+                               5DCDE7B218A66CF3C75ED278092A6228
+                               143EC00BC16DC2FDB8CD9DDBD802AB56
+                               A4011F6A8CF432F2D34657AB84DEFA4C
+            stream[192..255] = 312EBF427B3D22A22EE1F85D89E12AE7
+                               07160C9BBF4073E538171365290B499B
+                               8904B01801CC897FF09A520449A44D0D
+                               34622DB8477EF1E73DCF15417478FA03
+            stream[256..319] = 83CF222FDBEB77FFC6E282C1212D8D1E
+                               014865E9C1251FC07E901A41A50A3AF9
+                               F8E130394F621B739578C7E238866431
+                               10827799C75F08C47664B09B477F31A8
+            stream[448..511] = 4130A8F8015F082EE8712B6D61178CAE
+                               B1D3CF90AC2DB9F2D402F65E8395DE95
+                               DA0605E8540E553CFFBD029AD5BA8FB7
+                               5950C2FB29097E13ED4A1B1818E0D07D
+                  xor-digest = 21FA07F8AA2FBC12F5B2B14E034C2AB4
+                               54D7D8DA66EB0308D9AB024DBFA414B3
+                               38F36D188D33C71E888FFE1A6AC620CD
+                               55B33C1A146AB8FD275584589BD65606
+
+Set 5, vector#126:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000002
+               stream[0..63] = 0CF41A77C30118D0931FF3142132A627
+                               7A778D3BCF7466EFE56238B166A57043
+                               2DB3B222523330233F81836282A27B40
+                               F6823BD076D84DC3B831DD78828F0FD5
+            stream[192..255] = 38A0C28325566FBAEF5AB3D50D54F407
+                               91182DEF4FC945992AA0D62134451914
+                               F07F16E86E20DB119692966E6CD6165B
+                               79BE7CE6C45D1248F2E0432393BFA726
+            stream[256..319] = DE91DACF57B176EF6E59E485DF02A20E
+                               3A4EE5FF44B1AA3D7F36265221CC71EB
+                               FB9565AA4F269B7DBF3CB9631CCBAAA4
+                               BBBB6BFABB97E52954958D4E7A283F20
+            stream[448..511] = 8FFDC8CCBF864721D6C98E1896FA052D
+                               15141D9C3DFEB48AE91B2436C5C3D088
+                               931470CE951B66C38998F15CF23BED01
+                               F6D95D84150D482C0C289A8E5B2C7C10
+                  xor-digest = 03DA7ADC3E5931928D3FD89E1E0876AF
+                               9D4CE659175E671D6D80EEA78F241AB2
+                               86CE3C26DAE267D91DB556AE0CAA60E0
+                               2B481282E6470A7A161AC8E84C2311EB
+
+Test vectors -- set 6
+=====================
+
+Set 6, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                               3083D6297CCF2275C81B6EC11467BA0D
+                          IV = 0D74DB42A91077DE45AC137AE148AF16
+               stream[0..63] = 544B400E28A1A4D9E30A3E5BCB5C9FA5
+                               CA066389C693177C4FC721937D0DA5FC
+                               AABF39ED84E1FAD63ADD0C9A86749ED9
+                               86759F8ACD0A5AF2E17B4E3CD5831B44
+        stream[65472..65535] = 6D2242273AEDC611159912EE0EC5D023
+                               44498AB4F513AAFB96E8C240C1F13B12
+                               EFABCDAD424200A53017DA7D34E9AB86
+                               9D099D239AFB45D067BF94A92E7D1007
+        stream[65536..65599] = 403105F52BF3456E08C2C698505E2639
+                               4594A257DC6BCF7E26A9AE184CDC8952
+                               C34D29E116809C91DCEF4B0FE57D87DD
+                               9385BF387732E49E265E67BDCB138D53
+      stream[131008..131071] = 86758A037E90380C2DF4DB0A7E13A115
+                               C0F83A664D5B6270306ED5B9A445D612
+                               DD0F9300603362F2574D8E262650D539
+                               708E2FB5D2CFABD3F365E23783271D2A
+                  xor-digest = 8513C47FCA708D9B3CECFEE6BEA39154
+                               1843C72A2BB767C926EEADB4D3708537
+                               B24A36FBF20273487B312095D6C6D866
+                               C61B0E56F71029E7F71FD091D65C6CB8
+
+Set 6, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                               3588DB2E81D4277ACD2073C6196CBF12
+                          IV = 167DE44BB21980E74EB51C83EA51B81F
+               stream[0..63] = 2C832BE30736D5F5514EA4A748E30EB6
+                               57F418886DF2E25A739E13B6C1B24736
+                               96B44CC2B3A054CE4E6D9817BCE6BE97
+                               E77D0B984C0F039329ADB559266270F8
+        stream[65472..65535] = FD7637AC01D2FFBB5AA389D6E9EE4E39
+                               4E81AF774491678E7A0181B1AD063B22
+                               6CD1703ADE35B17F1A8D4E8B6E0E0138
+                               66A75498C93A19ED37DC0398B61573C3
+        stream[65536..65599] = 318AA03B81B6C5C334E80811384A07F6
+                               BB7D0AB3FBAA1ED873BA2E01F920C1EA
+                               FF35AAB02AE0D4F9612E8171BFE63755
+                               421ECDB540189C2A10027D4199E35959
+      stream[131008..131071] = 7F688C0421F127D0CF5B773AA1B27A74
+                               0ACA0254CABEE4095809FA854A06D746
+                               AA06E56EE3A6AB471F4C46B0528B5D94
+                               BBB9E3BB989E01FE459F3190E2942FF7
+                  xor-digest = 97D161DDF9E98C70E6B63BD4DA8629FA
+                               BA4ACDF112E28FA029DA508F1709E977
+                               F57F3942997822020307071636BFBEE1
+                               AC7E3D9C97717474A8092576536DD8DC
+
+Set 6, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                               3A8DE03386D92C7FD22578CB1E71C417
+                          IV = 1F86ED54BB2289F057BE258CF35AC128
+               stream[0..63] = 31B2E5B938120CA131A0635F2A471710
+                               CDCB494678339BFC7710746BBCDF2700
+                               A0286EA735766D17E9FA270C63AC1C4F
+                               405101CAAFACD6C2BC4306E37E9516C3
+        stream[65472..65535] = E5AD2ACAE7BF99837475EFEB7C8F327C
+                               55811CDE424E7A5AFE33086CAFB6A63E
+                               6607C005DFDB8DB13181CD3FF8584823
+                               F0D6EC38083DFC3C7A8140DEB47372B8
+        stream[65536..65599] = 662728BE1DA1099208BE1BDBE7E5F28E
+                               8E2F112E527D2F48E2C9AF565729524A
+                               175A37A38F5CBB1761D21E907CC62BFC
+                               B3A4ADA96EEA24624C501D237F461E93
+      stream[131008..131071] = 609AD32104EC8FB79D91299D3B3B2942
+                               3E09F451597C0BBA26FA2FE97B9B3BD8
+                               0A8907A8236E245E8BA2332C6D027F66
+                               12DDE13BF4A149A1A6CE2DFA9F8A148F
+                  xor-digest = B245B3176CE7C0690A7CFB4C61C84E06
+                               041650BD4A199986D3AC4DDD80A1C806
+                               2FD17F9EA40D25E86EAC53CA4FF8487D
+                               A4379DB9BABAE6109859D9757A992100
+
+Set 6, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                               3F92E5388BDE3184D72A7DD02376C91C
+                          IV = 288FF65DC42B92F960C72E95FC63CA31
+               stream[0..63] = 8863C707A53A4201F070ECEF33DAD759
+                               712F20660A288C80E6E9073CD850CF84
+                               C96AC6DE9F11F0BA176C395E871C42D0
+                               420FE1D3E9E23C8E9EB4DAAD6C677C50
+        stream[65472..65535] = C9B8301378C62DC67A932B81147E76AD
+                               54A93FFDE7B04E82548B6344B8F63897
+                               3FCDCCE6F69AA0A25BA0BD527EE7C613
+                               5A89C5CEAA4BC69ADE9DDE839FDB47BE
+        stream[65536..65599] = 7079E98749DF66D72B8BBB1DD7A6B7D0
+                               6094E8723BB74D38A7223B2557B8BE25
+                               4313AFD06D79814BEED4F40DC9211D50
+                               165A8CA279AA2CB8A1393099B72607B0
+      stream[131008..131071] = 6C30F5011144AF9AE0D27E2D39E51372
+                               783A5BAEFB58F43578D0FFD947457C87
+                               F138CE84D42891A4BFD1F438735771B0
+                               FD495DF941B8BCE83C2EE9F11C18C04B
+                  xor-digest = 7E9DD203303EE6807075D16469FCDEE3
+                               C5BB95A359D4338AD06546061FA12F3F
+                               C24AAE71EE63F3D892AE93E5E327FE7C
+                               1C168CCEC2BD1CCAF905E5CB2DD75C29
+
+
+
+End of test vectors
diff --git a/crypto/test/data/hc256/hc256/ecrypt_HC-256_256K_256IV.txt b/crypto/test/data/hc256/hc256/ecrypt_HC-256_256K_256IV.txt
new file mode 100644
index 000000000..15554076c
--- /dev/null
+++ b/crypto/test/data/hc256/hc256/ecrypt_HC-256_256K_256IV.txt
@@ -0,0 +1,3257 @@
+********************************************************************************
+*                          ECRYPT Stream Cipher Project                        *
+********************************************************************************
+
+Primitive Name: HC-256
+======================
+Profile: S3___
+Key size: 256 bits
+IV size: 256 bits
+
+Test vectors -- set 1
+=====================
+
+(stream is generated by encrypting 512 zero bytes)
+
+Set 1, vector#  0:
+                         key = 80000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 240146C5EA6C72A8DFC93E54E8811C32
+                               A85E0BF7291BDDC0DBEAE086D051D5B0
+                               5CC9DD5C311ED2F7E8484CC477C68BC8
+                               C5D3F3450553F5327253768E958C0C55
+            stream[192..255] = 26C5976C37B009E57BE86064A99E8F59
+                               F9536410FAA9BF625D8DD2ABC9AABF09
+                               DF6B5EFC76CC6200F9E321E327AB0703
+                               2C78B351C5F7EEEFF2C6E374521CFF6E
+            stream[256..319] = 2F72E0E6E710D807D5120AD686DAADC3
+                               A5C1544557A4BA6B1D61F90FECD55328
+                               3C8F91B801DC435C5FFB1F8B33A23644
+                               8E21217C367108893D13AD41EA8F20F5
+            stream[448..511] = 68320BFC459C78596162EF5FEE2CF46C
+                               79EAFC681AE91F875672350C59D33D6F
+                               9E0CEEFE42EA9A0485E3E41C241CDE84
+                               9849DEC99219729D91270358B2F83F38
+                  xor-digest = 19E8083DE3499286788AE3A6DFE90AC7
+                               B77084682ED86D8039A67663CDC9ACCE
+                               D297F22C10FF7E4FAD773337B008A32B
+                               A7176F733045DE44782F04C1DDF28776
+
+Set 1, vector#  9:
+                         key = 00400000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4B1E2D728E06D7356F151D10DE9CBFB3
+                               C66A1E5B5ECD926E33F56B14CEDBFCC5
+                               40CD6D1089DD8E5CF008E4AAA3C4C89D
+                               11B136FB5656B5D4818D1BD1E562BB38
+            stream[192..255] = D5E6B5482535DB7F9352933242C164D7
+                               6528DF7AA013A4FC2F2B8C2D7DC0202F
+                               85774C16FAF22D5071A875B6A671D4B1
+                               A8C396AA5D2F14AFF9C4CD6C1DB89175
+            stream[256..319] = 3D0FCC3C90DE0328FD0C752458996FF2
+                               DF822E496CA42A7D7EBF3D958676A41D
+                               83A16EF3150B8C4C8F1763560B314287
+                               54B4A2EA5C4F74783BF8809F3A624664
+            stream[448..511] = 2D68526D25483C2A1F0B6F7101507804
+                               C9619E267F1FFF28C934D19201351465
+                               31D13592BC9F1739A0B090718052E4A0
+                               CAE9E0FA4555F2FAD27EC8AA2F14CC60
+                  xor-digest = D3C3131E402BCBA54DCE0AD35C5FD241
+                               3ED7056BF67B5163CBE6C9EAA9D27535
+                               7D2BFB7B2843DFE92709F047675CE06F
+                               5201611BCB8FF15C76D0E328D46345E4
+
+Set 1, vector# 18:
+                         key = 00002000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4A0CCA5AD387D49DF33FE8BE69FAD669
+                               270E3E6CF724F53FC3E509A2CEF1D174
+                               A67C2EF4B9D2C9B8A8177BBFBAA2C45F
+                               BDD25CBECBDB59A402FE3C4835854CAF
+            stream[192..255] = CA0F19D9996E6D3518D28D8169968ED2
+                               B03D118D4BC1C5E1847BA6EFE6A32D6A
+                               32BAF71A4C27B0BBC9B9BA03FE044D7A
+                               C9785A69E3B0E5B3B26AABE3AB093965
+            stream[256..319] = 6FD1A9F1EA228C39625FC0CBB2D4BF8F
+                               2C0EF1F37D4FAC56D8024D1B4F2AF33B
+                               8AB0D452F5155ADD5F0FEEED8104AD55
+                               9946D2E274ADE44170F5113630200B57
+            stream[448..511] = 5DA1476A1CBADD0797DD7EB9C0E563B9
+                               EEA2C55860C42C2C0A6B38B9344BA0C2
+                               345C7143D9A7E5BCDF9FA2606098DEA2
+                               142632258F844AA1A77CC9950D5ABD7F
+                  xor-digest = 0CCEB42D4045C09C45CD6C27B88606BA
+                               ECF7F6B30F50004AB2ACDAF89849519F
+                               61482EC4AAA2CF58C4206A228FA23AFE
+                               DD3BD50BC9C04744940A238966C2926B
+
+Set 1, vector# 27:
+                         key = 00000010000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 77CB199A639DE60664225AD1DB954B5F
+                               70DC01305D2D4073BE772B0863175EBB
+                               64FAB80EF324DBC85A9EF827EBAC7A5F
+                               CB088619C246CECE6F92B89A2122B6AB
+            stream[192..255] = 84C1E9B365F1CD23AFD5711BDF2B6F26
+                               F988A6CE29450108FD6814802355217D
+                               F6F329FCB3F5997401019BAE0AE43760
+                               ED6B658FCB4280F5A070728411EDA4CC
+            stream[256..319] = D0AD4A851E7A60DC789762A554A8FA76
+                               77FA610F4D868CFF1AB6025B2ECDECE8
+                               C554B4C0BDF543F58A1DD7CC68FD7AA6
+                               7EFCFD59D55372E85131D6284E7949AF
+            stream[448..511] = CF7F791090D04350930AA1E1A53B70E2
+                               691A231595E83F8BAB9613BDBAD868AB
+                               197D5E06B3397CC3D81F56B87BC7521E
+                               B0BE346552DABEBA863D5C81D7245C8B
+                  xor-digest = 2C77C0ED1F5AE20A97388ACA5300918D
+                               6246B04429F298E64A75828EDBD01900
+                               FC70CC103C31E0BB67B06D04128686AC
+                               5C5FA63FE714FC4DF18C551BDF81862F
+
+Set 1, vector# 36:
+                         key = 00000000080000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 54A5A2E883714170B471C0651D74A9F7
+                               D51287C89FB345DE0AF7003C3871425E
+                               FC885F033D79BAC9716B1ED5C637BD9B
+                               0F16FD8D613BFFAB634F0EC2497D7B3C
+            stream[192..255] = C7FBA70B19B749BBD0C84C7D31A5AA44
+                               155623116C44CD53D2E640034211E730
+                               277402F62D1FF1578236A2646AFE6108
+                               2C958D9D01C065D7335EF9C29415AD42
+            stream[256..319] = 2385E2A7070FEC7399BB3CEEA43C8D0F
+                               54D3607FC1C21BF173642287C1FC2C96
+                               D37695A7B1310E5E918EBE37113348B1
+                               707BB39E401A10FF14EF020CB7C44261
+            stream[448..511] = 5A87EF81C2CFA70D86B147E9587467B5
+                               22FCDB4EAF0353E11F73F3BCC1EA6C09
+                               E962A87A0842B9225E164DB0CD1A3BA3
+                               DA8C02E6746CD3AE0BC4754ADBE7EF6D
+                  xor-digest = A65BBEA2E397048E4714A8AB3C19EE6E
+                               91B9EB8048F35FA7AB9E003E9359BE0E
+                               C3EDA827AF485C23A941F7D656C76CA2
+                               5D12044923E43E61E7DDEBE7D9C87E3F
+
+Set 1, vector# 45:
+                         key = 00000000000400000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = FF81E156907CC2C01EE23F79F936809E
+                               3F88AC15CC01BDDDA378CC1BD2317444
+                               200E4E2C63E15FF07B0B40721970E7CA
+                               68F748A95A965EEC606318447BB31C2F
+            stream[192..255] = 4C4C42A330AD444388FCA4009CC0B196
+                               84AEC3EE65138A747FE86526A263969D
+                               87CCDDCC4C9A0EBDE2D088CCCEBE76F0
+                               52BAC07636937B1567637ADB498F7F8F
+            stream[256..319] = F550BCDF67C8E9C17B800487DF83A4BC
+                               73B809C4F3279D4CFE857780412F0F7B
+                               B838A9F0322BBA84D7AC51E469C5012E
+                               D774E52E3507C7D069F5169F0403C577
+            stream[448..511] = 9D92715109A301AD47BF2376D65E2519
+                               78E12098B0DEA5B779079A0FAAC4DB42
+                               5BA9EB00301A5F964336F7EE9C0D9667
+                               C4F0DBAE14BED3E49A6A746FCB186C65
+                  xor-digest = AD2264EC651E311BAC5FB36434773F5B
+                               4A4777B2B7F811A755269FDA8339DC97
+                               7A8C6A5F66E8737DD16A88DAB8545110
+                               EAE275892A767BCAC0757C396A690F67
+
+Set 1, vector# 54:
+                         key = 00000000000002000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 3DC3C1A1A40E721F8A3A66960DB2C0F0
+                               6D8B7C07FE90D67C26F86200D6A1A1D9
+                               ADE4D53A35F7A016A506D9C62D344D49
+                               5C6DEAAE053247103B8F202B85A5036D
+            stream[192..255] = 9B83E56BB5E10B5C6C05C4B450B64FA5
+                               9C52AA63E207592999CBB48355517F05
+                               C93EA878BFAECE58CBCB948E81BEFD89
+                               AE0C5C13359C6CF5A673B4EDE28FAF0B
+            stream[256..319] = 388163F9F26536BE1221A46834CC77FE
+                               03D021C570A9DA36CD528E887ECEB2A4
+                               7146A8A930D6AC04694A0B9AE50FF55A
+                               41AD3B3D3E53F982563B5B458C078C0E
+            stream[448..511] = 3B0FF94C0C9FA0EB8B8CC1C691D04180
+                               5AB6436BAFCE8C16A1351883C88E945F
+                               8F912FF79CFCEFF7374936E830C9440D
+                               C676A5F00BB50EDB34F810AFFD9CA8B3
+                  xor-digest = 879534CEDD8CDBDDDE2E2216D55529AC
+                               1189B1C34A76ECEC179B8A240E890F8C
+                               640738DC37C14E4B950B9D8C507685B1
+                               28CF4782EC424A3712F54F6265A41E7B
+
+Set 1, vector# 63:
+                         key = 00000000000000010000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 12F0A17DEA167676992DFF2E7D812878
+                               629579519578EAFD885F212C7E04F035
+                               AF03732C3DA8CFB7B73054662F0593E7
+                               E40133706F04B1329BC3155DACD296AC
+            stream[192..255] = 41BB89D0BE44055E23813783C3EC4487
+                               2D102D6EE94475AAFFC7FEB8DE6849A2
+                               6B50DE77EB9B0B96EC9EA0216D13D64B
+                               1264A83D6B571A92948A5E35446B0503
+            stream[256..319] = 15E9C9168AF4AEF7F2EF1E832F40110B
+                               A8C08DE71D4F0AAA3A5C2FC59BF41005
+                               ECA654EB7F316B757FEAD5B0F4BF41F2
+                               C6D035A88B5477632F34D7F904B2939A
+            stream[448..511] = 8A2D446044F7930B696DBA896BA6CE69
+                               8F8B01E4282BCCDC4740BB6AB6ECF7B8
+                               9CA1CFCB5745B6577D0F440AAB7985BE
+                               BEC5DBEBD8B028B15DEA138F09018297
+                  xor-digest = 89CFE7E84993C6B608EAAECBAECD7847
+                               472703F3CD97F9315BA9CA13204B616C
+                               AAC0F37EBD1C58186620710FD6AE5EFC
+                               B7CBADA19AF8C0F7E1FB24913C2300FB
+
+Set 1, vector# 72:
+                         key = 00000000000000000080000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 7BC411ECF4AC2EF2C9B8C5B7CCFD791A
+                               E8250119E08C1B7F7A82F576FF66FC9A
+                               9D9BDB7570EAF276A60A3BC7E7BCBB86
+                               7A791A48F9E742D7D7480FBA67DCDA6E
+            stream[192..255] = F85A8E3219AE1E5F20A4FFC6814458C9
+                               5A4ECFE7FE739E151A45247A136E3BB6
+                               9C11987BB5D13B1B9A3077C8F4ADC9AA
+                               A555FC9725339E02390B9C9F75E1F38C
+            stream[256..319] = 8A2E88E0A773EA00C11138710BF12ED2
+                               7797AE7863B1EC84801D11B5B3914786
+                               F1D547382DAA9D5215CD4CBC783C700A
+                               9B09FCCFED28899D2F2EC148CEFA39B2
+            stream[448..511] = 95E3BA3237F370A4E0850F2CA0FCEC89
+                               E9D832CA6DC6A062BE7ADA8D8AEFD55D
+                               2BC7A3F46BF81DEA5DD9155E8D8FE918
+                               B5DFB1926460AB69663856EEBCD4C338
+                  xor-digest = ECE252DA29D20602D138E13C004D8B66
+                               8B09FD764B7D84FB83B8F4D924504D60
+                               277BAFC521A8AB0464E4EFC6BBB9E4B9
+                               A206C38154AE3A57B84D2D39CF45616E
+
+Set 1, vector# 81:
+                         key = 00000000000000000000400000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 139C2843F0BCBDD32C685F4EE2C7AF4D
+                               E6BC79789B77B1CA6CD94A01645EA243
+                               5B491F27C27D4EEB96FEA0ACE65C0D8B
+                               BAA642B5A07245BCD0930588FFC92A50
+            stream[192..255] = 5C76EB0D5323A7AAAA228F7718BB6736
+                               5B344559C24BEDEB2CA66414B5E81795
+                               428D55868611AF9AC7EA0E7424984037
+                               3251BF5206C361AA3631DEDA52DDD519
+            stream[256..319] = EAB18EFED266D4788015DBDD20A75058
+                               FA4DE35C1DC774ABABC476BCB0AA2CB1
+                               214E5463F4E20E7B999ED475D77DBA9D
+                               70FFCA0C7971CAEC3B285EE8F9F37C02
+            stream[448..511] = 081083D9AC30C9DB4E53597D64249D7B
+                               CCD847495A928CF4CE876237D92ED5E9
+                               E3D723EFC663CA0DDF34DABB941F42C1
+                               B48EFD59DDCAE71A1B82358A3328644A
+                  xor-digest = C08714035439EFBE455BAE68EEDDA0D2
+                               A6968F18827B214A097221C3A77F80AA
+                               E1DD9F3C72FA66C16EE278A76C19107B
+                               37CC32346DBDD29FB30059A8FC732DED
+
+Set 1, vector# 90:
+                         key = 00000000000000000000002000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = AD897A3C509B66728342A817D745460F
+                               6A258386FECF71DB95ADC716B8BC0462
+                               22C4EE887334718534E719F36454E440
+                               F9EC44A2DC38345CEEA9425BF5F10123
+            stream[192..255] = B32235522391A0BE105A993923760C6F
+                               BBDA849213C628776BCC5364F28EE5BA
+                               D498F186C3C57A8DBE5355C2A38DDB82
+                               54B321636EAD186788DF1BFC5B6F85F6
+            stream[256..319] = 499CC51B20538B14A05E490B6D5D10D9
+                               11079F58E3603A84AE6689293E3AEC56
+                               7545823F0B085469CAFFF01D2AFC5076
+                               C155F8B4B7DB4C49A9A993964928D11E
+            stream[448..511] = 65983D36E97AEF89C3A75616F7C098B7
+                               5CFD9C531AFF8184010E2CFD45163312
+                               FFBCF5AC70139CF12D97325CCEFD0B01
+                               FBE571FFBD7DC21B54D4B277A2205E56
+                  xor-digest = 90CD243B35747378B85B99474EE0BB3F
+                               CE7574CC19BEC5220255523276CDECE4
+                               5A16EF44C414ADF1D1CBE264872419CC
+                               EAF664CC74D36072E9B975FF40074006
+
+Set 1, vector# 99:
+                         key = 00000000000000000000000010000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 26F731F36F626943D4CBBD605CB67FBF
+                               E9301F24AA4E93EDB2D0DBB3FB17E8C8
+                               623054B3003BB12E1C8607FB53315AF0
+                               A139CDC381753A14342AB90AFDF43E67
+            stream[192..255] = C3B755D009DE9965D36B4111308B25EF
+                               39A137E373BA0E90E5AE2748115F29FC
+                               562A6F6894BFEA59587F991DD105DE1F
+                               67F62A73A72A4802ACE727335467F503
+            stream[256..319] = BA815578D19B3B384BA7AA7B972B1FC1
+                               7244FA75A4CFDC8C30ABBFDF6861F356
+                               6A9B68A6F60A61E6DC8E046FE75373E4
+                               B45EAC193127CBA3AC4F22345BFDCCFE
+            stream[448..511] = 99C68AC554291FCDC03F300D69CE68D8
+                               C4D4DFF5FB2D4C3079992D40FFCC9683
+                               DE471E6F2A406DCE03AF8EA17B7AE905
+                               12F1368B8EFDA838274812C4F134E2E6
+                  xor-digest = 01AB73AE53306196763ACB9ACFF9A624
+                               B83A7B339DB517AEB408292627EEBC43
+                               FCA6397320F50E96ECC3595B13BFED85
+                               1309458EFE35FA1167C2CCCC6A4CA83D
+
+Set 1, vector#108:
+                         key = 00000000000000000000000000080000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 031A1BAA02280255F0413D76F945138B
+                               C0835BFE7CA64B16AD090454F098B8CF
+                               34B1EE138E03C3CCD9FF918A58D06AD9
+                               2D7F3FB57D2E161A863A0C25391CCABF
+            stream[192..255] = 6810368C2B2A091C6FB3EBB76E960AC3
+                               BFD678F028EB6FC0F5B36C2D386A21A8
+                               FE46A5AE09DB0BD75359A8482EB6F5DF
+                               ADE199B796520807D60D9D93995EAFE7
+            stream[256..319] = 0F2CDD428FF6DF2A4621A8423E09939B
+                               014BEBC0ADBB8CE71B5E587DA408ED43
+                               04A12BD535257322122EEA2840A9447E
+                               CB1B6D3550ED14EE31424F5404B2B5B0
+            stream[448..511] = C63FCB06883F3AC65612EDF28C875477
+                               1D383D42A553EAFA37ECCE26061EC5AD
+                               C6FE3BF23E06CFDB14EC1DD996A7D4E3
+                               FCF7A0B9ACC69F37ADF428B434994595
+                  xor-digest = 463386D0F7A1306E87F3221C4ECC0597
+                               9474F620AF3563686ED5DEE291155225
+                               56B9372496638BA1631982D6B3F58CAE
+                               27810BB7AA93351B838D54EE761A8C94
+
+Set 1, vector#117:
+                         key = 00000000000000000000000000000400
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = AA4E7E8171A8E0AEDA6049999E0A06C2
+                               FFA43B9ADC5E9DCE4ECD8FC1D27BE792
+                               6FBE2ABB69A6B69D8C213A793C77096F
+                               D4DF7BBDBCDF007C914B7C817837D99C
+            stream[192..255] = FC90E3C82B8E7228C1ADC2F555068372
+                               4307902A0750149CE0B2EFD2CCFE9875
+                               DABE60E1B85CA117D05E4BD4F45B42E4
+                               55A9F42C60910C9BFF8DF8FAB53C81E1
+            stream[256..319] = 9BD976B88E9E5E23D0D40779644BB3F4
+                               CE5C6B16FA6D955C32369DFD19D632BC
+                               7730683D562320E39F75D8D8BD074968
+                               9ECAF0DCDCD99FF4C3939092E9576144
+            stream[448..511] = 51BE9CC1362669C0F79D2D88A42DBED6
+                               C3315002380AEB647C8F9C4036590527
+                               1D8915B985B8BE9CC1C5C7652139E609
+                               651EAC8A14DF661D9869982AE5735E9F
+                  xor-digest = 0B0C84D430687F488F8E45DECECD6D7F
+                               1947E32AC49BDD2139F5413E08A88F31
+                               F9AF6599498431F155AA10B7EC09F095
+                               8A5AFDAD486D2E6D50AF77FE98E33738
+
+Set 1, vector#126:
+                         key = 00000000000000000000000000000002
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 52F49050156E957C605656B2DF88EE1A
+                               5E3ADA99F9793B65456C4C6C322B8B5A
+                               28DCC91EE0E711BC33E0C13354542227
+                               613665CFA3A825B943444401EFB06ACB
+            stream[192..255] = D0907F5D5939D7B544476E299605972F
+                               FE422C64BC6343F9C81093AD0E3ACC72
+                               F4B67314892E36764736C0715E4D3438
+                               36BDB105214F5F8925F321F5FD865EE2
+            stream[256..319] = 96EEDA75474D65615795185B1BEE8D44
+                               A687420304B260E4C70FE7F542967325
+                               1826EAE010981F6262EE6CB639996467
+                               5F6B23825748128617721752283C16DB
+            stream[448..511] = D926085A441E507207850AFF3008D59D
+                               F7C9D3B69687D18CCFF2C2E09D4E4EA7
+                               FF0B72C04A86B80923DAE187FFB99170
+                               DBD4902AF77EEC42866A83B519F092FF
+                  xor-digest = 1E068ACCA6062CF26ECEC79F149BE139
+                               24AF8BF44377EAD1550B1560E4A1006A
+                               A6986C61581FF9E47D58F2E52434911D
+                               5AFCF914DBBAE183D02DDA3210768984
+
+Set 1, vector#135:
+                         key = 00000000000000000000000000000000
+                               01000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = EF5BBD7A620E8052F05DC269309AA7CF
+                               8AFD4AB2B941D905AEEFC721562E00D7
+                               04CA70113C8A90FA12A0C9B9CD1B9F9E
+                               6176602CC08B66410A8BB0F5E9837C27
+            stream[192..255] = AB843B43856FC77C1EC09C0DD2248617
+                               820344BD2CA0B025C39B0EBD5A750A6C
+                               7BDCE863C068E0D3A937A5B2C5B6ADFC
+                               609F6DF7778D88238B89288B2768DE99
+            stream[256..319] = 5E6AFBE41F47F35CA9298C973E613174
+                               529D9BEFA6D0713A5BFFD96B70D39044
+                               413E24FE57B01C426E8988EC365FEFEC
+                               1422CDFB956B12C6A799F5FDD4EE43D5
+            stream[448..511] = AA960C189C0A20870901D4E2F1901D0F
+                               A28AF3D974E14FB70736C191D4C9CA26
+                               48EEBA776339F80D57A8B783419E61B7
+                               52541CB296B4CD31C55DE3D34CEF0D31
+                  xor-digest = F163BB7ABD3914204ABAF08B844ECF05
+                               A36B7B37B8345115EFAA2AB2E7763E6A
+                               E044A83597C023FB41EFAEFBB63E4195
+                               B60AEA6399DEBC94C75BE883B3623733
+
+Set 1, vector#144:
+                         key = 00000000000000000000000000000000
+                               00008000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 9198011FAAD874AD77CD0C98DD99C7BA
+                               01B75CF9DE1E26321EC6AD293C73C675
+                               69A349157FD47672C5326276BA40F4C5
+                               0CF8D98134D0BC13879E9EC267110FDE
+            stream[192..255] = A9B3BEEA161ED996C44F6D3B93431C6F
+                               54DCD5DB88E62CA10D1067B9CB5D21DC
+                               D7E04C48D88DF54E1370D1C24C871BD3
+                               BDF9B956315996F95867D1E2494370CD
+            stream[256..319] = D09ECB5DF5B0526372B57CDF5DCA6AE0
+                               F005D2E2F27D50398E3D1D7FF2100BAA
+                               D6F2C03E431345A4F41CEF3E8D3F14CD
+                               C76A423720A936D27322559289F13D92
+            stream[448..511] = 5E8FE7964B052B6D27216E37C49CC913
+                               450FAE159C087E34CF67E8B0B8F516D6
+                               3C0B544CA29F9BCB2B48D3894D69DE3E
+                               1460783E82EB67990FFB7F92DA48E449
+                  xor-digest = 5515E37A3F274746847F551ECB7DB4BC
+                               2BC32237050BEE9AF2AD1BD8577034D3
+                               4A23AB8A2FFD00C7B8CB7D5CA0AB2421
+                               E7CECB2801A1B73A44FF3E798ACA8443
+
+Set 1, vector#153:
+                         key = 00000000000000000000000000000000
+                               00000040000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 02858548ED24761DC0AEC6752076D095
+                               7E78EF1FCFFD8E756C747586A3B59C22
+                               F42A9FCA9F103C3054E0B4F6EEC82101
+                               971F2A6F9611F7541152FA3BD7774474
+            stream[192..255] = C32ADE80873D1190E9807C25D73EC5B7
+                               C208AC693D98A664FF4D11205650F7FA
+                               A36B153BC1A3F0EE0F4319F2100F7F27
+                               31856BFAE36110C12EF0361259641D74
+            stream[256..319] = B8F74AD5930D1F2CEA6B9F7E4E775DF0
+                               AA97744677E5C96B9E55AD77BFAC5E8E
+                               E9BA7A19607D9EC52DEEBECD185DAE13
+                               E304743019D831849F111602EE6EC34B
+            stream[448..511] = 513303A57165287E793DB91F49C9A8ED
+                               522389F03634930512744884BCA45F4C
+                               ACB60FD077BF2C050D4002162FB811EC
+                               4AA855793CFF2E30665188471FFE0847
+                  xor-digest = 7EABCDBDA34E51E3A61D2F3340884BBB
+                               600E1D30216B7117081B3E5D04FD4523
+                               706D4F34C5FD604134DC89F570D6119D
+                               DBB7C5FB7CA90E38AC157832C3C956BD
+
+Set 1, vector#162:
+                         key = 00000000000000000000000000000000
+                               00000000200000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 689E48A85A40BD161BEC710F9B2457FD
+                               276F1156EBC10BB851A8517AFDBD692D
+                               E4827BAAFF218AF886439ED976147EBB
+                               BB1074BD599A80F6324C87BAC987B8C5
+            stream[192..255] = D9BA3E74CBAA58CA97DA3D3B1051BDF3
+                               29F6CD837B72022D2EAB5D20B02F53DC
+                               4755C764C50756A7101998C187E4F0F8
+                               F17A0C6797976C4FF1BA17B3D03C2218
+            stream[256..319] = F6F9B6F0F6E1D756C0242B48BC55EDE3
+                               3038BABF72FCDD5122C61804996F5ED0
+                               86A78B33C517CCED9C34580AA54AC03E
+                               BD0F9698A234787DFE97FCD3D9B7CEBE
+            stream[448..511] = C31091C4C5AD605BA90963B1D469E501
+                               412FEECDE3EA8EE834F188793A98F830
+                               81F8C941F11676E007074B40EB15DDB5
+                               67D93E954422376F2E3039F4E4115D70
+                  xor-digest = DF047B3EE7F2AAACE9D5A2B0F6A1EA0B
+                               97E815E9B9BDD3B7862ECB414E9C08E9
+                               BA0109B1D6866C9D7D6D3DC9FAE5F51A
+                               48DE7B9077DA489B7982BA69228483A2
+
+Set 1, vector#171:
+                         key = 00000000000000000000000000000000
+                               00000000001000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 1F8F707DDF0121AE4DF26A6ABDC195A7
+                               CB9CC8479588D2D436C52483DA54744A
+                               2880E3DC622180D36B64CC053CC245D8
+                               0700EC62ABCA6944BF89C7DE1A532A3C
+            stream[192..255] = CB2D934DD1414C60550CEA6FFA776312
+                               3C9336F99F16F8B5B8E60D5D0CE54A35
+                               E752A4887A03EEC95050E50B58F5C8C2
+                               FD814DE76D3F66B907C77C9B646EFD13
+            stream[256..319] = 10306DD8B3EA307496D7BEB7A679D53C
+                               3650ADC53991D0565856F51DA82CEB45
+                               AFB460D6F90877557E17F534C3375FD9
+                               F96D13AB77FA3996998F5DC6F5D3C9A3
+            stream[448..511] = 42F4D1F669741750B24A44F82990E6AD
+                               065E7B07B2194C96E7578F7A754E52A5
+                               86C820FFDDBA671A7B08D65B51D8736F
+                               D0DA8E81CC69BB8A56565C43845C0AF4
+                  xor-digest = C0535BC269BB39AC2ADCC50C62F87B6F
+                               2C9351DAD49813529A27BAEC163A1D8B
+                               778670F0FF1610A4688F86851050C9B7
+                               275B087A0B5CE01B602F8D1D25C29392
+
+Set 1, vector#180:
+                         key = 00000000000000000000000000000000
+                               00000000000008000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 899C1C50A80E374AE884F10BBD17D036
+                               1632D89938FDB7E4BCFBE1050D5E948C
+                               CF4631EDFEFD2F140FC3FBFCC096CD68
+                               1F6C1B0CE9E395FDEC56295AE331D8D0
+            stream[192..255] = 2F60CFD4D07E58DBC5127A98D2B1DDD6
+                               1F216F61F70AF12427108906AFEDA4AB
+                               B439A99765EB84E43D06EB7B3D984A3B
+                               53D8C054745A6E3B61F8444C84C7F30D
+            stream[256..319] = 1A92F3B4F6C4684201FA4AF201259AC2
+                               53637B41B734062C298E6F932DBDAC5E
+                               999FEC21B63539B5FAFC312D0CCE6137
+                               04AB3CE65E241A1C34D12ECCC840973C
+            stream[448..511] = 83A75C2E2C6D40FAEA049322DC1B2251
+                               306A8906A37DD30182C328D50E7B7AAF
+                               89671DD776C9C730EEE0DACEAC7D7038
+                               4A93426090F31EB851976B8B2ECA1FBA
+                  xor-digest = 6D85E7DA2069F1308D20A56DB17F3629
+                               09E80EA6A045DBE61FB037C3C8B9D448
+                               526A37A431A8BE49CE4F10B8CF6A33B8
+                               82E6ACD6309BA1B716810715666C6CDA
+
+Set 1, vector#189:
+                         key = 00000000000000000000000000000000
+                               00000000000000040000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = F9E151BE5EA0F532E56958F173B8F104
+                               DC9E73D8FA289CC2F84C4BB10E8EA769
+                               57FBC8F539365B9E9518F8787D6CF927
+                               55F0C2B2845318337F36B80E22C59FD6
+            stream[192..255] = 27FAFEBD2EBCD2B67AB18BCFB7F8DC96
+                               F54C8A765B0E4B3DDC3013B599DEF791
+                               287FF3C0F48F339DA04B667E54696485
+                               D48751A001B548727338AD6FB82EAE42
+            stream[256..319] = 09DC2AFADEECB86278C64DDCA51EEF97
+                               C10B9852DB5F33A19C99C0D4F36D2959
+                               DE247E4DB356E67F2951E0309F18D6D7
+                               27D2A1BADCC44DC320E2AA80E1834198
+            stream[448..511] = 4103D8455B6DAE658915FACFF2F3F1F2
+                               856E2343143671565936301E9D1F635F
+                               EA732C9A096C3E955D33770E244ACEA4
+                               094E390239489F4D4F0A1F3C26A1589D
+                  xor-digest = 8DF4EC7886C386E5A0D7201A3E731E95
+                               5D1E281321C2B592E31681CC95D173A7
+                               C92E6112197C6A605F494F6E9C4AE73A
+                               21B966CBAB1628794F0E44202742EACE
+
+Set 1, vector#198:
+                         key = 00000000000000000000000000000000
+                               00000000000000000200000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 8B9B0CC804CB353F49564926E3FD846F
+                               A4758692FB110A428FAA3132F4C606CC
+                               A41CA937FDE463D9FEC51F419D60AE60
+                               1E8EDB30AB09E0B08D0143D885161B16
+            stream[192..255] = DC6DFDC4E36FC1D4BD87F731F761BCC3
+                               9837A790DBB766040B4508778C5CFC82
+                               8EF9EC4D76BE3AE0967DBC844A2D252C
+                               B942E97A2C6A185ECF4E1200BF9BC826
+            stream[256..319] = A9DE78C2204B712A9803594B872F29E9
+                               5E8962D7D719702FB3279F053D311292
+                               26A14FB06058AEEB6D283EE0A272C6F2
+                               D392B102E294A7CDF24928D5281D024E
+            stream[448..511] = EB822D7BDDA456BB6E109ECD330D4FB5
+                               1259D7042935BD5DFC787E903758C27C
+                               E9E9B191957E721A7013D36E5A29C09A
+                               3433205956A55460D1498124B2800423
+                  xor-digest = 10128D9A5EEA1D93E65462702DB15A8A
+                               23D0FDFCC5B0871639D704DEB9F580C1
+                               C88213CA166F3BBB89D0926CAE7E64C1
+                               0A24041A42B9D50CB0537A0585EE574D
+
+Set 1, vector#207:
+                         key = 00000000000000000000000000000000
+                               00000000000000000001000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = DD4CCBD0B5068DF0193F50C11D2576E1
+                               A70040D6C2CDB98061498891D1791E63
+                               C4B5103A52146CE27D8F721E147EA612
+                               7E5BAE1FCD3DCD9053D5FF5EBA328BBF
+            stream[192..255] = 541F008D78EC1ADC5D1B930CC99D4A3D
+                               61BD60AAB9DDC8AF8594FCA129410232
+                               92BC44EE064E44E88A07ACD1B742666A
+                               D147F14102D23578E3B7DC00905586D1
+            stream[256..319] = 6834D2FB6BF3B46C0552AD83275CE6EB
+                               9482C2DFE40C6B1FD6F743CAC8F40A91
+                               5BA9A90FBE7CC0153D53C444D3F7A23D
+                               CDC3134E237F63E5A07C99C10B8EE87A
+            stream[448..511] = 9F75BC84091695FDAA2579AF9D34B2A7
+                               2B82D39A1E7FCFC4D18D6898A9CD3296
+                               0D50AF1B720E1347A0848782BE6AECC4
+                               684CCA05B893951A65EB7CB37F5FE240
+                  xor-digest = 12F358C7C4C697199F9AF17040115522
+                               062514A5DC3584BC515AAA4474A1D85B
+                               47A6A2D8C39E8234A5D11860BC1036E3
+                               957920C03E9A47E61AAFB058A9850559
+
+Set 1, vector#216:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000008000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = C5958694DB1D54B95101A9F48660CB26
+                               8EDADED85C6239098248E0867117607C
+                               D5278E5B5D9CDA7BE8A6BBDCE61215B6
+                               2A93FFF627B28B271CF2275E54EA1CD0
+            stream[192..255] = D9B69B25B5729759F3180FF17421092B
+                               0740B2E1307FA9141915CB8C30C0C322
+                               A1E4710674EE715DF3AC89F447442A7F
+                               845E154393273BA47F2322BC661D1755
+            stream[256..319] = 49412E5F3C9B5B52FF790CBE82D6F037
+                               217A13B7744740A887F7C1FBE3714DEA
+                               2A4EA4A5F444B2EC3C0B160A251CB44F
+                               8DCA914FBB80F72BC8D009F1C7E001EA
+            stream[448..511] = E1C2BE8C64D6BFE081EDD30681763928
+                               85939DD7EBC13E16D83C8E7FF65EDBC5
+                               90FA3904068784806E20F0A61CC73839
+                               E3BACD410F59D3848F5A628EE030FC4E
+                  xor-digest = 54092B3D64197BD598F9050B44D2E785
+                               029F29F46822B72ECA40182E8ABDABA8
+                               751054FC50250DF5AF5AC75F4C51D1D5
+                               D2BE298770C353A7C5D608D1149F1452
+
+Set 1, vector#225:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000040000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 633A6CAC516B7A84CFF8F5702CD9BC81
+                               BCE328741675EBA0FD1368190AB6BEEA
+                               7C8B0256CEDF9E5CC6F9249511AB87AD
+                               ED95BF8E11182B8BEB75FFA279C3F706
+            stream[192..255] = C3F700538A4EEA17773E74D10CE4493E
+                               FB0417B380ED4229F651D6A9BE0AC617
+                               AF66C576B7D06F2210EF226462004D90
+                               E753D805AB198B73B0CCD752C7E57A2A
+            stream[256..319] = 30A11289A9E0C854B980BE044F07E945
+                               06D772861896D0F75D739647FFB939C8
+                               13FE4BE5C8DF84F64827306D0DD82415
+                               E104F787F30CD097EED7DB9340A0F47E
+            stream[448..511] = C2134984733448DD577DC48B5EE5D761
+                               0A54AB6C32E3BB782849D8E7E8B522B8
+                               0D6444342ADD9709D7434F9B4C18C6E0
+                               15AE97DF8F3D29FA6D85DA387157E223
+                  xor-digest = 8613454AD0B424AB6EFCEA96C0802B6F
+                               47F1E98C52BC68DA25E653431CE31078
+                               1658BC45DCC2EB43C4ACF8395727133D
+                               12A127D4CBAABAF24BA44930A58A87B6
+
+Set 1, vector#234:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000200000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 6A0F095C0E23FD6F8DCAEDAE5314141A
+                               0F1CE1C1BD6A16E81FEFF72F0753A5AF
+                               C1C54DFC0DD6ED99F1D416BE3C5EF341
+                               454C18D49729E80EE99F37734817658C
+            stream[192..255] = 05A4DF5BE8A35DC623D107728F28C789
+                               3DE0E75268B3E1F94C07AE50CA0891D6
+                               2B1E764CB41062391B33929273CE6B6D
+                               1C9CEFB35C37AB2FA8EC18749B5292B0
+            stream[256..319] = 41C8AF9ADA46F7BE8EA72BB3B8661B78
+                               2BE5649F18F216B75A0071A6617200B8
+                               463B08F986D706AD140E27C8F4E040BD
+                               6BFB4872D758363281C62AE8C4B64E33
+            stream[448..511] = 58CDA35476767EF58748A504B0E4A38B
+                               64162AD422A0DEC0434D879898558C77
+                               1A8243DC43B15FF996B4C8CAD3C47C6F
+                               26F00C71ADFB538D9A983B7B624D6E62
+                  xor-digest = 240A699AF4DDBB56A4C502A9175C0E3A
+                               BBD654D0717A1F6F6847381B978AE8C8
+                               0EB7CA07A481DFF8606A31BD6B489AE7
+                               89763068D641BAEADCBDA9ECAC465ABC
+
+Set 1, vector#243:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000001000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = B3C91DA5911D7D7A4BC16A66988AFD3C
+                               8462A9E9BD0D95C9B9884DD14801E464
+                               C27048FEB5F70B28013099F0A31255A4
+                               9EACE528A13CB5DD067E520D183133BC
+            stream[192..255] = 756EDB0542FE1F11B159C7081D9CD742
+                               2F0E5862D39E2CF1517B2F6F39AE5245
+                               D659A5B93EB8FA8C8FB751B378BB0DEB
+                               481B874663624C8DC15E6A1A64376340
+            stream[256..319] = 436613C9293D5DCB204B46899CF23E65
+                               698BCC3003FE064FD1263EEBC59DDBAC
+                               536566855510FA802128F0A968A2E359
+                               FB68EAFD6AA89D394B32BF6069E92EFC
+            stream[448..511] = 033FF40203ACAEDFBF561A674EE74D97
+                               A535A448AFF94C8C167200E5CA626388
+                               DB1BD6EBD4A1D83CF352E97CD8F02671
+                               18E57B71D33930EC2752D2F262A55F9D
+                  xor-digest = 2CEEE4705688B20B3AF71F285DB9361B
+                               0EC945296B97F3A050C31C54E9A07CA6
+                               498B92917617571928E2663CBBAE21AD
+                               8DD880A037A024E46B6581974838AE1A
+
+Set 1, vector#252:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000008
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = A6AFA8AA02C3AE7F29E61202B4A5C25B
+                               6F74BCC176702C9C1D610FF722527A6E
+                               721ED90B871AEEC71EB62B24A8F24357
+                               07765F7724BA03173F51C9B66C9F4BDE
+            stream[192..255] = 002B8929A54C1370067A36DB9057807D
+                               DB747C2A4CE19BC085DDC517AADE3B97
+                               BB1B35F2BAA6A18E8154CD80DA6F9F4B
+                               0DBFD3EA5F69D5ED3B5770C6221A8D66
+            stream[256..319] = AADBBFDFC6FCC6072747BB528EBEEF34
+                               6DA76885CF1616ECFB89D3A134769902
+                               904AA12744DD404F268B0B4B34700928
+                               E3C4B3665B9CFBAD9C528EA06F89CCDA
+            stream[448..511] = DD5453BD0D99E7D2CFC558EA969A4E35
+                               743AFA96D570026106C5CF40037B1325
+                               40C909C1278DAC8369B1AC257FD8D868
+                               3648B4F22F7C66282BAC49D8D23626EB
+                  xor-digest = B3F2AD900155FD5D39768B4F4B7F8E5A
+                               1C557936F2B5F06966DCB884AFF7F01C
+                               7AFC073C20EAF85363DFF41357E626B3
+                               B19607224467413D185A05E7BFBC5F0D
+
+Test vectors -- set 2
+=====================
+
+Set 2, vector#  0:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 5B078985D8F6F30D42C5C02FA6B67951
+                               53F06534801F89F24E74248B720B4818
+                               CD9227ECEBCF4DBF8DBF6977E4AE14FA
+                               E8504C7BC8A9F3EA6C0106F5327E6981
+            stream[192..255] = 30DA9453A90909A5675D6B691CB0990F
+                               C423CDD8222EB47245BBB67BCA2B9C10
+                               8D1F016DF0CF8CEAF6829910916DBC1E
+                               113D11E91BEC3D85C47E3042EC865658
+            stream[256..319] = CAFED71B892EDBE13388CEF6A3365797
+                               E0D88C0D3A5B91BE4CBAF5162F69558F
+                               DBB45CA6F8C8D4C371D62736EC244584
+                               60131F54854F3EC804AA9A38E6ADE281
+            stream[448..511] = 531A0ED5D2A51DDC6499FE1BB6E2295F
+                               2C3EA0F56AF46ED93DFAA4E16F5F0831
+                               2D77BD0E9122043CD6A202CBA9351F6A
+                               0E8E6263F4017355136A0C551E6FD0F8
+                  xor-digest = 023D719F61C193E4CCD87755C87F9604
+                               C5A29DD7E31637B3DD70D43441D48CC7
+                               D474013C85EEAB1897C80ED0A0272543
+                               F951C72E3954616CB5D6B51FC24F4B0F
+
+Set 2, vector#  9:
+                         key = 09090909090909090909090909090909
+                               09090909090909090909090909090909
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = F5C2926651AEED9AF1A9C2F04C03D081
+                               2145B56AEA46EB283A25A4C9E3D8BEB4
+                               821B418F06F2B9DCDF1A85AB8C02CD14
+                               62E1BBCAEC9AB0E99AA6AFF918BA627C
+            stream[192..255] = 3B3C6E78A8F381EE2C159FAE1C487C58
+                               11FA9BB02CECF7440239FBB0497347EF
+                               D8F1A8AA71AFC70ECCD64E81388E6E87
+                               9521C2B47AD84F9CFD9E240D8D2F3001
+            stream[256..319] = DB04FD01BC18D91E2D31237AD0FE26AD
+                               3C8D6A2EFDAA9CC11BFCC61D94F6104A
+                               4091B3634FA57AB0AB9B209F22DA5529
+                               75C3C322DEBE4AE68623BFE1B2BB7F0A
+            stream[448..511] = 35B290F85EBA78A978750690C4747E8F
+                               72621951483772E8B89876CC5D55F3AB
+                               02D9B8FB35C741279FF9B5B571B26329
+                               4D011F813CB5B209CA1A22D532BF09B7
+                  xor-digest = EA9BB65E87C987EA64BC3F4E710CCC34
+                               F6CD0A795B8347E1441CEBEE35540D41
+                               64FC2B95D71FD47A2C4ADF732261EE52
+                               8125BE374FA4A90132CC1063971A2862
+
+Set 2, vector# 18:
+                         key = 12121212121212121212121212121212
+                               12121212121212121212121212121212
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 397F8EC015ED573967938D1CEAFE9BBD
+                               BD8853C329B3A881B489090853FE0F43
+                               89DA105F0ADFA9CF51DA2521C40FD2B8
+                               FB0BF80B93E3F2B3D8A8EB1C615E0FA6
+            stream[192..255] = 68E7DBF465E3C6994D58B9937A866E4D
+                               43A82A80DAEDBF29C048639BA38B690B
+                               7ED11323E3C0A8E77A16356705431EC9
+                               9F2CB7F7E1ED3B83EAF2CAEC00B00755
+            stream[256..319] = DA51CF3A07EBE7E86E9DDDE5A47E7417
+                               376F334E6AEF9C187012C8AD2B94BE7C
+                               00A876756EB232510FD0798E72EEC87F
+                               75EC1467C07B3A1EFB0D51A5FA65E382
+            stream[448..511] = 0BF3C6FF6794887F2776FD632B83682B
+                               AAFD131432CFD7D2F675E03320395313
+                               AD4ED96E9052FE6B2D2A17428660A25E
+                               EE642B712800BE3F7E44F21A1E6A03AC
+                  xor-digest = EF4E84DBD66497B142EEAC56B830FF78
+                               0465CEE20B9CFAF5727D4B3A588F4D00
+                               AAF718330CFF35508C44C1ADB8476625
+                               2CC3AA6AAAE74F8BF1DDB6D4AADA425E
+
+Set 2, vector# 27:
+                         key = 1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B
+                               1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B1B
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 72BC8A6E1E61E704B142AA00812EE676
+                               263C1CB9AB941119B19D15EBA3462F56
+                               2F69220595DE5E0E7C595FA40F1F06B2
+                               6EC32252AF05310809DDDFAE2E24B170
+            stream[192..255] = B29A740B51B4EA1080666337D5551484
+                               FFED6860A5125DC0573C8F90F23A98E0
+                               BA7B3E4C28C2CEFB1C33D2C36D1B7625
+                               64B9A67240CF174347A4C8D868F00F6F
+            stream[256..319] = 555ABD5577A8909797FBA9769C03A0F6
+                               537C06AFB23354F054E25457B729B534
+                               CD10B2ABD45BE3E38DAF1B7A9103268F
+                               4FDB4C0FC9A80A003FCB907E8F249AE0
+            stream[448..511] = 3B29A43D9C795DAF1760CA9EB57C0B39
+                               F62D54311207B617B727FCCE1B2E762A
+                               060810C4DEF672E7D76083E3E4BED0D1
+                               0BAFD27CDFD2C937E660190D36B3FD7B
+                  xor-digest = 0B3B0B3C69F2E4BDA22E25AEF352234C
+                               18CC5E1E3F6A317ED7257887446EF734
+                               65CA15F51AF5E077B7915062391D8497
+                               8F437985DD08F5FA3A8D74B3227A6EEF
+
+Set 2, vector# 36:
+                         key = 24242424242424242424242424242424
+                               24242424242424242424242424242424
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = C845BA29D542FBED2D021C85188E119F
+                               D34967B79D9F44635DD45D2E41DC5AFB
+                               B237AD2FA0E4CF4202D83DF3073C578D
+                               2AA8A32D30FB45DE28F23CEB85E50FBF
+            stream[192..255] = 15C910FDD3C590AED1ED7DA2A7969297
+                               FD12081B4B23F0A32CE5B3196173C7CA
+                               7EDD03F9637E08CA501C4850C15B207D
+                               7AA724377396CED2357B572BBF9E69AA
+            stream[256..319] = E484AF567EF80BAE77461855294E9280
+                               EF57E7366605785034D639D6DE3EBB0D
+                               E21886D0E1E0679BC2E2C9C2D9201484
+                               4A452B6AD3F1AC8B7762FF3C0E405B3B
+            stream[448..511] = 595D9855200786BB575FF7977509F395
+                               7879CA1F19619A99174BF013CB62F85B
+                               FF2C3C4FE724E26DD0C10D7635A2491A
+                               9E7E868D9DAD9201465AA178184D06AC
+                  xor-digest = 08737B82505F46F4FF282EF42F387AA8
+                               0450058F5314389BB73733BC163D75D5
+                               D32FC6408F8DE5F6ED2050027D605FAC
+                               A7119FC2DC1B6D3E84E8048DCC42FBD2
+
+Set 2, vector# 45:
+                         key = 2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D
+                               2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D2D
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CA82A689535CA8BAE01BAFEBA6504B3E
+                               6E6320101999BCE5550C2BBC9BC65D91
+                               FAA2D72FA4BF46B6EE916244048B1D09
+                               A115E3AB6C00BAC8EE382B58859E8157
+            stream[192..255] = DE787B1CE01B0BC09801D78D1FFA3A82
+                               0C18B867C561E96DF4ADADC5A4375E44
+                               5A34F9457E5F8C9A337A0C88DF0F723A
+                               D4509F1449DF2C6AEC0EADF4C7A8139A
+            stream[256..319] = 7E1854FA15DF9D5827F1555F12B292C8
+                               452A1A893EF034C51750388D294947EE
+                               3F505839C69C1708E8323C449C39A96B
+                               FC9EC91B0E1CAA8112057EB0389FDFD2
+            stream[448..511] = C85B42B838FB9C3D4956C9E22FBD8FBC
+                               EDD92C4461EFBA5CF1664B9AF54857BE
+                               C3D00319E5E8A89A8322831151EE1D52
+                               D8585AC79CB60B61ED2C852D04BB0FB1
+                  xor-digest = C65A6BEBC4FE898DB8D6B8F6E8F3680D
+                               2363BC12259B0FDB2BD8F052A572ECA8
+                               D1EF62AA9A48497805A413742B5AF5A2
+                               6DC9FF624B49E5D6FE58BBE5251B4983
+
+Set 2, vector# 54:
+                         key = 36363636363636363636363636363636
+                               36363636363636363636363636363636
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 9F6BCFDE566A1B67C608F11B8461E340
+                               42D4F07DA4D5EB05554CB7426D65C5EC
+                               A93C2D321175B6F72FCBEBA6E38CB098
+                               B72534F7D534B1AADD97B77E8513B482
+            stream[192..255] = B2466A173F436C8433F264CBF125B8E4
+                               C10BC81BD46B5C21FA161CB2AE07D27B
+                               F66812A2C2FCB2B14C23E413CEF4E591
+                               AD52EF810A000B42E5C1B76EEBB17739
+            stream[256..319] = ECBED2058DC50223614EB8635B834C3B
+                               B176719C18CA5E3D087A93E5CDF81123
+                               C6FB819CCAFB5042AADFED5E3C33116A
+                               FD92AA21031165A22F4751C423B8B945
+            stream[448..511] = 758BD9435DE607867DA256064C304C8E
+                               DDDF5B64173CF2C98B2842992F8C5FE1
+                               A37C3227B7F37D49A39F9FF929A883FD
+                               56DB8B1A174E1E55FCB21C9E1164C20B
+                  xor-digest = 31761A49503946701D35306FBCBE10E2
+                               02967E7EC14A328B4DB19FE79F03553F
+                               13A012B7297B2D02F18A216AD24A682B
+                               299518C3769123EE86A4937DAA9FC39B
+
+Set 2, vector# 63:
+                         key = 3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F
+                               3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 85C7FF83641ECF1C91B2D996D4EAFF6B
+                               26A4E7E34C0CA9CB9399F655E566383E
+                               246143F57776C8E08951E87F76091FE7
+                               2356CC901F09A07895A890AECF047B3F
+            stream[192..255] = 4CE0C6606195F7562D485E32E8E105AF
+                               C862100A07E55FB449BCFA2D9BD48658
+                               958B37B3EA3565FA66824102A14B5770
+                               5E3914E0680E116ED58212CBF61028E3
+            stream[256..319] = 3BB772A5A8DE2AB14CAC1ACBF45B1701
+                               057710F24C01E680F58090B8E949AF01
+                               8970A43A698A04C0C8639FAA665DA3AA
+                               562B2C5C3A03BCC38FE75DC1821ED718
+            stream[448..511] = C73DEA1F7BFE42DF75EA2681BEB31948
+                               821FBB049DAD15B988A77C0247868A38
+                               2056B66F47B0195FA30C9DB5A2334A9D
+                               CD7C0D22E479FAE1BBCDFFE60F261C7F
+                  xor-digest = 94D41CCAD940CED3C854DA0796DC62E5
+                               6B566A980E34F353CFFD0F53AE9E34FF
+                               A6A057645FE66D86BE30F93805D9E2B5
+                               D78C68EEBF61CE387277A51EB2EF835B
+
+Set 2, vector# 72:
+                         key = 48484848484848484848484848484848
+                               48484848484848484848484848484848
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = E45194379659D1D8904DB3698AF8B245
+                               762910B7FBD019AD1AA20A6C433B4C80
+                               308A9EA68697631646BF3A2107C4E7FE
+                               2235E8F3262A9DFD3F5CC23FEB0B2DAB
+            stream[192..255] = 012611EBCFF9F839DDABF99D9D4757DA
+                               4E947598C4757976F6F61DA5F0DAC8BC
+                               DDF72F08BA2F446FA37F9A490F6A2B6D
+                               79227C93271D6B763DA7B2A907220A42
+            stream[256..319] = DDE54F9170D6A4702CAF45CC6F799F74
+                               A43D83AB8ECBAC5206D108F869561D70
+                               F151A0037F8E28951B5026643F8B2D6D
+                               56A62E259F04A5EA304791A9468E66AF
+            stream[448..511] = F70794C084E6EDC07BA0347413B05FC9
+                               FC46994CA820CE4FC037ADBA50EAA9AD
+                               55064ACB7308CFCE3F35AD5C7C628362
+                               F4210FBC2D3264F734728626BABF5356
+                  xor-digest = 31815B36BA034BB1941DB1E45A941A59
+                               7C3882F34BD3BF441CAE8A9790B05BCA
+                               72049FD10C09A14AC9DB867A82C38A5F
+                               524C72F783DFD16980DBCDEB486FAE96
+
+Set 2, vector# 81:
+                         key = 51515151515151515151515151515151
+                               51515151515151515151515151515151
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 3C04E21F6937C4EF472BFDDA89F9CAF6
+                               FF53889A9979ABA8F23AA51DB1EDB8E9
+                               D08F696C1100799A7D004DEF1CA94110
+                               FCF0C054B0C131E6FAE0FE2F2DBF22B3
+            stream[192..255] = 9B4ED3EF9639B953186FC7E732E7A9EC
+                               55A5F3F19C5A10E12EBE46DD84F10385
+                               33837693588D584FDAF86E3A217C3CFF
+                               020278736F1A90CE07F0DCE4329005B9
+            stream[256..319] = 135FAD68B5282FE59B28D2DF66463632
+                               06CA92E84A73FA131EDDCE89A5C23B4D
+                               08FA57D455BDB32F8ED58DAF3EF288A2
+                               7C72020E35DAE19B446E4C52DCDAC5B1
+            stream[448..511] = 7D08FE1CAA0E8A0362669B310B99127D
+                               18F2111002891D3229102D72605B9BEE
+                               F5DA36059B0DBBA7646927650305431B
+                               FDA4A97570CD0C484BF1E974B157ED7F
+                  xor-digest = 5125E77698C0DAA89A7E47DC5D038D40
+                               7B732CE56CEB674CE653A1B6661B2740
+                               0C092AFF83BEEE4FC4543B9D725C9387
+                               2F89AA338222ED677BF59397200AB304
+
+Set 2, vector# 90:
+                         key = 5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A
+                               5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A5A
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = DA2E6F7FF0D1F1C87A97E028D3E20E21
+                               75E9AD91482965B651B495AEE819CC6E
+                               C42AFE2C20EEACCEC4E90710D17210E0
+                               4CC6832905985322C8007F872D3E58E1
+            stream[192..255] = 09B0A38E19DDDA08F7DFEF7D0FC80560
+                               D692A020F0A66F609374ABDCD1343722
+                               05F19CA04EBDD3009844BC540C1B2B41
+                               66D45E8A2E822B906DA34649E7FEEBB3
+            stream[256..319] = 6C8E2CE1D7FABA414432E75BA2EFE4AF
+                               CE2CFE99506677A956AEC86BD290B6AF
+                               C5298A448D0DEFA99AA5CD26D318982F
+                               E786D809C713D5A55B42CA6650191DDC
+            stream[448..511] = 845FEA0A88B521CCB8927C9457AD3225
+                               EF6E3C21705EC9FB24873916A2C24668
+                               963C03FE097DA8224A42A99E5DFFDC17
+                               68CF518DE49CCAC8A70216C62C9CBA6D
+                  xor-digest = A46BFD9D2D0BCC688A032F54733AB7C5
+                               5FF58B296071D5D39349A531E41F0BA9
+                               893A1722B6102740BC5FE394A49363B9
+                               6A626AB43FD6A288CD9B23F7255279F8
+
+Set 2, vector# 99:
+                         key = 63636363636363636363636363636363
+                               63636363636363636363636363636363
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CF0E05248AAD82F1C8CD2095ED2DA333
+                               BCB02E3AD8797377AE1F1B4D6DDB86E6
+                               2A59791CB553550E0492FAB42C7A2C42
+                               3157C5092D2DD37D46589F17FBD86584
+            stream[192..255] = 9E946626F1EAAEDA42E52422B4A84D91
+                               4122EEE5736BCD12061C77DF5B0122B5
+                               1784E946B4E93470170ACDD7E2779591
+                               57BCC9B9F3E11E88BC2F740AA0C10C97
+            stream[256..319] = FF22D8196AB3DF662210D12D0FE79255
+                               6DCD39611C07F089979CF7D693A30CA3
+                               5B795B7F6D64931916E717C8BFB92114
+                               DB75118BDB51D142CE8133415C6B3456
+            stream[448..511] = 971F007EFE17662D95F47F4F28266516
+                               B22A1E50755EEF19149DE3A3121F5FEC
+                               E0D9DFE7A055026CA44193542D7687EC
+                               695B97769BF02F92C1EF3D904A8010C6
+                  xor-digest = D1C4878BEFCE48888A43C6DDE7CC8163
+                               C8D54A4CA36748C74721C7B6E1649A31
+                               4B5B7A4BD43E7C3D2A22F0C8446C7892
+                               90D54D421D37CB16400E59CC86215CC8
+
+Set 2, vector#108:
+                         key = 6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C
+                               6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 54F122FC8ECFB176E7F4CF172B2D78B6
+                               54BC11ECF0010D2AEB9F899130F4AC2A
+                               38EBC15C8831D591E6675DC1CE7A471C
+                               4B869FE83CBF37AC70BAAE5D4AC607F9
+            stream[192..255] = 518F298A6008532EEFECB3DCF72103BD
+                               5E3F84FEB6EA2311E8C19A2E93A9C3C3
+                               BB1DA7DBA78D5618D1C4FA5B0B202728
+                               62645A361E55494D66C9359E41E5809B
+            stream[256..319] = BAFFFC9206D1D813F3E2768F08D78B2A
+                               89BB20CCD92E7F13FDD816DD4E4963C2
+                               C5FC2570CBB8BB5C70848B73001F508F
+                               47AF179528200F51CDC6E4854EAA63C3
+            stream[448..511] = 844B1D15FBFD1264169279ACD525611F
+                               A39C7BB41F1E7A1C09090625F7926E51
+                               23A4CD7FE1A3F37ADC67AC437BF0A5AE
+                               FFFC6FB0ABF39D9908145004AA5B958D
+                  xor-digest = EC67596C9DEF4012A2D543842829306A
+                               4285A3B8038818F265065DC848BD80FE
+                               C27C2F66A57B27F7FA8AC912001EC954
+                               05BC6E93D7E555C59060F5D2E294D103
+
+Set 2, vector#117:
+                         key = 75757575757575757575757575757575
+                               75757575757575757575757575757575
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 91D2772A18995DB3C0801DD3740F4466
+                               F9535E5BECB93DDCA0E94D19C0B57BDD
+                               0FFBA9DAF0B11D55C852927F8BA560EC
+                               4999E25848D08FCA7275E7E8571A5F1C
+            stream[192..255] = 72E64FF10CA9F07CC493715724DA7610
+                               9E4358E8B0CAE451348B784A162DF036
+                               AB9796724D17FDBF356031D080A6631C
+                               D1E8D217B041AD2EDF427972653206B2
+            stream[256..319] = 4054F770C93FCAB533143FFCA8E4C0F3
+                               344956C29D10374E502C2EDD177ECE5E
+                               6625BAD9630DAD57976216CD69865058
+                               130B132FEC1AB0C350DF4DACE4C7724A
+            stream[448..511] = 40B4A4DD63F7B6E932482D0E6F5BBB90
+                               E402466550B518A177CD05985D238827
+                               BD92EE7EC22C274F19E682F85ABDAD95
+                               D0EBB3DB6C6134408353C8B0472C9A1D
+                  xor-digest = 9A6C893F2108D13A29373DEDA65386C4
+                               AC356BDDD4A3178952F9126E322B7AE6
+                               83C94F1A131CBEAFF26549D9F84CF04A
+                               1241FA374B055B0ADE7E49E8EC669E65
+
+Set 2, vector#126:
+                         key = 7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E
+                               7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E7E
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 87A7773A3514EB7F882F2C491E90DCF3
+                               059C5CC575D806B9029CCE3FA45A246E
+                               0EBD3AB2F2E324FE36ADC3B56AE2F7EF
+                               C710AA964CB87381386C2A88B1308035
+            stream[192..255] = 415D6F59DD004944D4E45FECC6F1F06E
+                               20BEB18D9C84187C347F43B17E0924F1
+                               2348F825E106E57A00258CE4415294D9
+                               4323A9812D8A71359CEC1001BAA0D567
+            stream[256..319] = 8E20F0D03F37EF4B2C5EE12B5F81F7C5
+                               32D62E779FA0D2D08F8ABB6B0183A4DA
+                               4EE0329215F261D953150B9AB9FCBE2F
+                               568AAE361EAA8636ECC01A63F007977F
+            stream[448..511] = E7C44F44E06321A20E25F73E2069757C
+                               90499DB7E60025CF6D2D445E53A665F3
+                               08EC96F6FE73C0AC90D7E4A712E18C2D
+                               3DED46DFBAFA24C4B0B329E52C525976
+                  xor-digest = 22035341489FA6EEB2A6488CA42F4043
+                               57477C3F55569A1224EC39B1019E90C8
+                               21D37D78ED4DCEAF6EA70724C3751760
+                               38CF25DE4F84BABD80424D83A310881B
+
+Set 2, vector#135:
+                         key = 87878787878787878787878787878787
+                               87878787878787878787878787878787
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CEC0C3852E3B98233EBCB975C10B1191
+                               3C69F2275EB97A1402EDF16C6FBE19BE
+                               79D65360445BCB63676E6553B609A065
+                               0155C3B22DD1975AC0F3F65063A2E16E
+            stream[192..255] = 5E12BA9DE76F9ABF061782EC1C4FBBAB
+                               3373B816DA256CAAC37914B0C161E4E4
+                               5F5ADBE444098A5B2A4CFD4251D79918
+                               987BB834BB50F0834EF4985F356B92A2
+            stream[256..319] = D89642D25DF97D149AE07EA18BA39497
+                               8935978AC34C1DF9F444986D7505DB4C
+                               7E08DB3616B84CD52E7DD7FB108C36B8
+                               B50C2573172F4D3500B6D62A9D20B82A
+            stream[448..511] = A2C17FE7371604556F796429C6BE0688
+                               8611638B310F3E9FAF484BA9EE29C16D
+                               2F842EAF33AFEC557B68D2F453569187
+                               A6F4CD204A0E7A733E81AB7CE9FCAE81
+                  xor-digest = A7C93087CA70DDFE5FA5F1F2F954320B
+                               6E3A61977A7C6AC2F033B826AB9A9957
+                               66671D2A1025CDF8E2824B2F58CB221D
+                               2A68679239D90152FF7D0D39B33FAB93
+
+Set 2, vector#144:
+                         key = 90909090909090909090909090909090
+                               90909090909090909090909090909090
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 7118889F6E46A6523BBEFCDB006B3BC6
+                               71A6D390BC7099A708D370DCD0E3D143
+                               A0334619EBD5C7DA9EF6301F29273F85
+                               2DFA3C580ED65C6E952F88A0B7FE368E
+            stream[192..255] = 31D61E133CA1AAE400CB2DBBAE93C75B
+                               445792061AA0539DA69ED0B77B970C0B
+                               482156A5DEE4082A61364BF06E692399
+                               FB9F4411FEC515291F8949B20F57229E
+            stream[256..319] = 993E815F299D4841518119BFF88F6EFB
+                               F3DB9BAE60238BDE2845DE4DBA6D79DB
+                               C9E42BA5C3C004AE4546FD86C660FFC8
+                               FD6A8A349669FFE3D9E5BDF8E50A407D
+            stream[448..511] = 0F9CEAC6BDCBB56B7E97DDC95877B2B2
+                               1274F4A6D814B5440C74D53A3FF0735D
+                               EF01B14AE4188E215CE7337C04871688
+                               7159695A241BFB9D6B489FE9E23B2AD8
+                  xor-digest = 0BD5739ED28778023E6303FD88DAABC4
+                               0FA0A211A1A5C5F230D9E67DDD9EA517
+                               FEBCDF0BDBC107291B6CF3ACD8B862B8
+                               4BF15400493A54036E97FDEBB9A1DB2C
+
+Set 2, vector#153:
+                         key = 99999999999999999999999999999999
+                               99999999999999999999999999999999
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 236ECC5AB83DB1C5CD1C5A888CFEA2DC
+                               BE99E7E515650511FF7016A0EF287ADE
+                               5A03839C4F83F05FAC3B0B24D4E3F602
+                               3251F8D9CC4530A805F8A6A912EFAB1C
+            stream[192..255] = 792823ACE2C0DDB266A118068AE295CD
+                               716E424D3B98A9DB2501A3F5DF7DC70A
+                               3BD2C6E664D5E13317D6F57B8774C903
+                               D407D2BB6014E0F971141E89569C5868
+            stream[256..319] = 2D6ECCF738FC00ECD5475EDA959A73BB
+                               304C81FA9DDE0C21592247C4098D9347
+                               1DA30294DE8C100E5B17A199F744CAC2
+                               4E33490FC7F223FD6B4923056117C6D9
+            stream[448..511] = E791A6BE7F7593788E5D627F5CDAAB59
+                               349AF2BB1DA2BA622B9824F729929098
+                               BD19DFC05D0D9454F604960C027752F9
+                               7812E53DE6AC6CD2751AB331703646AF
+                  xor-digest = B7C5CE0D2FF66533A1C948C425F33FF2
+                               DC458E7E517637596FC8FB710E2E5636
+                               DB1F14848CB12793D54ABD0856B22F3A
+                               ADFA8C33AD08B8CC5292DD76913CB105
+
+Set 2, vector#162:
+                         key = A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2
+                               A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2A2
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 74490D19F13E7C6D1B25C6408E23F229
+                               8A8806402755660C4A30CD216A500BB6
+                               AE975E08EC62D08425A8A62A71B00215
+                               DE35E5178902348698528CB82296F009
+            stream[192..255] = 51A6EC18829928EE94C37A5CD030CC4C
+                               E4F7E1B3E78C3A5DF07592F45B968BEF
+                               F95B8B257DAF2B468284627AF4481FD2
+                               67BE0B164DD86721DC8C1607A0607EF0
+            stream[256..319] = 75C565D5A5A240B003273F99BEB3E4B3
+                               9C056162B626F383F3E77B5C98C0FBE9
+                               119A7C335C333E6490126AC2510CDFAA
+                               86441C72D1DD9ACBCD3FEFC0D0C794C7
+            stream[448..511] = 2D90CCF0B43239D725E3B53C31B82754
+                               246C065AD23A8D709161FC74B34E23DB
+                               B918EAFA4465125D3780BF0B5803AACA
+                               037AA0A14D977141B611A6CA2278B634
+                  xor-digest = FEFDA1A6E95920B93380CC24FAE214C5
+                               6B009ADCB176D519CA4B8538EDFC95D1
+                               6CA06B730B28A230F0085FE43CBEE2FA
+                               2EE5DCD74D66F5CBB59F256CC1ED885A
+
+Set 2, vector#171:
+                         key = ABABABABABABABABABABABABABABABAB
+                               ABABABABABABABABABABABABABABABAB
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 22E1A884ED2C67CCB2977105649B6544
+                               367858D1A730AA2FA96703FA406B337A
+                               B2159A389BEF48D8A215D870B2968E16
+                               B11571F12BEC0A07FA7D3B9790987EC7
+            stream[192..255] = 4C98DD259D03A40AF38E0ED0F37CBD74
+                               B27776E9250B8B063E52E169C7B76A15
+                               0D699278AA4124427B5EB6AFC4AD5DBF
+                               600FEAAA98A88DFF297DACA5ACB4878F
+            stream[256..319] = 5FC732A26406FF0DBC764ACB05C83484
+                               976B640E60CCD6ABFB908583ABEC3E75
+                               2878371EBB5374C9B37A63E0768AE10B
+                               D857253D940AC408EF49EDD590E806AE
+            stream[448..511] = F012E429C44D5DC03B88123855B62C0E
+                               90E06759306017B5773752973850531B
+                               C480316CBBAEDE6353AD5FB298349AA9
+                               16AC0221A4CE1E4729BFB9C230AAF9FB
+                  xor-digest = D73B872315F9052C67C4CFC5CD912DBD
+                               60DA32FD06D9C8E804968E688898200C
+                               1D979DFFCE52E1C3B3309B58D12BDBB3
+                               D3EBA2954D1587D720E004E12EB4A13B
+
+Set 2, vector#180:
+                         key = B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4
+                               B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4B4
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = BEF4DD0101F80A8F880BE0613B2AAF88
+                               D2EF924014F7445ED922E9C021571909
+                               D7E6BFCAEE0724F2A9C522C4BDE4BBE9
+                               FE53FE592C0FEB80D2C7A51FB8BE9EF3
+            stream[192..255] = 6B1966D3EE460999FF09001B0ADEC484
+                               0D22CDDFF39EB0E3D5FDF74C6E7B3394
+                               A0A4271D780DE6DEE9AC58B4903EEDD2
+                               6DD14E14A4DFE506748D5DCA6DDF4C5A
+            stream[256..319] = E79D99119996FBB5163335E2F79F0502
+                               7AEA5372136E7B3C5BE1F4A673A2DC74
+                               60834B81BE6C4976C4A727C8E6046A64
+                               4CAF42EEA6A068B7E532581E9037BE9F
+            stream[448..511] = 5C4F52E0E94884C829DA1FE88EF34614
+                               9F3EE55A136EFA3B417DB63D2487DF82
+                               794E161B3153DDB2E1E4F385E1A848C7
+                               729FF5CB1CB58D5E73FAB1F2DCEEE5AD
+                  xor-digest = 2F3C231B0228C274255F3BD314ECC7F3
+                               1B9C49177009AFF2CD88F807092D77E3
+                               C74C1B9B8650F581EC7603F4D6E70955
+                               1B00C3192414C04AB0AD8B0B9BCFE988
+
+Set 2, vector#189:
+                         key = BDBDBDBDBDBDBDBDBDBDBDBDBDBDBDBD
+                               BDBDBDBDBDBDBDBDBDBDBDBDBDBDBDBD
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 05AF4F98E9D526CD7912F3E8CAF45410
+                               DED6D4E331633C5621B94E7EBD15E856
+                               04AB202A553EFED55A548C7AFFCD2550
+                               60315FD50A305D8BCAC9C077229D34AC
+            stream[192..255] = 786D24EF3FBFF6883A4ECC4F40E445AF
+                               3CFD130D5B6A9CE37BEBA429AD137A82
+                               44D0586FEB16D086F533D1885A82F73C
+                               F2AD2C645591F80ED09942F0A08D898C
+            stream[256..319] = C214B6AC700164FA66DE346A27A99463
+                               C5B6C0E43A9057384BE168E163058FCB
+                               6E7DEC871C6531EFC8B8D581EF92757E
+                               219294D39E0C9C8276440BE56C3D9941
+            stream[448..511] = 22CF14F5BD70E719AFE76C53E5D611AE
+                               4C8D2171695C9CF97E2936A8BB320670
+                               015825547A508EB43D96F2EE1EE2CB34
+                               4E120F001500F8ACC3E19E30455D09D0
+                  xor-digest = FE5928C74EA21F23E29171E5AAACA20C
+                               DD8571E907763C96B99A8C11F9A1D2F5
+                               78F68A6C440996995F7AB6E69B3CCE33
+                               CF8CE0C16F54355696D47DBF82EA8D56
+
+Set 2, vector#198:
+                         key = C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6
+                               C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6C6
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 75559677D7C762F6CFED942D800F2FAB
+                               AB5F3892DC2C79922E96FD34FE511C11
+                               251C8EB7C639E531CE08A8C99F62E7BC
+                               F68FBAFF99D62348FF91CCFEC2710055
+            stream[192..255] = 149806A4D862EEA81F0208D927339E5E
+                               C98E9C2A6E0DB85CC0380DED7EC5B8AC
+                               4ADAE76AEB9C7B7264C3834316209615
+                               25221D58C0174577110596FF89C8FC69
+            stream[256..319] = 137E527A0ACB8B96A9FA07890B60B78B
+                               3CDD19BF89B31FF75A814F470BF97E0E
+                               1293B750B769F5BDD750DE5025D7534C
+                               AD541A1F26C6AE9AC2FD3237C156AEBB
+            stream[448..511] = 0958243E88921B81F04AE63658E52D76
+                               CF2638495B3A6B970633A7C8F67B8CF9
+                               AC378082F72FC63BEA02881CC5B28D9D
+                               C8C261C78B2872B5EBFC82336D6E1A28
+                  xor-digest = 0084D7BED4953402FE8F7FF71A28CEC7
+                               0028A08A00EF935C06A8B3632DAD5914
+                               84E44E372A753F8E630741266C0F4218
+                               4923608103042C70ED4ECC5112B9AF6B
+
+Set 2, vector#207:
+                         key = CFCFCFCFCFCFCFCFCFCFCFCFCFCFCFCF
+                               CFCFCFCFCFCFCFCFCFCFCFCFCFCFCFCF
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 0C46BF67A3DBA5DCCF8E4A7A65B6FE28
+                               98C701CBF5E88F1F3DCB6B873E5CAEEF
+                               23024ADA678E1A2CA9E25AA8B476CF4F
+                               9FCBC297FF03A9B94A5A736274EA776C
+            stream[192..255] = 73B9891D1770289A67D6338909FB6282
+                               9A425B7947FC30DC52B11E398E85B1EB
+                               537E1C02898FEBFC15A9172C254CA55A
+                               AA1B56EA856F47E37E2F252D92D94ED8
+            stream[256..319] = 6522D372F90F2DAC155D48F165B6DFA4
+                               38B63B9F436FE00CC075C585297B8F90
+                               E6062358D29641FF9C28EED4A23FC53A
+                               6B5C60C2AF1E8146DB27CCF5F43BA838
+            stream[448..511] = 642541A9733946827D79BBD815C03C17
+                               6357BD6E81E9A61FFFD4A0BF6863AC71
+                               72AEFB92C1F235641BBE1457B724A6AA
+                               AF9FAC687552A778B034C4A4F8E41ADE
+                  xor-digest = 9DDBC1E7D31379D027B4F3DFD72C3668
+                               BD0BC5A97655978E79056B3D25DF3E79
+                               5D5D8BE5D1AAE877F2E7D03225CB6609
+                               6EFE11CBCB728039A243E326437CE73B
+
+Set 2, vector#216:
+                         key = D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8
+                               D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8D8
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = DBD4E866F4E24E7F66816CAF625BD07F
+                               1F7BDFBB81428FFEE9FBE14DF5F5F3D8
+                               A044EF53A868D989E16165A0F2B95E8D
+                               83439BB4805A125AD0CA7994AE11B852
+            stream[192..255] = 7CACC4E7B9B1957ABB22ECB9D9D67184
+                               EE7A7F4B822A1C955A69E238022AA313
+                               276C2003E27AEF1B4F94B33A6428685B
+                               F048B357EAB297B7DD98E612F054A317
+            stream[256..319] = 286B484FA80A45EE4D5300DFBE173E8C
+                               978B976BE1B6CB0D15C0324D6B70D265
+                               385B615B3EA97A55D94C47F53FF40861
+                               4460857AC9568556AE54A52546B41B5A
+            stream[448..511] = B3AD999394343F6F0BDDD0B1FAE2E3A6
+                               5BE2BF56D2B78A401D5761E2F3AF8B18
+                               A2B1089864999D9B99E5BF6959F8F802
+                               975FBF204D6159CF23F3706CAF0D9BA5
+                  xor-digest = 0957D6887501D4360C430614B67D99B5
+                               32849E2F5C69CE8A9F3F707A2B5438BD
+                               0C1237B5617FB525CC9C043A10DBB265
+                               3C3F0A353E89A19838B8F68542E09526
+
+Set 2, vector#225:
+                         key = E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1
+                               E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1E1
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = A6DF8DEE1EF7D1AF773AA3E9651B645A
+                               50CF101BF065F69F3E78BEF5D689B1D1
+                               D306FF41EB3E78BEB75C4200937CFE60
+                               E89E370680C519B2F64E23516ADF8062
+            stream[192..255] = AA30580A210B87727BE17EC52AAAD037
+                               3E0DD11FBFC89B37825CA4D6F9E8D433
+                               E3EA54C37D678B58CE834AFA310F6D4D
+                               06B4603F12DBF38595AC76511D0B13CF
+            stream[256..319] = 5F3E1A55116CB67BC91C8E37182EEEEC
+                               8FC9B09DAA6F418D3434BFBBFF6BFFFB
+                               F93F8A963F2F51CC487BE868F010EC0B
+                               EE17A480542A301E33B36F59BEE13D91
+            stream[448..511] = 672048756C221C12DA6178BE711B3371
+                               525A92BC9A219CABC5501B0DA4CC248B
+                               8742E8BCBD6F5A1CFE522F3DF3BED6B6
+                               5D60D1AC737ADC582C2CB9751521828B
+                  xor-digest = E7CA739E4DE0E74274E491CAA9BF5CAB
+                               3F418EBEB69509D69B2594E964759D15
+                               104F674CD44681AFECC3B4939CA0A0C9
+                               DD7AA5726653ED3FBFC833DDB0C87B42
+
+Set 2, vector#234:
+                         key = EAEAEAEAEAEAEAEAEAEAEAEAEAEAEAEA
+                               EAEAEAEAEAEAEAEAEAEAEAEAEAEAEAEA
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 2479A8F2872A813D16D15F060D300237
+                               25297B812F6F3B97D74D9716E4403A5A
+                               684D2BFD1E15275470FEDADF1578277E
+                               44C6C06B8A5FCE3D0CCC5E13BF49947C
+            stream[192..255] = DB2F9B25F9523FF5C2CCCB808EFE07F3
+                               132D4B0065A563288F848E05EB45E48B
+                               D15C069C02F90B4FC10AEBF1AF4BF90E
+                               2CF7F48C8CD7A8091014131EBC21FBE8
+            stream[256..319] = 84FAF79797E25BF2CFD54E58F5C7AC1C
+                               EC170B064429EB832924CDA9C47B5174
+                               9BFEF80D96FAE36DDA65659FEA1CC06B
+                               4EA3A1601A3304AA4DDBEB62381FD4DB
+            stream[448..511] = 2C8FC8D23E7DBBC37BB0811D1BC71145
+                               BFBCDBAE19F5281CD0E6AA37419778DA
+                               64DDF68726DD7F4D78BBBFF4576C2AAD
+                               93F477A2AB2C3CA8A381F30BB944C7B0
+                  xor-digest = A6D5F0DDFC0A43491D6D0A17C095C070
+                               9EC7E9B89DB8EEA11045ACC5FF003DC9
+                               CD3318BB6F9675EEF20E15490F525066
+                               AF8380C663B60EDBAE30663C94C39892
+
+Set 2, vector#243:
+                         key = F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3
+                               F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3F3
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CC3701E703946194401D1BA23AD99B5D
+                               F3F856138E142D4B9C23DC9F252A277B
+                               D62DAA33A71A0C61079AD5A20562291A
+                               B6EC92C66D7BE6A17E27D4DDB48EFD31
+            stream[192..255] = D00665FC0A4ACC78758EF25B0B0D6903
+                               D565423614409AD11E821B83F5B35D83
+                               F26F3EF9EC1766FEA9C21C09E0AE248F
+                               4BA01E48BCE09D06471593B3466703DD
+            stream[256..319] = E8B4EEE2C8BBEDBA758C1C2D0889FDDF
+                               96CDC215EF1A62FAA29A5608C852FFA1
+                               18B473C5A7319446F3ED2E8AB39A533D
+                               714325D1B14E838C9EC6E037DB0DD93C
+            stream[448..511] = 4FF3B43841B17A279002EFB07324625B
+                               7E937D480DC73F12836195110ECB4DB5
+                               CD31CA4F92F612A95E82815328DA7D5E
+                               4DCC5BB6791603EDA64C57B5A5AAA04C
+                  xor-digest = 9202B874C48D4B1A9E857E645EE8F884
+                               D971CE97923AC024ABEFB944E34550CE
+                               31712BB832F9174F86FCD369E75CA9AD
+                               85095F43A4B7F33AB641BD6912D2C59C
+
+Set 2, vector#252:
+                         key = FCFCFCFCFCFCFCFCFCFCFCFCFCFCFCFC
+                               FCFCFCFCFCFCFCFCFCFCFCFCFCFCFCFC
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = F374DA745A5CF93A567027609E5D3B1D
+                               5C3C8A4D15203705D978AD42279F6548
+                               51FF713F5120CC93D044EF717F5A75E4
+                               98DBEF559E5F157A8C819E213E93B3F4
+            stream[192..255] = B270F638AAB88DFF69D724F79B70CEC9
+                               175AEAA99D55485954B265B5CAB86509
+                               C810E664766A8E6C90D4BEE3A58B1815
+                               9076959FFFA2F30EEB12343E9E7778C5
+            stream[256..319] = B2CC84A1127B5333B30EC81CC14307FC
+                               418DA96336991A27DADA74FDA987B867
+                               B125C53C0E4E2889FDFEFBFB48797A22
+                               2836B2EA42793CE2BFFD568F6234B368
+            stream[448..511] = B70F4A10A1B75D499E8189C8B92AFB36
+                               4CD2D730DC8D7E183EC55A777C2445EB
+                               BA7E9CD95C8F3A206B73C422AC2E2C08
+                               15A8C6FED156FFF93B63DE512EF69725
+                  xor-digest = 467EDA43B849054EE747A532ED0D9AA4
+                               6EA1BF2B6AF19F481D6E3D55EBAA96FC
+                               6629FE65B5EC4B5EB6A155A6D60FEA32
+                               F04F8230E26390F1C8FA53D47B68FEAE
+
+Test vectors -- set 3
+=====================
+
+Set 3, vector#  0:
+                         key = 000102030405060708090A0B0C0D0E0F
+                               101112131415161718191A1B1C1D1E1F
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 7CB997D6E1B46DD7C0A9629B441C3771
+                               14D6C18F230291FA7EF0B039AEDCC9AA
+                               A4AE05BA13F3931E3F8373AA320A8BCF
+                               28E825B2084D0FA486BE52C92C3C6F14
+            stream[192..255] = FD4DC85E176D76062323B2F5B31E219B
+                               786596F3DC0A2AFD31AB48C5F911605D
+                               556399114B0779F43221FE5BDA899627
+                               BA6498C210D5AEC5FEC8733357571F77
+            stream[256..319] = F00E84A92BEA966DC8359FA63B12E8E4
+                               F5611F6C8CDD04CE9D605D770B2EAE49
+                               D6976272057CF275EB5B4CC434EA9B0B
+                               8CD9FEA22D7E919097CBB36C5D239BE6
+            stream[448..511] = 110560BCF38CC42478036CC228E9DBD7
+                               4C44863DAFC81B528AEA2893FDBAC7BB
+                               2F68CCDF566E1602623EC9AE283EA69C
+                               C032E90E409F368E28401AE6905BD4F8
+                  xor-digest = 9CCCCDF3F7D712D6E3931068138F9A9F
+                               8640478BEDFC3C7CD0802954234DD07F
+                               99F4B072D9847DEC2E16FAD0ACCB3609
+                               16243175C84A317191A98AFF5EFCEED2
+
+Set 3, vector#  9:
+                         key = 090A0B0C0D0E0F101112131415161718
+                               191A1B1C1D1E1F202122232425262728
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 0889D6D9E155FC208941B945F2B15362
+                               3CE5C79122C1085FC172836FA9B06C0B
+                               50910CACF399EFC9CD9CC484786AAC8B
+                               377972E9A90D7EDD40A59FE1B942710A
+            stream[192..255] = A540BDE9860D8687A45D8CF22E00299A
+                               36BE590AC92E70BA03B8A5F2898C2D1A
+                               B9B1E5C87C4B10C9B6E08EB868AE3B10
+                               3BB95C30831B903A3A9620ED16B96210
+            stream[256..319] = 90E2A684D3960A4B1DA5DF19BF569288
+                               5A23892F2003AF2319FED9C8D37B8702
+                               7E61290E013FDF93683829DB99C177F0
+                               222EDD6A0FE3D5F7F903D3CC15C6C6DF
+            stream[448..511] = AFE7454BF77E3CE1050ABFC2E25F9B15
+                               011F33B93660EA4AB5E7BFC513F2D787
+                               27F8008ABC1E14B06C36F7750AE88C1D
+                               7AA2F6EB9F2E925CD6CBDEC5FBA3EEA8
+                  xor-digest = F1A8C58EA8459686DC5BFA2A81E80653
+                               EF6141903898D1A3C7298358A79D674B
+                               A971C106CAB035722F246D3E67D34543
+                               3E71DD374DAF73036EE55E6C0ECE5FA3
+
+Set 3, vector# 18:
+                         key = 12131415161718191A1B1C1D1E1F2021
+                               22232425262728292A2B2C2D2E2F3031
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = EB11D29C989FB09961A673D8412360B4
+                               F4E6DF0169A3CE207656A7C72D6FB8D0
+                               95CB3A7A6CECDC2E167CD35F62A00110
+                               EF09FD32B61A8B405A3F55A1313F0DFC
+            stream[192..255] = 8ED27EA005A3E298560C829380D4F1E9
+                               F0C7FD5285F04AE6FD66C94CC07C8C51
+                               EE8163B7414A52B0594C5F7F80104D95
+                               0858C9A52F3C156ADAA025C00B180429
+            stream[256..319] = 12DA63247282599F2C50B172CDB4F31B
+                               20952134800FB8BCE743BBA90E6485BA
+                               057A9C5E0989A8FDCEF1C88DD54E920F
+                               7028EB284306FE6A87B0FE063DAB9557
+            stream[448..511] = CD447E9F58BAFB77F6E02AB5A692120D
+                               EC4F7BD597DE5C54523A7944DBA6A3C8
+                               D00000D3E70F7D9292B7135A7F054812
+                               4B98680DEF6631D2D10E0E7B08F188BB
+                  xor-digest = 6EF765CB84937D5E829A1A1664EBD23C
+                               B474FEA3C5AB137F2D9B35BBE0816EDD
+                               B26EC14D74EFD0F9768C521A6FAAF122
+                               B5E34A36344FF0F0DB3CC2F2780D05E8
+
+Set 3, vector# 27:
+                         key = 1B1C1D1E1F202122232425262728292A
+                               2B2C2D2E2F303132333435363738393A
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = A71D4189D1338531D3C03D00A480C8B8
+                               49C779B7E113FD8D59516164C161EAE3
+                               AEBF74542FFFDC2FF8C2666FD5AAE413
+                               19072673F958F498F8FB9743BE46863B
+            stream[192..255] = B0B3803396AFF1646369B6FAE62EDBCE
+                               5254E7C8FEE88F9EEE5D8A7B6D44ADC8
+                               B89895198E3C147FAE0C9B8325EB3501
+                               6EADF77C5D7F402CF3168448D2A59E23
+            stream[256..319] = C1CCE6956C8257947C004528F568E3CA
+                               BE9ABF891E2FC2B52D9A1E6EC97A22B1
+                               FFD1C77E50A17CB47014C9EDA1853AFC
+                               11526F6268102780ACB3E0F120398AD0
+            stream[448..511] = 765857312C8994EF6BC7259673F02E38
+                               B7E0A764FB70534190033FB1BA86D5BA
+                               3BC6851DB596970A2F60831EA1A31CAA
+                               96085680CBCFADD9C5F0330CB72AB5E2
+                  xor-digest = 30EF19DE0E750BBF6AB3FC924742CDCF
+                               62B2FE5F25983BB9777C727679CAA39B
+                               1280AB468051463E7EB287AEEFA5AD0B
+                               9C9DFCA45A3124D5F41F4B0AF5849E62
+
+Set 3, vector# 36:
+                         key = 2425262728292A2B2C2D2E2F30313233
+                               3435363738393A3B3C3D3E3F40414243
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 2B9B987B7CADACD2FA50A53A9F9F44CF
+                               4ED11B3E25FE57F1372C6D570B470AFF
+                               5FCF3BEB89D0692D873EFEBD26EAF3E1
+                               1B6892913F0CB27F3CA9BA20AF7A98F8
+            stream[192..255] = 0148F54B1D24F3D69A2086D6938898F5
+                               25BDB1B1F78C5F92BA21FCE803A52591
+                               FCEC9A1AFB0FB3B081CDB1D79D254845
+                               40EB9D624B5E113A4F143716722687ED
+            stream[256..319] = 271FF1107AA8968E0ADDA5371F40224A
+                               D8E134AF80D5ACDC9803B1B3A9819BF4
+                               8ECC3A68B303E1275FA97222F7E984EF
+                               9C73899433230FD746DA6101DE37ADA2
+            stream[448..511] = A66D3BB64C35C71BBAA3F5410F388253
+                               2B32897B1CC1AD610F3AA195CDC1EB82
+                               0262E817374384BFBE200339B284ADF4
+                               BFF6960B6A41AFA9D7C9B67B19C14C37
+                  xor-digest = 3CF10A4A8BA3E0DA3C0B63F1B913B57F
+                               BE47580DF7D90B13459A9BC98B93B014
+                               1185E910EDC0A5B37206542B17CAB8CE
+                               F050A4ED3D7097B6A0738095E4BF7A77
+
+Set 3, vector# 45:
+                         key = 2D2E2F303132333435363738393A3B3C
+                               3D3E3F404142434445464748494A4B4C
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = F32665A4C73608E133D85712D2CC9A76
+                               6D2B83311B3F44564A56A97ACC9B6492
+                               B282A2E62A435A7B7799073E010C78C9
+                               4B7B5BD1B25994D1CE31B51CBB13BE90
+            stream[192..255] = C9F24592930A0A9148486D77C1FFAAA4
+                               4E4EECB088D6AD38D73B195E576BEE56
+                               E2CDA968FEB85D19BF89391813501B02
+                               EAB39A2E78B8CC7456EE60EAC3454051
+            stream[256..319] = D8E1D09F074708379189BBFEB1E24053
+                               E0BB5980FFD0371265320C3047F0ED36
+                               A65CA8D0DDF20DC25B552E1882811C77
+                               6613DBB4297DC6C89E31529DFCD17C82
+            stream[448..511] = 8012813E7879B3E99C40821A97469BF3
+                               9D2EF3B888E3118275F47F8C78A5F7CA
+                               19A98B1817D2D7734E69C5ED43773D68
+                               FA100E2C37F40FF8E018DBA52C5C239C
+                  xor-digest = 8AFB9CD876AF4F9693FF4FF511D89957
+                               C8BB31D9DE3F21B726667681F805FFF0
+                               4B50850696D6C2E5C271D199CF49F1E6
+                               D366C7824273E99360BD5A294E415F0F
+
+Set 3, vector# 54:
+                         key = 363738393A3B3C3D3E3F404142434445
+                               464748494A4B4C4D4E4F505152535455
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = C72B0F98EE5C2D44260E929C70DBF174
+                               02C03543483178C8BC129D67FE2746E2
+                               E881F8439E2A11EBB3716ADB16207BBB
+                               91454A71C444445CE64003F0BB1F481D
+            stream[192..255] = 5590F4278E78AD19293525095C2F76E3
+                               B35A3858CB5912B62304180225BDC985
+                               ED955521436DEC441B9C742B3C5F4CBE
+                               94B99689048AF93E48472980D058807F
+            stream[256..319] = FBAB34E9F432546EC8C52750DA4D2278
+                               4C1323D4E3F4E9B63E65A7E3C8B2637B
+                               AA5D0A3B897113F68C63CCB78B5AB40D
+                               0A0DC3EF1EB09DF5C4770B343B6B5155
+            stream[448..511] = 78B0144CDF2692F0D0F164ECC8621F5D
+                               A00C401007B82AAE7753712FD6185E9D
+                               7ADC8CFEA6D5BBC2F3EDB8BF2C77718B
+                               6A424BAFD30C30934FC645FF05704BB1
+                  xor-digest = 835B5361A9C1F88223DE7BCA09030CD4
+                               67065AAE99198645029CC0AB9B9BD579
+                               14332392ED7A433A64D95B44CE228860
+                               7E029235580276BCAE88F37418FB641C
+
+Set 3, vector# 63:
+                         key = 3F404142434445464748494A4B4C4D4E
+                               4F505152535455565758595A5B5C5D5E
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 804025A410EFFBA58647A9F4B443BFC6
+                               1CDDC30CA04DA8DAB3EC6A098A830D68
+                               2683B59B76C60C09938E67CB41385315
+                               E2504B024DB808923B0909EFC25F0927
+            stream[192..255] = 7A4661190129E3F349DA7B44DAAFC388
+                               5E4BEEAC9308844DDA45E8E06637246A
+                               0E6C8C7D94C5F710CB78CC6E0CA82870
+                               8CA77B6266B41E3ED6BAA2940F1977A5
+            stream[256..319] = A3EBC22126B6069C674DB604F8C22B54
+                               DA68FB4390617E86C4FF089344BD0DB3
+                               887B3438E8EF8207FD89B2A485C0B383
+                               22AEB69750AD054F843DCA7995BB58A9
+            stream[448..511] = BAC68211F125B57B8CE5E42E644997F5
+                               2FD4B8A7D5CBF89ED2F6B5F4D4C7FA5D
+                               0CC34212160C6BA536BB7604C184367F
+                               2E088528F3B3A0A1B20F9249711162B1
+                  xor-digest = F628E74D1EB94591694631F1B2F12234
+                               38B056789D5C2ABD8CF34D9FA7B8C304
+                               5A8C2298B7BEBB90C7CC86895693118B
+                               2A43B7E8AC7E534DA7965EA720F19180
+
+Set 3, vector# 72:
+                         key = 48494A4B4C4D4E4F5051525354555657
+                               58595A5B5C5D5E5F6061626364656667
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 40409D9AD4CFCEAEB8FF613D32B59180
+                               F5DFBBF44C1B7209AD1AD5AE94DBBF3A
+                               83EAB34D2617ABCC396880BD5F5D220F
+                               F434DD575E66CA74BA32862293113C5D
+            stream[192..255] = 42D9EDDAF89B93DAB4AA790BC9C45BAC
+                               5E94575E175C2EB1CC08BB39019E25C0
+                               9B0F4F435ACE371BD9235C61C56A362C
+                               B1A64EE58F4938D59073C5A8A1BA679A
+            stream[256..319] = E40477D1B6C901AFCC4A2C429845C7B9
+                               0DF890C317A5B9D6368672C58E0BD5B2
+                               7E42DA77BDC2BF47F9AD195F7C192B53
+                               24FEF88E6B3DD1669A068E3FCB58B203
+            stream[448..511] = 7616AA094DFFD4BCF94E03C9CCF95C31
+                               8F247AEBDE281334F8E6F46271070BC0
+                               1AC838D8FCFE18865DD30949C68052C8
+                               6E93815B4EA9480B2D0B6A5D9888E597
+                  xor-digest = 1FE60024F188CC243F7D8221D990ECE3
+                               29E89847C9BD60AF23061E9C27C4908F
+                               B00D8813E680F00665658CEB077BEFAB
+                               5DEB41D3547DD645DEDBB3BF5D7B651E
+
+Set 3, vector# 81:
+                         key = 5152535455565758595A5B5C5D5E5F60
+                               6162636465666768696A6B6C6D6E6F70
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 1B8DA47812BF2353C17C89AAA8695E9F
+                               F553BBA44087D262FA0C710B69765F12
+                               FFE190625F58DA899B56FA7AB5E0E674
+                               4CA2B073517B9577712D7155E16A874C
+            stream[192..255] = CD2BB4A6C3D7211773421014611B677C
+                               C0A8107544ABF4F914F825891E52DDDD
+                               76EFDBEE614573FF9674EBC154A3283B
+                               439ED8197E1EE0705955A8B6C8AFF8BD
+            stream[256..319] = A626C40CD2C48AAB016C29020096DE28
+                               F03842E785BCE9D9E385D0B13B63F82D
+                               789588FFAB07B8CC0FFC62AA86D37CAE
+                               5CF8FD43B575F9F4D6E07465B700D47B
+            stream[448..511] = 16A3C84858207E141022D228079D6067
+                               2784EBB56E3B84F7DF07EFC69060E27C
+                               D1311E51F5893AE6BFF80D34464DC60F
+                               61985F8F88164CCA69EFAE568BEB546F
+                  xor-digest = A24EEDA74185884C5B287663C3F5F031
+                               2743CCAC657C702A29E0C20BDDE304AE
+                               A54A9292B447039D50479B6CE475115B
+                               8791854540E15D642859D10561AEF26A
+
+Set 3, vector# 90:
+                         key = 5A5B5C5D5E5F60616263646566676869
+                               6A6B6C6D6E6F70717273747576777879
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 3F7261A3A4691A73441762D113EB7817
+                               4C515A96C5C93C514EE559E7F78A633A
+                               01F0891910D44A7EBB18768E3B912488
+                               6069CB5304E79ACA89F62EFEC4EAC11A
+            stream[192..255] = 5F11904F72123CE29D1D883AE5CD2A89
+                               2AB26C9167A24A57D6F64BDE3A8E1A93
+                               7C5347C585226DB44B6252AEBF3CCAAF
+                               2D5E60C56FBBA6068B35AA6A61C84A44
+            stream[256..319] = CD6C5B784854E0121933E77C700D9C1D
+                               7452999F859798499A339F78FCF84615
+                               A3190A2F558CC529E636922A1B75A3A1
+                               AF280FB3F486303093DC1564EA0B6D3F
+            stream[448..511] = 61B8163A84540727204F0B18D9CAED3F
+                               B5FA87089FF4E721D2EC34D21C59B93F
+                               95297725780DF04A5FE405FEBAE80AB9
+                               B8307B9A74774E76063F9218CE243002
+                  xor-digest = 944EF8435F32FF2A67CDA5FBDFE02C81
+                               0997D9C8192633A193D6122A051B801C
+                               15555BDF410917B9E5DB86F4DE8B9874
+                               3E9F92F903543AD14087F4E13A915DE0
+
+Set 3, vector# 99:
+                         key = 636465666768696A6B6C6D6E6F707172
+                               737475767778797A7B7C7D7E7F808182
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 71BA7454CF7F6CC93C89EB22B9D608EA
+                               0FACBB4358DD007421DAC1E65EE99161
+                               C542DF02611AF497B2D53748D0129C0F
+                               5B9704C8A6017507EEFB26B6287662CB
+            stream[192..255] = 92D5D35B2E02D204E68C1AD6C018DBA6
+                               7A1C90F563AEFC3D031FD3F7D4F5E2F4
+                               C47D326A9C49A0B2ADF03D9E7E429AA3
+                               ABF253E623BFB9EB040B5F5CF1FF68DF
+            stream[256..319] = D6C22BEA96DF94CE9D5D34E6231CE4F9
+                               A2D2F6097540F9A9160DE139E2E80D0E
+                               5AFE08131FE10F0DD7367E43D314D7F2
+                               2321B5F89DC64F286576BA599A58F48C
+            stream[448..511] = 43DC3ACAE02DBF68AB5B65A81630474C
+                               639FC4DD36FBED518B6471F7C3E70FDE
+                               23CF1E128B51538DE0D5A47F20A554F2
+                               09668FE28B0C4884888FAC438960CE7F
+                  xor-digest = 7B0EF650F3847E3EB15EA1CB64EE7189
+                               AA5B04F527661C00F4603E48CBE59F7F
+                               48498D80F6C5ED956ABBF97E6910EFB8
+                               341C7BC2E81E66A4B9474BE420DFA5A6
+
+Set 3, vector#108:
+                         key = 6C6D6E6F707172737475767778797A7B
+                               7C7D7E7F808182838485868788898A8B
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 3C4CBA573D803324D099BE1F436F944F
+                               EE506CE77EBC01FAF0060B76FA5D2005
+                               05CE94AA15F3C4B1E0194264CF13878E
+                               FD36288EA4C2ECBEEB76828EB460AED7
+            stream[192..255] = FFA464FA648309E295314DEF7169DC60
+                               F63C90AEE9F27B534E11D25AEC454823
+                               DF6BD39C1F9CB46276C630C129536506
+                               187251D638D3867E96A84BD570F78461
+            stream[256..319] = 6BE88BD0D2257CF7EBF7100B442F68C1
+                               ACB94B6F8991C1461D318BB80E59A6EB
+                               8009DFF46B8E339A0CD4FB285ED1E433
+                               5FDBD65537D9CF1FBB0F9F10E17952D0
+            stream[448..511] = 909997D084DE4F6C910D57DB89E1EB56
+                               AB3F9974E3DB5935D59917CACCAA31CC
+                               E009324E52334BDD6CA971AF49982122
+                               B195229DF0BFE2C508E981D303061B2A
+                  xor-digest = 8B2B49D564662BFB29A9F4E1A3DC7664
+                               774D41168EA27505A2A518DD94C2A507
+                               0D28E1E69DA2F084DAB024E8EE2D022D
+                               BC73071B8559BE2FCBC2AE3605696482
+
+Set 3, vector#117:
+                         key = 75767778797A7B7C7D7E7F8081828384
+                               85868788898A8B8C8D8E8F9091929394
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 6EE8B7E51036B951205064348C222881
+                               624E9FF59DFED40AC6CDEA0945A39E72
+                               AD05FA929F7AB69BE8234567734F8F96
+                               D74DE6038A463BD8FB86224F5CEA0D45
+            stream[192..255] = DD9CD1757A95E616E99590E76620E9DF
+                               0BF811F73B70C5CE982FC9CECEFFC6BA
+                               F7DCA30517A9BDF44515262ACF297AA2
+                               2CAC3F216C12A9D0D6912578DC672D18
+            stream[256..319] = 0B7DE245062DCC9B1D8A945CD9A04938
+                               EB9BB258B4B7BCC263487B3599B1C6BE
+                               7FDE752D65345F00DF90896DF53244A5
+                               AB111134B36A99E2D2200B4D2003A520
+            stream[448..511] = 2566E8427BBAC7F0A35C6E4BCDD326C9
+                               D7164A9E1F767038A09A75B5076E05AD
+                               C51F008E9E3184FA4DC6E4764B381944
+                               BCB96B57FCE2339A01501BDEED46F8E3
+                  xor-digest = CC16803D36710AFDB1DEBC653DA7DD12
+                               F45B02349B87C3006DDCAC1635956846
+                               E4D7D6064D19012724BBF836A7DB7A3E
+                               3C12E6288F546EF316406D9C5E844BAC
+
+Set 3, vector#126:
+                         key = 7E7F808182838485868788898A8B8C8D
+                               8E8F909192939495969798999A9B9C9D
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4F4169DF51C9865A20D7E79DEFF7B121
+                               BD61F4C79AFEDD0598F55E9D9A3615AD
+                               19292095DDD83904B3683722A3337BF3
+                               4E98F63EB19927155E176F2E8D5560B3
+            stream[192..255] = CF82F8F2A46A898915B3E371BE941811
+                               682A8A0A20837AF471B5CAA4B4FB01E7
+                               F2B0CA9ED3BA70BE305587F1ED995946
+                               223032F94BB2ED7D418C95F202887E6B
+            stream[256..319] = 219C121E08F7458BD657AC4131221C78
+                               43DB5817B17344922C54A002F3F67574
+                               BEE5F7FFC7EFC5615444B51FDDEE8B71
+                               981FBFF658D2504BB53C13D0342258E4
+            stream[448..511] = 55C2A93F43F260EABBC1A173AAF80A95
+                               A7EA74CCEF6E29C52957AB2247126336
+                               CEA5BD0D08F873AAF733B3A11885F04C
+                               58542B4C8ED3E1BB7F7918C4E92926FB
+                  xor-digest = F69FE6EFBB4A6E65B517445069859EAC
+                               A9C19FCB9C1771E75266E5B4C39019DB
+                               E959AD97F2B8D7F1688FD0AC04AA7C2E
+                               602F28A63DEAA49A7BE1422B47CFBE00
+
+Set 3, vector#135:
+                         key = 8788898A8B8C8D8E8F90919293949596
+                               9798999A9B9C9D9E9FA0A1A2A3A4A5A6
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 3305344A71266B450B2CDEB049A048D2
+                               6171B39A88C25CFC0821E4F4EFE378B0
+                               702DA31652B5E1BAD9FF4C19C20BF329
+                               639D5942DD2209DB1D1474B6A7B41B76
+            stream[192..255] = BBD9714BF2C343B11DD7943DD8CDA8B4
+                               C6A913F1DBE21A0582B3FCFDE91B61A9
+                               8863AAC17D07D8F98AE8E71BA5636251
+                               49FAB3EA775D3C7735BFC732C3C42571
+            stream[256..319] = 473F161607321838FEB9359B0006068F
+                               9D88B1A073DA14E60AAF1501F3A27350
+                               53E3FCC794893257CC3C1D4E1E3CF609
+                               975E865CA46C892823C838822AF0CD2B
+            stream[448..511] = 89F37A53F18778084307D0BB71E5712D
+                               32F0F3B7C2201D01D892F6BF6068E4B5
+                               394995CE6BFACF08587ADA39CC647DAB
+                               9B12F5505055F372FDC4607F0355DBAF
+                  xor-digest = C9E7E4A4D6782C02AAC4F47AF1D142AF
+                               FAE569B755E880C6B8A5773EFC0E63D2
+                               3D7A113738CDB1A0544175861401149C
+                               753D723CC1EF515A9323DDE4B4A765C8
+
+Set 3, vector#144:
+                         key = 909192939495969798999A9B9C9D9E9F
+                               A0A1A2A3A4A5A6A7A8A9AAABACADAEAF
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = B7954C45CF301CCAED3F1E7E77DCE45F
+                               2D41B3B1C1F28F0308B8AB4293B64A60
+                               AA7936DDF062613DC1C454033D2A40A5
+                               E99BD975A26185A7F419E7B337028FAC
+            stream[192..255] = 27AF957AC6C514514C24664AA0C9C23D
+                               B1EE30950177389876FE4FF2E1739912
+                               A09E20A2098751049C8925334960A324
+                               5ABB50F3D333587B67F153DB145B5F6C
+            stream[256..319] = D94FAF9FCB753E992B898178373A36D6
+                               23C6BE2420AC2EA848130073F086164C
+                               9B4E69B024991FFA8FAE94E3C2FB16F9
+                               D747320A748DE9FAE4FE9E6A7E7D5659
+            stream[448..511] = F664AFD3EDC0FAE88016C8A028E98D34
+                               A27843372C6BF8F51C7B49B94A11274A
+                               6A161D776E6C1FF05358F28426C3579E
+                               053B4137F8C4CAE07B994B80DA06DA27
+                  xor-digest = 521594487B583F5F71DA10E2316187F2
+                               2A4885A69D522F82F7FD0D5F93F69B2A
+                               060EB60965AC010BC489B401F02C26E4
+                               FE3F82B83C964B4DB4E0E6BC2CE4B865
+
+Set 3, vector#153:
+                         key = 999A9B9C9D9E9FA0A1A2A3A4A5A6A7A8
+                               A9AAABACADAEAFB0B1B2B3B4B5B6B7B8
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = A5E320FF65811FF5E8934F3AC73B3733
+                               77D3AC52446F64646946BFB8F6DEFE3A
+                               04E859DCCD9F421D2DF541F588B9C204
+                               A9846C7AA1C017D637D7C5E244602105
+            stream[192..255] = BB16A9BDCA0D4BCA589A34F9278AE55D
+                               6A7711EC87563C9F394638041CBB0E40
+                               4CD2149218D501D3B62421CBF81C6576
+                               FA659C2878839FCD6C8DD1BA38F46E6B
+            stream[256..319] = 58B4004C53EE64CD45BC4A1F11F700AF
+                               0EA5ED86C4BBC145C8F588B7F708427C
+                               D2292D76329E4DB1F289DADA687B7784
+                               DABCCD29B8C464CE021856FD06554F76
+            stream[448..511] = 1113D37AB2964AAE6586AEE1B060F0C1
+                               02EB3AF048A59CB709792C9080183CFD
+                               2A1A47277F413F1219B5AAD7C8BC8079
+                               246BD1D6F98C11997E4ED0F68E165D9C
+                  xor-digest = 512F4852425DBF91234DA31986732CC3
+                               1F9649A1965E22E18CF38979EE6D92B0
+                               83333422A92F841C25F827782FD7BDB2
+                               8F4B40AD5EE53C37192651A86F03A17E
+
+Set 3, vector#162:
+                         key = A2A3A4A5A6A7A8A9AAABACADAEAFB0B1
+                               B2B3B4B5B6B7B8B9BABBBCBDBEBFC0C1
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 96328CAA099502092359F397972568F8
+                               EE2FF1C4305EA06FFD8CC125CB10BE85
+                               65EA30B621437AD4CF9CE731185720F2
+                               0CFE17DD45E6361A8212EECB346D391F
+            stream[192..255] = 74F26B7A37D673DA0B78B38938C5C1EA
+                               2AC666612468F63B540EE7B17548F8BF
+                               60A9845BECCD7222620FDF7BE904FE24
+                               7D2B7EA749C9590133CD6A218F6EF624
+            stream[256..319] = 8F8AA7A4C64C3AEC5E85581C53E3FA64
+                               22CEB927E370C7B0F98F038E7ACF4D05
+                               B54430D91B0A2CDC001BFDDDCD0081AF
+                               35B67E5BEE6B8E113F36E3B23CE29F57
+            stream[448..511] = 53E20B4B90B2DDAB40DC30643AA5F539
+                               70ADB65DD0B64CECF3D3B4C0567DC818
+                               0362FE9CDF920526C59725AE861940A8
+                               A32C35382571F2FF20E7FBC504E1DF9D
+                  xor-digest = 8C7C45F50A151D551E9EC81EDFDD5B2F
+                               E676E14253FF38EBEA12395040643211
+                               3254B0B7298AF77F8F9F4203B971EBC9
+                               B9850152A96C97BD4FA7BE8592670903
+
+Set 3, vector#171:
+                         key = ABACADAEAFB0B1B2B3B4B5B6B7B8B9BA
+                               BBBCBDBEBFC0C1C2C3C4C5C6C7C8C9CA
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = E8DBC8E5D18C5BB2B152A6AE9487AF35
+                               E2044F30EE8189659043923E579C70CD
+                               4A5590968600AAB0F021F7AF283D61B4
+                               13C739DCFC22632E1F6CD553D4F21976
+            stream[192..255] = 8675941731B385016430C9A157007EBB
+                               E9BD8BBBEC44081C1F5E73C7E783AE90
+                               1A7F56A20E5DECD1E94E1C92A07CD2B9
+                               91619BC3358AB812D58E0B98EA288D03
+            stream[256..319] = 8D09462E5B1154175513CE7FAE1AAE89
+                               EA2AFDFDF1B39D69FDF60B1954BF81E1
+                               62F29468E07C251E2D174E9CE924A5F4
+                               8A470D1808C68ECE534CC08204C5A2E6
+            stream[448..511] = 60C5FD4C1831F0EFD70EFF86A5D38D96
+                               2C402453561D0021A51F07D40A7D3B8A
+                               DF455CE484E89437DFADC52A52741B80
+                               ED0EFA9AE4FC39659F8300AE9292B9CE
+                  xor-digest = 12E57044A8E7F02EBF6912BB73836FFB
+                               C4A2F47AE1B824AC97C1237B1B14DEFF
+                               12B5B87DF14A8B5B6C85C0481BD69DDB
+                               FD76FA307F4C1F7D21E60C0BCFECD3E5
+
+Set 3, vector#180:
+                         key = B4B5B6B7B8B9BABBBCBDBEBFC0C1C2C3
+                               C4C5C6C7C8C9CACBCCCDCECFD0D1D2D3
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 540980C2A3794C04B93696B90E48999D
+                               ED8E1D3F4720918C80C95B9AC0E911F4
+                               6593C4A920AB291D98891374EF286286
+                               2386B5FE17654278EC413AAFF1C384DC
+            stream[192..255] = F3E036D7620669F851A1B58BCE57B079
+                               F5D75829EDA4E68C36F086CBF2E5DD78
+                               F7F30C1AD9E4CB3C01B7F2FBF53A8AFE
+                               957786B2D3E9CCFE7D6FB24397803BC0
+            stream[256..319] = 1AADB95F07E6268BD82ECF3453DB5014
+                               9745CCEEA9F1887B5F257594ABBFFF43
+                               C3187BD9A9FFBCCACEBD7A21FF90D18B
+                               57FCBAA64B8FECB56D5A7FE05BF03E3E
+            stream[448..511] = 4170D41CAC2A7AA5A3C9228BF386B9C5
+                               57795DB5D1AE547A31C553F55DE02E6E
+                               B69D76A984F4F1D84F29D5CB98190C01
+                               441DEEFABDBFE405F22FFDE734D9497A
+                  xor-digest = CE103B99AA95B51D2D6CC54A15833E34
+                               A11778F5E05BB7AB61505D473228069F
+                               CB40015BCFDD3E1D0D5E1F832791C8DD
+                               3184273D1B4C67D800EF5FF004660440
+
+Set 3, vector#189:
+                         key = BDBEBFC0C1C2C3C4C5C6C7C8C9CACBCC
+                               CDCECFD0D1D2D3D4D5D6D7D8D9DADBDC
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = CA30678AC97B4591E287FF8B5E28A838
+                               611D654A4EC592328039E3A1DFE90FAB
+                               BA5A37133E821E0960520EEC850B6962
+                               B0378E77770681ACC0929D16DD260925
+            stream[192..255] = 79FD1893EBF30CC2CA9C5AE92B0C063D
+                               894EAE4BD50BF462420081D1CAC57A5B
+                               AA92E73D3B3CEA147E1F7127AE1F6FA8
+                               E9B302A068F26157C904E0AA7B7A072F
+            stream[256..319] = 6880FCE56677345CF1CFB2D38F890C15
+                               FE33D377922AE43348F5590B84426EC9
+                               0DC2A3863136790EBB7BD9493D2F0808
+                               CA9287CF95AAF366A11D6E7A556FDB02
+            stream[448..511] = F385299A7038DA8A90058C510727F3E4
+                               524A2D95D217A1C199552753F253D45D
+                               81DA40431910DD54B619A15C5C302411
+                               613D28D53493AD836251F0047FB911DC
+                  xor-digest = F3D10E261AC596959B4AACBCF335D043
+                               FFF65E2651F046D300C19510E1677F1D
+                               45F287DFB8C17055A012C234B6EB04C5
+                               76ED2EDE12DFFE6EBA4A39A64DDC573A
+
+Set 3, vector#198:
+                         key = C6C7C8C9CACBCCCDCECFD0D1D2D3D4D5
+                               D6D7D8D9DADBDCDDDEDFE0E1E2E3E4E5
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = D5EC301FD496586D54D9B21FA23DECB2
+                               B25DCC0784BF77DE84898AF96023647B
+                               F1618234A239F63FBF3478FD6EB79299
+                               66BA9B670C64118444C95D31405873C9
+            stream[192..255] = D455D37F435FD0FDD6E1EDF8BAC28D2E
+                               DAF587F938C49A5F58C32CE8D5B8A4EB
+                               884B016E54277300D461FA21512E7695
+                               D2D7489A4560FC7A72A510219DF1C5C4
+            stream[256..319] = A7B93D8B7787B6C8F80EDCE72D4D644F
+                               0C6400C3AD0443FDD19C3F3675083F4C
+                               E5ED87032B1813DDFF758854C8D889A4
+                               6FDC61C210058DB72D838A0913D80611
+            stream[448..511] = 94232F4284F46DD2E7933F9635C26C48
+                               6CB935031095777F59BDAECC4FDB4109
+                               9037C38C91620586DE93B66EC7376502
+                               6853B7390CA516B694583447DD863310
+                  xor-digest = 8596C088FA66361FD90A2132CE33FD52
+                               34910610DB006D223B0574F21BF1CD4E
+                               C282C67B24AF6DB0DB70BAFF65D5D8D2
+                               1C3955D466EA2B49C5E8EB7E07475919
+
+Set 3, vector#207:
+                         key = CFD0D1D2D3D4D5D6D7D8D9DADBDCDDDE
+                               DFE0E1E2E3E4E5E6E7E8E9EAEBECEDEE
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = DBA2DF9ACC53C3EDBB566C28F689D7AA
+                               EF631CB44EA91610A94685FBD862C9D9
+                               BFCF512BCECF36E035E2E577F6BF6EF9
+                               E4B0E7623E0DB23B10055677C7B9F857
+            stream[192..255] = 8C78C9714577E497E3CDFE3ADE19F03F
+                               D2DAA3211C1E9E5D9F21FD1ED696354A
+                               B7552BFC7FC675FAFE7A739F6E60A839
+                               547F8F15BA5EC6F75BB05606BBF209CC
+            stream[256..319] = B23F187B1BFB5A728BDBD78B75C3265B
+                               B04C6B350A4DA4EB021D6191263F052B
+                               CAE73E5776002FF05DEC3D341AA20D2C
+                               FA523E6B92329A979BE06CF4F848A1B5
+            stream[448..511] = 7E2ADEA91939388D36B3F97DC87C2A86
+                               BDE7BB4884C40D8A202964ECC7440987
+                               1C64B03EAD0F46A3A1CD2CB935DCCD67
+                               0B43292D5B852B7A1B3D1F853EF22EC7
+                  xor-digest = 1AC1E42C2DF9858537D0A1BE3B2AC094
+                               54136E53AE56B006395969C7F999B2E2
+                               DE1DAE62740FF339DFC8769F67AEF352
+                               C4726B4AD4BAAEE56AB8C55FACE34860
+
+Set 3, vector#216:
+                         key = D8D9DADBDCDDDEDFE0E1E2E3E4E5E6E7
+                               E8E9EAEBECEDEEEFF0F1F2F3F4F5F6F7
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = BB00F8ECA9A10D2B137257E86B455DBD
+                               F9A6A861F19533E38C3C9F54195AB803
+                               171D35043FC9C4204AFC9A8E72EDA4CD
+                               60220B2EDDEBD5482D7833979C15B685
+            stream[192..255] = 6CCE94C2BEBFD223AFB7AF1110F0F6C4
+                               01AFC533BABD84F8C4A54E8A239A194B
+                               B56E0CAFDCC59B9B5103471DCEB9F706
+                               7801D79530B7CF40F2DEC73A169C7481
+            stream[256..319] = 5144745E042B76A6B62E78C92FFC1C0E
+                               E59979CE4B2E4B2CAFFDFCC5E75510A9
+                               201E8A97A6A1729E35CA81D8645FC118
+                               177DA5FACA0293B972AC0957C43BB1FD
+            stream[448..511] = DCF9B6116FA5EB9CFDBFC8C97EFD89B5
+                               268C0D529141FC3C8262B8BE38E94973
+                               A21919D498FCC3896B0FB4CEB24D9E2A
+                               F728003C36838638888FFF1D0D526B37
+                  xor-digest = 99EF8A7D0B8D08E976EFBAE56F7CAA91
+                               B1FFC7428EA56B7A697AA3B621AA8DBD
+                               52681C7A9A415049AFB6B7D8AABAD024
+                               0F9C3112092816F4C69D36B1300ED3E6
+
+Set 3, vector#225:
+                         key = E1E2E3E4E5E6E7E8E9EAEBECEDEEEFF0
+                               F1F2F3F4F5F6F7F8F9FAFBFCFDFEFF00
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = E3DAA6E498609DDC5A31BC0B6ACC880B
+                               695097D2CE2D1FD162C7802DC0D00BE3
+                               C0126CF947CEDBA7833421D70A914BD6
+                               C33B0A77BE8BA10879D664F054C29302
+            stream[192..255] = 0015EFCCDC554D042531FD570C6B26D9
+                               059F4F4DA675BCD12C038E4A8D16737B
+                               AAB0D7992340F4EE4324959E96930934
+                               21234D41F56A995C928F82944B46BB19
+            stream[256..319] = 8CE7098F4C64DF2E8A170DA3D02CD99E
+                               0169B99A261D1072FA116ED39244EDBE
+                               73EB9F1CDCF8CCDAA9E94C0DA9C6EDC5
+                               426751AB8300836435BC6F727F793281
+            stream[448..511] = ADF85AF30894BD0207DB4BF72D9DBAC9
+                               144EF6B24E515D96475897EADE40A92C
+                               79B818499B8CC328859561D79D727423
+                               BA81055F3387608E56173AA27D286924
+                  xor-digest = F47ABED85910334919B5868D4531FC15
+                               24D61CB16C23920750C73E2B08A4B5C8
+                               C621482F6D9F01EB59763C5F89AC1514
+                               F6CA4C40216D6385F304E9514B014C02
+
+Set 3, vector#234:
+                         key = EAEBECEDEEEFF0F1F2F3F4F5F6F7F8F9
+                               FAFBFCFDFEFF00010203040506070809
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4728A29A2F2BD276FDE176CF4A38BE65
+                               B84BDD41F065DAFEA8302334CEF92A5A
+                               306EF904DADFE92E3E975EF9EEC9B3C8
+                               4AFC167545A0CFCCB6B1CA688967D8EE
+            stream[192..255] = 734153A78089B6E6EC0F520D39BC3FAA
+                               E1DBAD30CBDA32395E51E500CE4E118E
+                               23BC8CFDB08D443F1932EDEC52CDF3E2
+                               1D021DB791A56A7C16FDA02912FE744C
+            stream[256..319] = C511914A4BD9B29488B7FB1E62DBF905
+                               01C0D85C5A238448065C188F0A4134CF
+                               6A1FE1DAE57DB8BDF89FBF7FA66F3E32
+                               14CC9658DB292E4562A1761B9EA77570
+            stream[448..511] = 946944DF8E41BD585723CA1C03909E01
+                               783617D9D1129220ADAE7E5487AF4B54
+                               FF6593B37BB77AB0025C28727AE5933E
+                               E3873824E46F2209D26936FC5566B21C
+                  xor-digest = 34E04FBDE6E3DF6EE14BD179226D51B0
+                               1513510665589CB794C0C08391FA5929
+                               37B390E86BB4A72D427F58A1EFE10F6F
+                               D8A14A6F38ADE34331C8AC6AECA5DAB3
+
+Set 3, vector#243:
+                         key = F3F4F5F6F7F8F9FAFBFCFDFEFF000102
+                               030405060708090A0B0C0D0E0F101112
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 2AC7F22D838F68107877E90869F98797
+                               493171C8A5EC2E51D536A1578659DC16
+                               BB2F644C290B0F006BFE3FA0FE0CE917
+                               D32E94643848867B230270F54D0037B5
+            stream[192..255] = D21F7FE6E368989CC75E8D9080579385
+                               E31680302BA8B9B2F56984FD49B01F4A
+                               DD36AE4A28EBE23B5567BF5A539E2621
+                               1AA8588507916CCB572611C352E73E42
+            stream[256..319] = 25823586A7212D44811C75023193864D
+                               85DFA17EB7D5A34BD1CDD3260B5D53A5
+                               56EE2E2A06F84E95CC7323379FB924E9
+                               9E1A3F724F8C480A1F40B2C4A6FCD433
+            stream[448..511] = C1DA25F3B4FBF8B2917103E6274FAE81
+                               A5BF4086A161A7786BBD5A33662E48AD
+                               6EB9A944CCA57C51AE266BAF756EA506
+                               AE077AF0AD8B577A5A02F5563FEBA2DF
+                  xor-digest = 6176BC64072356BDF719676CD2ACF288
+                               CE2DC1272ED9C4685A5CBB7327669724
+                               DC8BB64BEBA04564A7879F7B9AD5A936
+                               C4BC1AA4007A0F85A5B5B945B418BC61
+
+Set 3, vector#252:
+                         key = FCFDFEFF000102030405060708090A0B
+                               0C0D0E0F101112131415161718191A1B
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 0854D9B674256934E204484C6D59668E
+                               1C94891FEAF6E08A92038E41EBA38292
+                               D19FDBF852400123237BD7DA620767D3
+                               43C2FAAEB08A394EFD1E7C1A3776B1A7
+            stream[192..255] = 4BBDDBE675E0F9D7DE0BC1B0E0C64FE4
+                               52F95ADE61D5CF2EB805894B3CC3285E
+                               6C6AAB72DAFF826D945B05FC4D4A6BF9
+                               37B352262AC12B7E6F92D5FBC4ABDA05
+            stream[256..319] = 7BD11CF4273EA16E01154EF9615B88D9
+                               C52535D2F0C7FD394D94AA7EE542B448
+                               9A046F2625011EE75F874641D1C5A709
+                               B7FD1DDDCCB2A6F1A47B65361A9B0D6F
+            stream[448..511] = 0AB902B571D11B5F2F24CDC7616143F8
+                               45E7DF2050B263D7A841DA170E17C00B
+                               4A20221D7ACCDCB0E131108D94D903FD
+                               7E2F7988445A7DB54F653186D69F3CCC
+                  xor-digest = 1266CF54E8BFFC95F1CD3C532BD8EAE3
+                               BF000577A811DA58A41AAD9164CCDEFC
+                               401C1B6BD2BDD9E992707718A9802B55
+                               33D7A8F490DF116FBCD8C85E9B580487
+
+Test vectors -- set 4
+=====================
+
+Set 4, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                               3083D6297CCF2275C81B6EC11467BA0D
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 1C43EFA7A2CA90F5E8F9A4F09D4C9077
+                               D5ABD79341FD75BB2DF9F13CA0B1CD6E
+                               065FA86938D971D8FAC8A3C34D08CA2D
+                               1BA08BE56D633951BD0338A227321CAF
+        stream[65472..65535] = 428908B703282E38E1BFDE62C6B0D8A1
+                               BD2AB1F5117C85703E9B656FDEAD2660
+                               4B7B8EAAE16423A3BFE542AB13748DC8
+                               35D81F981CD344015E0DF47BD180541A
+        stream[65536..65599] = 9D6D72F46C846D9BBF3AEEB463B9EF42
+                               F84915D664A20FB78AD94B61FEB7D63E
+                               5411A81D1E8F32BE3044E109C68B9EB5
+                               EC0BF180EF18BF3191D933F86045036B
+      stream[131008..131071] = E462CD92492726928381769FF205DC17
+                               AE7D31E1B82810F3CCB541B58C5F58D1
+                               38DB708C5F5BF07A0432868A1AA40A07
+                               601FCD1A07DE3071E8CE082833F0B02D
+                  xor-digest = CDCA2F92BF75499E49B586BDA7D9306C
+                               12F111D1A9F183A83B5A07549D5F976E
+                               815F96BD716CCAC7178282CA8BEFF4F5
+                               85DAFA9BDDDF8E6420DFDBA2573F0494
+
+Set 4, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                               3588DB2E81D4277ACD2073C6196CBF12
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4F7D4E56036A57A303A9C7D978290216
+                               297AC26C187E4F07678EC0069C34F93E
+                               072D734DBA239D81E566D1E6DCD09B5C
+                               A132714291631C227E391EC0385A3A64
+        stream[65472..65535] = C508DDD76C070F712FABA944BCB0F5CE
+                               EB645825C520197867623ED5263E22B5
+                               6270F0A878AC7FE03145DD2BF528E1AD
+                               784086FEFAA0D82F0F3571CEEDD3341B
+        stream[65536..65599] = B10CF49FE9266BBCA007C8DB526E760E
+                               79AA4D6A3B29FE82B8698C732FBB81AD
+                               1A27B2AEB06D05F3CF17E875BC0BBAC5
+                               67762275EE650D03F62B29529F3C3E23
+      stream[131008..131071] = 42B4F20EBAFB2C792006BD163064EC7C
+                               F363DD996CDF839CCE61E739C3817B4E
+                               36D311A4C94C7918E82F5158D3A75844
+                               A5603742E33D7FC3AF018660E6B1185C
+                  xor-digest = FB3EDA7C75E0AACEDD95B625F7EEDA62
+                               3DDC94983A9B084645253C0BC72FBF9A
+                               67072228194F96C1E81004CB438D6381
+                               A5C7E9E7D134FB8B67DEF27462AD3335
+
+Set 4, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                               3A8DE03386D92C7FD22578CB1E71C417
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 23DE914D641DC0DCB4F818C687803858
+                               A6673E284F8323787756DAC9352BE031
+                               28BC6149A59785F6AADF92FC68761E8A
+                               862AEDF29E851BF5422A83EE5EABFEE3
+        stream[65472..65535] = D12E0C470A955DDAA7E851F43DA35B08
+                               15D442DBBEDEECE3ADE18FABF08B4443
+                               77ACFE9F138F8725CEA27B0F0ECCB4E2
+                               E5D6E476F88CAB4743E8E43CE2D48F4B
+        stream[65536..65599] = 26635796620003DE67406BF741B93D68
+                               318F9A23FE823B2374E8BD8008EDD7BE
+                               2F750707A3835BBA7DAC45E06537DF8E
+                               53DFCDB928EA34CC08D2841FE3E492C3
+      stream[131008..131071] = D3DFCE281FDC69F7800E765CB0B33D78
+                               8BBDC17DFD11F929295C26AB7ECF21B6
+                               7D4B4EFCC18ECDB8134175A7F198EB12
+                               F7913DAF22D73A4139D5B807C18310A9
+                  xor-digest = BB2C8E7BB894DEFD1D5A7D37C01E8EE5
+                               FD4E052CDF1DDF5FDA90C9818DE71B3E
+                               34392EC3858ADF718F463808ABF841B6
+                               90F49D35A51BE5067B162E72D0101F97
+
+Set 4, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                               3F92E5388BDE3184D72A7DD02376C91C
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 818C35D2FD72D12115F91BFD32F843E7
+                               ED4D7110D1ADF517226BE797E037AF93
+                               C190025A5E82FA0341667D68FC09E238
+                               49D5A7A9526CA142D60F71C3AEE3A106
+        stream[65472..65535] = F011E9CEE99D94BDD4484408A0FF91DE
+                               EFDC8D8C04ED2B86C51F21058E912C11
+                               F19890E174018308962F5827D2FC1E2B
+                               82BA65688C111AAB5C749D8ABAEC022C
+        stream[65536..65599] = EC2EF21014AACB6215083F784E3ED65D
+                               774124FE60188930E1A90405EAFC8F1C
+                               E75D54AA7D81400E026D799CE06EF532
+                               8002BCF5A10D43E6FB6F80A9D72634E1
+      stream[131008..131071] = 80BC6F7F6B0A7A357F770E7690D94A9D
+                               B8CBA32EA36E124FDCC66ECE8786F95C
+                               22263F09645864087FF4AF97944A226A
+                               CB63DAD316F8CFEF96504AD306C512BE
+                  xor-digest = CB8D4C35D79CCF1D741B9DA09EDA305F
+                               5FA43F9AE9D0E1F576D5C59AFB8471F9
+                               7822C6ACAA197FF01347E397C0382195
+                               865AFAF5F1690B373AA2603C39A13CC0
+
+Test vectors -- set 5
+=====================
+
+Set 5, vector#  0:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 80000000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 635990D909A80CE2A75E521ABF588B6E
+                               85320D2C722D1C93B42AFBE6358D6E2B
+                               F2BE933BC961FB50F9A2B55389A08CD7
+                               A0131F89CF0E61D0C7071DEA6D8DD4C2
+            stream[192..255] = 0F92D4DCC222BFC7020CA6BC3D044F69
+                               12D9A93668C65401C570A01D6BF6B3BC
+                               A6F00F6FF46AAE3C09C6158EF05A520D
+                               F8D55FF27CDB7AEB5D03C1FFCE7B95ED
+            stream[256..319] = 664CCED71B27680F9458952173BE0043
+                               D3C27F35F9CEE7AE9D783ABA671C4FC6
+                               8F2815DC904316BEB39020F646041276
+                               5BE5500A60DE2209961755C1BF96E1E2
+            stream[448..511] = 8F02C1FB389DD1C5F0CB730ADA528D37
+                               DD778C4782C7B5DF1961F97CC82B63E2
+                               9CF4BE512EE27B50781E297D1633D700
+                               1298F13FD8AF9D1EA83F831A70EE50EA
+                  xor-digest = 3F9A4D249220E1AC8E559399FCA23DD1
+                               1A250DCDA841502F5FEF0F5D4EFE7E46
+                               D9B1E5E4312903E290D695C2B681949F
+                               480D45F78FD69597570338049464FECA
+
+Set 5, vector#  9:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00400000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 8E932D78DCDE35F1E5B8B2E863859A64
+                               7AEE8B0867F6F221B09C37B7A78B4043
+                               D055164B1FF1608EC17F3F148FEBBFF5
+                               A9FCE4158B33D2CAA4AC5FE5551C788A
+            stream[192..255] = 7034BE31CED03DEFAB3F69A24E622BDD
+                               9B202ADAF05D0324EE933064ED6D965B
+                               937FBC8405F0D7236AC28C320CE66C06
+                               C5B93EC581FDD59ED40102C651495EBD
+            stream[256..319] = 37C4EB0E72191FF0F70C8A70F475061E
+                               A0BEDD8A9AF1901FC6BB5482B5A29469
+                               06E8C40249E02784896D5D42387127DA
+                               CDF1657A66E0D43E6F69632519D1D3A1
+            stream[448..511] = 8CBE98126AE27A51146FE05F40CEA89A
+                               39781F515D621DD48B6D6234F9AFAFF3
+                               6FB862084F5249BCC0018E8FBC090121
+                               E227FF494BC180FF68EA2B134E7B00D6
+                  xor-digest = 24556A29026E3CAE101E7112B2FE5BCD
+                               3D925460B66A9EADDC271E39C317DC27
+                               51DC9254491F76F9163AF09AA5372F34
+                               1B76D54C09DEC9419F839E5C50F1957C
+
+Set 5, vector# 18:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00002000000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = AC05D72564EDC8EB439A95579D04BF65
+                               592AB1024152B9B14D71B18FEB5374A4
+                               C07AA2F58EB2E45F737580241CFB9C0B
+                               842F8CC9230B540FC50A590DEBDC29D8
+            stream[192..255] = 48AB7E018380336AD0CFF37379D9E370
+                               5B0C938600C6713FF4CF5C142F640FF9
+                               72CF147E7C38389DF426FBF560E7DEF8
+                               41B4B1CFE6A4E2DB4A85505C931FFFBF
+            stream[256..319] = E9C6536F67F4B3053B353170CC5B77B3
+                               06A47B759A5FEE5BE45842C01E11519E
+                               5746B056C86D8A6712446949DFFE6935
+                               8E4512E7BBD6E6F544CACA98BDC723E9
+            stream[448..511] = 731EF8977E1307CB5FE80BD4F89025A5
+                               AFEE3E54F7CCEE6556A211097498827F
+                               6219704F96652420BB9EE830DB3DD940
+                               96987BAEC5A43526FCBCD85C9BFDB209
+                  xor-digest = A37E582543E75640DD988C7FB5579D43
+                               9C41669EBCCA5580184743BD54D24CBE
+                               E32F2B1433CDBE51E8208C78FD739CC5
+                               4E2A37E16A7AE4F2193ABC4F04C35D23
+
+Set 5, vector# 27:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000010000000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 0B295517E5A2E100C262736DAE920F2D
+                               26C40787AFEA87FC34C27D6E0BF98A62
+                               53B695751F9095C8766184EA44042F2D
+                               6DE099A80C75DB1F33F53EFE578A8F0B
+            stream[192..255] = B54C4F2EDF17A1EC22F536586A5BD691
+                               2008DA6642C84AFC8ACD35A7DAE73F79
+                               C835D83F4C0C3B1E510D1BB42013A872
+                               8E4899A8CE134625698CAB31852AA7D2
+            stream[256..319] = BBE2221921E73DC79E795AC0AF9B890F
+                               FE88A14DA29DE45FA38F4C3E94E6BE9D
+                               98238BFB181FE664B4147CDDC125FD06
+                               D11A65F1975A0D781024DE1EF026DFE7
+            stream[448..511] = 83E61FCEEB1367635632B45BC73B8B39
+                               165015E7A6B8D9851390D4CA9DCCB935
+                               F09BDF52883FF37BC77DE94842E39BBE
+                               0BE530FC9D3B4564E11B7EBAC8083818
+                  xor-digest = 55242D44DFDB1A747071F1C825DB5620
+                               EDE1AF37B6D73A22264B14F7D35E4412
+                               4A6242C5AD34B54E98738D6CC90FE355
+                               BB9402DD017B6678FCC0EF27CF5D67C2
+
+Set 5, vector# 36:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000080000000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = B89065FE0B458C64FD6EDC6A893C8C81
+                               83578E7D37BE97E6FF82E45110A25960
+                               49A817CDE859B67B56CB80768D6DD275
+                               6EC368FBABC35C8B51C62AC92F913281
+            stream[192..255] = 0E0AB045409ADA1A9540504550404B8B
+                               2C38384E577F2DCAD5316CE7E806A0F1
+                               21D2A3298F71F301340F3C0A9CDD4815
+                               936F16B4EC229E63451980646D45E3AB
+            stream[256..319] = 1DC37BCE039878BA2E5938E4563D2523
+                               7350E41C8EF9262A9EF7D7FED7E22F45
+                               DC3E98EC981D2BCCC1185857C627EE20
+                               C86DFEF500756B241320798764C3C09A
+            stream[448..511] = 9A0082CDB35BB3CB1C74CE337D944D3B
+                               2C833B4F786A92DEA4445A2E5E101384
+                               AEA834F5E01C1B37EF8291D039875A3E
+                               21D613FC71212DE686AE52295B773E42
+                  xor-digest = F94584BB343C6BD6BE3AA1EF799989CD
+                               93F6DDB6A9AC7E2EDFC92460F0905E6E
+                               AA3E81F6E173C7F9FCE8FB5D7B261A58
+                               3FF006AD017A09FBA3B3D084285169A6
+
+Set 5, vector# 45:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000400000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 486343B348F2A1726617D6E93989B000
+                               B41FC9707E2A99C7FE5CE9423DC3004B
+                               67EB02F45B368F87FF2C4CC0C59D1728
+                               9F713E714E049CFD8E5D593255092A7B
+            stream[192..255] = A1A3127E632EF47679F52224E6D5A16A
+                               6E0598271F36F4DAA98B115535E77C71
+                               84170D2DB4B8C5D804790A666D105108
+                               81213A0684DD4AF03DE7707702F4F73A
+            stream[256..319] = C917B1577463E05F34350C4C7F6CBB5B
+                               D63B2D74EAF1500832132CA1A1F289C4
+                               3D93BFDC5E9D91897D2F7E05740F3C95
+                               0AD872A93DAF3850A452410FBD706A92
+            stream[448..511] = 11646E84240BB95D1B14694785E7E119
+                               848855E462DD14176442B8595CF602C2
+                               D1F4A2E09B8D7DE28382D1DA4DB3B1E5
+                               910DAE6ACC02E79FEB07A8E55747046B
+                  xor-digest = 65E9982A725056B8FBC275052EA48C00
+                               69A1BA0939831C4014E81AAF14F66FB0
+                               E01FC0C70A49C4533ACBF304A5309F4B
+                               60D6B310BC66C6684BD5B9C83F994E95
+
+Set 5, vector# 54:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000002000000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = ACAB34102EDDB67B8A5D8B135BAC15CB
+                               1CD52AE386364C709C2B9D6BD322D7B8
+                               477577B4958D448A3BEBA473D861E592
+                               CA15371AEA0F500361CBDD865488A7A5
+            stream[192..255] = F25DAF77D7D734E5486A1AAE01794FB3
+                               C17099E01489A5B4213EFAE6D745B798
+                               77939C7A178D1FF09EB2C42A8A3CE51D
+                               59D501B36BF9E4960BF3FC8D50F5A847
+            stream[256..319] = 1C9C6F63998627AE1AA7E8F0B2D73A99
+                               707256CDB12E3AB239EFA72AEC516FBD
+                               6DECC9375EAAC634707A139E59B32B51
+                               5D25ED6951FF4228A11DC87E8DE61385
+            stream[448..511] = 6A997977A25F4E9E0D9AFD8C20B56EE1
+                               C702C301528E332BF8F5E7DBEEE5CC28
+                               C9E12E1A8BD7A2118A0F31F800B574A8
+                               2FC44FE19B20F1D3396432DBB02DACC1
+                  xor-digest = 0B2BA364EE76F0549A10200D129196B8
+                               E2B69667999FADFAD55CA479AE679C56
+                               54A453C43898443B9DF2835AE806C2A5
+                               EF30CB8AC25DBA756A705F66759029FA
+
+Set 5, vector# 63:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000010000000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4DD010482D0DB2D09D76872D25F73B26
+                               749FFE70B9674587FC4CEDBA5966D217
+                               489244D0177F676188A1762C430DD8F1
+                               5ED9F7BB67F2E8A79F7633DB7B45CFF3
+            stream[192..255] = 3587F0A7B9F410D45357626BE10B4EAB
+                               FF8798FECA5F91F3AD2543B301B5C301
+                               F84404071C7BC77AC31E423E1AB1E2AC
+                               2CFAA37DBC2A1316D16A5C7BFED1A77B
+            stream[256..319] = BFC632891511228ADBA0211EF390A7F8
+                               08A12AC6BDD7C2E29DF27025EBA1A6EE
+                               00B9718FF2BC003904C1C28878894AE0
+                               E5CE5E9F55CAA522EBEF5747C755CB73
+            stream[448..511] = 513D9FFA86D8AFC20E4870DE0E9B330D
+                               76F02E44A6C4D7C5270B89C6BAC9426B
+                               5A12666244C0CC5A641118B93F72668A
+                               B7C53CD7FAB0940F1B37A85015DC91BE
+                  xor-digest = CACA8BD50E28720128B57B37D45DFB02
+                               206D53785FCE81205AEA085466142DB4
+                               A17F841156916294F3B7CA93CD99CB12
+                               93FF593B5105D2822CA9BC3BAF178935
+
+Set 5, vector# 72:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000080000000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 4DB6CB1D5BA89BA45BA8E3DFCEFC444B
+                               7D97C73F53EBC50BC46047CD76499CF1
+                               FAB51AA6C8B24118AC4EC8E49192B41A
+                               2812AA1A4325418AA6C69F6143F0A6B9
+            stream[192..255] = 33FB647044F3918513212D3538C31662
+                               1DD9F3A10C0589CB718564CED7ECC391
+                               D9701C7A23AD48E05A79BE9E32F60819
+                               3E57FA8D8EDDF9F43F38BF8BBCBAF52D
+            stream[256..319] = 79F3525A6EE300764DE481C20A40135E
+                               94362F56DBF4C5AFD214F9D4039A0899
+                               F74A7D7C27494B39D1B0145B9F691B5F
+                               F436F2AE8B335EC62CCB0FF506E0240D
+            stream[448..511] = FFE0E6B8D741377FF1A02764FEE3D681
+                               6CD020C6DDA5097989137E9BCFFFD35E
+                               0E6379AD2ED3D9D298C6B98DEA82DE6C
+                               2B66529C860DD4ED56265CA09B16A8A3
+                  xor-digest = BEC66A4FEB220D732F04AE0B98FCDE2C
+                               0B70613BAD57D7590E007E84AC546B09
+                               AF1D5BEB509CFE5523254B5FC8CC2672
+                               215C67477AFF14D0788DB166C5B4B12B
+
+Set 5, vector# 81:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000400000000000
+                               00000000000000000000000000000000
+               stream[0..63] = ED4C49EAEBE78999C0DBC4674757D435
+                               B056A45036DC51B390A6C87B3CE8BCE8
+                               2C7DD348C7775D2402EBE359E7895FEB
+                               B9F44DB5D0F7B40AC207A3CA750EF25A
+            stream[192..255] = 32F897ACB5CE63D1A64781524B1CB4FF
+                               9E595EEF93A3206A0D1B4E6F4ED7501D
+                               2DDFCA31B4FC1A33F589167B070FC003
+                               F67C528B6AB99ED308EC3CEF82B4E2F0
+            stream[256..319] = 57CE29261DAB385309C97955261874B7
+                               676349DEDF7582B7654D1A8DAA570EA5
+                               9745D2167F2AE1ED538F1D0ECE53AA38
+                               379F9AE542EBE229D561E34ACB28FA14
+            stream[448..511] = 667E22A8BE7BB84CA1B1C0848E5F22D7
+                               E98E54A79D5A960C33D07357199AF1AD
+                               53F3F803EA698127C22F75F31C40656F
+                               8C28818775B3D88460CFD29798187537
+                  xor-digest = C68E7F4A7CDB68892794933392C1BA84
+                               5B6B7CF52B8421137EE0220BA67C91E9
+                               81B47F9BFC39FDFF9DD48F3617F2D523
+                               0680B87D18A821A09525FDB79DE6FED2
+
+Set 5, vector# 90:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000002000000000
+                               00000000000000000000000000000000
+               stream[0..63] = 80FC6D794178A189EC423AF926622982
+                               60C44DC5DD5AC91F779D02958366CFE2
+                               C5551DE2A5D635353757AFDDE68DF592
+                               A034D87C871D7D871264BB0F89E99536
+            stream[192..255] = 0BEF31DBC3F3DBCC5B3D28BE296384D5
+                               D33DD0AD9A80D4AB8F58274B4397A658
+                               94F67376AD8DCEC19BC2C74A835D9F70
+                               1F4C60DC256DBA4E83B21D36B66F5DC8
+            stream[256..319] = 625DDFD8D922D848380D45D6D7E730BB
+                               049666B3900E4305218BB7089D059FD5
+                               825F9EAA3AC047A006F1353C37AFD11E
+                               0143DD68CBE9543B959E26ECB4C649A1
+            stream[448..511] = 636E6EB97E3127EB703D5170D2C8FAF8
+                               63E8C333F5EFEFCF9063E3D770FF9E0F
+                               2B37396CEC935239797FE430DA4CFFB2
+                               9B19D833687318DF01750DD2F3D942B5
+                  xor-digest = 0865679CB53BC2845A0B71AB820F61AA
+                               9B99E100AC7F0358D5B610C09EC52C7F
+                               8C7C5D973CB85B18F8990F3BDBFBDCBD
+                               13071BB3AB3F329E75A44E80320BF86E
+
+Set 5, vector# 99:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000010000000
+                               00000000000000000000000000000000
+               stream[0..63] = FC2DEE44B15BD914C17DADE6645A0250
+                               2F40B39C0C6AA26C0250D328112AC67A
+                               0C55D48700EFE67EFBCED927B62427C1
+                               41DB8089774E2DE23C5FDDFD66D39BC3
+            stream[192..255] = B6A4D34FC81937580BFC32E04C8E2B20
+                               309AF3E2152B98BD748A344D4537788D
+                               35B16DD2C01444CAAAB8684916705C88
+                               FE75C53D75713FFFFA2693E91395F919
+            stream[256..319] = 9E619BB0045C58C2D303F79E659CF5E2
+                               011D619E0CB10CFDD53AEE6812DD780E
+                               36407CFE9BFC1C73C27CBBD491BB6A7E
+                               8918023EFD6E2227C0C840F1DFA5924A
+            stream[448..511] = 2A320747019AE86A59D5422B634448E0
+                               B43C41457428AC7A4E5D0C9D7327B44B
+                               BBB6F64CC2423299C009E5B24DDF10C9
+                               F87F2A525ACF803C50837EF6C2FF3D34
+                  xor-digest = 3737C19DCC04C7C72EC9280D53C17E64
+                               E9F4B1E47980711DC64FE6D3E7DD05E0
+                               DEFF339F38868B1F7CFFAD4298127949
+                               11EAD4D34047B22B07C397A37F6BD2A0
+
+Set 5, vector#108:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000080000
+                               00000000000000000000000000000000
+               stream[0..63] = 84F71EA20D46B3802A787C1322DE6A79
+                               34587F447AE7FE277362497E4FDB69CE
+                               129EC4D8D80ABD0C15026EED3DFE2B6F
+                               C48C5DF09CBE035E348A22F8A2AB7DAA
+            stream[192..255] = 6444791C6DE062EB9A494AEB910A458A
+                               DE3D834BD6F87F26A9D6F99FD970C820
+                               ED9FE0DF88A924F97945B0EB10E5D464
+                               559AA278DAF6A942651E06C66D33F7A0
+            stream[256..319] = 1878644E35B3BC562F82647D45C84317
+                               769BACDB95DCEACA456727616BC90FF5
+                               E78FEE1EFB86A714CFCDE79AA9E66FAC
+                               D600B0FC5C471569BBEB5692E7D9616D
+            stream[448..511] = 54BD56C4F0F3A0CB89A678F2912E5B21
+                               C2B225030E82A90470EB6040F50A818D
+                               C91F65BFFCEA3F9041BF110A762DE3D4
+                               B41A8D1E18CAC776063B2DC93BC2D02E
+                  xor-digest = 52E18382B88883C5648E067675468200
+                               2AA9AC5C18A856E89175C449A6033501
+                               87FA4C17A4D36269340F0877385A35AC
+                               4B7FEF6E1463D34BCDF3597618FAF352
+
+Set 5, vector#117:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000400
+                               00000000000000000000000000000000
+               stream[0..63] = 3F40E9A3C872ED15A6AA296F716E095B
+                               F39153C7C6F4ECE6F550AD35582083A1
+                               CA0DC3CD817AE3946E43AA9C8700420F
+                               F0DFC21B34F4E5E40B3EA14299EF468D
+            stream[192..255] = 853C4A895DCBE411B9B2E340B0AB55AC
+                               8EEEC42885768110ED7E1CCADC10121D
+                               8DE12AFD0DCA4507A8A7A2650FF68C6B
+                               5DB1DD670C8C68365E846934D16A46CC
+            stream[256..319] = 565AEFAC0325093EF87FDC51413BD5E8
+                               56AB6C90FCE7D3C6EEB7E58F22AF63D6
+                               73BCF3840D611A5E1102E9A4108CB902
+                               5A1D837510A971536231CA247965379B
+            stream[448..511] = 887287B62116FE2A28957ECC71DE5BA9
+                               CBBC16DBFA4EC141EB617F9314FCD238
+                               91C4237FA35871C0C795E2F3A4197DB4
+                               F81BA4A29759BEB5FA2277CBB9169734
+                  xor-digest = 78E564BE9E7102E2CB009D7A540395C6
+                               188C8499B7E96C0AD709C3BA2C341741
+                               6EED55AB00AE5719F25CFA06F1488E83
+                               798F18BFD755B9061AFB4EA5D864FC24
+
+Set 5, vector#126:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000002
+                               00000000000000000000000000000000
+               stream[0..63] = F4C281D9C88A7FD6B2CBA9EB0366C594
+                               59327932DBEF8118A7A680D0F0AA41A3
+                               735FE0874F047D2B071B5B9E755A7B6A
+                               9426353B923A5913C647A88B642B2C00
+            stream[192..255] = C7DAC2AE7631D11EB21EF15FDCD3EEDE
+                               7DC98A7060613A643EE8A944EEB6C7D1
+                               EDE08538E1BA6092ACDE0C648D29AF5C
+                               309CFCBC4F40A713FA58D93C954961AE
+            stream[256..319] = D1647D6453798B7E15A49199134384B5
+                               C9BDEBF7F859F6460C2666F297410070
+                               E68307CA78790EF01D160D94B69729D6
+                               90A4FE477A27AFF8B254875C98116485
+            stream[448..511] = C6D3DCBD0E9D4746B142C819867E0A14
+                               8B81FEE3D1007E907F8E9D597EAD63F7
+                               A87E6F224C67CF8162C4E92FC1BE44EA
+                               FE3715B3C1C432CC660CCF1536A20F46
+                  xor-digest = 59FDF05B6D16079B7E18F6A8CE0C58FF
+                               AD7C985C01A12C07D1ECEA740A92F761
+                               FDAC3F96357498B5F5FBA91DE6502A86
+                               1332A1B3E85C5E72444A2168C25D6FEB
+
+Set 5, vector#135:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               01000000000000000000000000000000
+               stream[0..63] = 494BAFEFE4FBF2C406F55FFB436105BA
+                               09211B71DA446A0F5436E6DBF42F8E1C
+                               C805E797C9987C14997083E9004473E1
+                               B2B3729DE9B483361CD38CC78C982533
+            stream[192..255] = 3C04C6633F7D8B714E8549AEA1851035
+                               A520EB6422F42B2C840C74CF51A13FA2
+                               9C1875212E8DC07774D6911415F1C305
+                               9826A05DA9F09942273CDB592F7E3A6E
+            stream[256..319] = 1FF6BEFD79A7E5BA0DF64948BA0ECE7D
+                               ABFB3883BF8A95D3E76DEA30550F5C3A
+                               2B67FE2AB78DF091E758E498418EF514
+                               089283275588A41AD20D53E6394635A5
+            stream[448..511] = A4D10D3B6AFDF415D49FB6ADA1245812
+                               1DA1365ECEBDB6C2508F1EB92E91E8EF
+                               90892E6FCC9E70AB9A2EC4D49A11C197
+                               68E6B4C154A4D65C55AFD38B2BE3F4DE
+                  xor-digest = 91D4EA4C6ECE28536C415A6AF46DC432
+                               3B6DC2DC98C3A3FE2BFE53C8FF556C16
+                               0197D655357512A808415BF757AB3A84
+                               6BE7865622D32B7DE3867B3B096408DB
+
+Set 5, vector#144:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00008000000000000000000000000000
+               stream[0..63] = 521913EA655235FA0E713B0DA3ECB98F
+                               7AB817E70827D29E75E3BF2729EC2AAB
+                               8747B8FE0FC9489B6E0EFF45EF985980
+                               CC0189D9D0F2EF34E809D992E7695D9E
+            stream[192..255] = D265AAD80EC96DFF08859F93B236136A
+                               BE146981E919C0554D64FBB7D03DC9AC
+                               9021F2A1B39866567D8BA1DBE2C3CD21
+                               E5C4C94085F7083F4C640E918C4004F1
+            stream[256..319] = 7DCD3CF623332365E6CF2D92FD147BE4
+                               1E532F51F939C921DD4492E026993E56
+                               843ECBF0925CC52D56084E7F2B538653
+                               2020DEE6FE7E85D4A89AEEBD5F3EAAAB
+            stream[448..511] = 00E20611C7ADFC3BD9E59B9E6D7ADB03
+                               F87FAAB01D7771B89299BDC59E1E2EAD
+                               FC9FDE416B62FEF07AB7A816AF261E77
+                               FCF79DBEB09323D44B5956CD93AAA990
+                  xor-digest = 0578B3E20EBF98D89E2DE82A6EA8E34B
+                               424E526CF419713F0AA662B852E58BB6
+                               7ED570D75534E1F23F85F160690A464F
+                               122CCBFA5CD1DCC0969F2E57D65D64F8
+
+Set 5, vector#153:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000040000000000000000000000000
+               stream[0..63] = 2617095641B825094DE44205319CA853
+                               418588D5B6BFC05A2713CF898DC42B3D
+                               6ABDDF4C287235438A48BDDA49E5ECF7
+                               EFA235A23BF667289612893708704F08
+            stream[192..255] = 04F668517ADC1AF6E31DE6B7007ABAC3
+                               59A2DD6DD61755C6CA7053E05FBBA2AC
+                               D9AF682EFC71391EDA4A5872B53D7CFB
+                               BD35ACB719169283EFD9FF9E172269C4
+            stream[256..319] = BCBA3F15D83B9AD41317AB9EF7DFDF0F
+                               FF05CDB058AB08D7BBD720723E969CAD
+                               79F16D26DF0222CFF4249B839EB9F9F1
+                               422EDAFB8EC285F27E347B7B4C9B2C23
+            stream[448..511] = F15F17F38917DFCA9141314047595C17
+                               047F91E4859D849E9A6339F640E3633B
+                               6A1B62D089B24062BA5987C3FAAB6633
+                               99698CDE6FE7A461F127AF67B2C5CFBA
+                  xor-digest = 68B2369B45F059964A1FD3822DAF61B7
+                               82A9FBA7EB563F83DEC4D058CA5D8931
+                               EC74AF4043FEA803B696791C8E0A675B
+                               DD8982AEA862BB76847E1DE12F2A5E86
+
+Set 5, vector#162:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000200000000000000000000000
+               stream[0..63] = B090CC267B29A95ADFAF6BE3E147D647
+                               21ECACBF6B7D0C4061D17FB7DE0A6662
+                               6D6F9FC167FB3FFF237C240AA03FAD55
+                               13B6DA848F22796DB501A8FB89F2B85D
+            stream[192..255] = 1CB95ED9AADFA0E1FFE5704BE69CBA3C
+                               9593746AE87F36A786E5EBE18A1D3B25
+                               F4785EEF4DB439472035BF053687C5F1
+                               0B60EF55A76DD1994FBB482BBD250755
+            stream[256..319] = 826BE3D679C872536D55C3F0E49C2624
+                               D41726A4525A50CF91EB71E7CEC5AC47
+                               F3834358E2296CF0D04B8D8CE8A701B6
+                               6AFBBB8776DB2B75F1CFA01231B365FA
+            stream[448..511] = 244DB28A98619907AFFDCCAF303A3795
+                               3B6D21EE6D22780C4D3C939C084E4181
+                               1FFCD8F2DA2E6A2243BD0B5428FB86C1
+                               F0EA2E8C8B6950ED961F4FA8CDFDCD17
+                  xor-digest = AAAFCEB42F2EF40C4B5462307085434E
+                               E4399F87B4AE5CA828A952A851F47913
+                               A51430A8BB9B3CD0A4B2F12E297F51E8
+                               FE0B1A6FE0F21177EAD9284087D3706A
+
+Set 5, vector#171:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000001000000000000000000000
+               stream[0..63] = 0F4309F63F237DBB51567573126F09E8
+                               E49990F26E541EF888B9F2922FE9D280
+                               C8FF4874C0D4FA3F41034B82E2E026C4
+                               594A79C2B689BC502C41244DC1AD472D
+            stream[192..255] = 95DCF9685E429DEC2833E1B5E78823BB
+                               ACD9332D668C4B342B89A290E1CA6127
+                               B0E5125E44445A1156A70B27966C3E0B
+                               4E0BCBDD9F4561998A5CBCFAA05C7459
+            stream[256..319] = 0886E9887182156005548CA1A08B57C0
+                               E9FA76C2A694E1CEE22E9B715E99B115
+                               9AE064DE644FD580E8356164A45EA1C4
+                               3DD85E16158B5130AA103267C8118105
+            stream[448..511] = F8AF6F9992781BB09808B7AF404F6546
+                               6FA697C2A1BC9BF64F8D6B6D8CA0B856
+                               6B64E6BF0500F6D80113D9457855FDCE
+                               1791C7436F5FF41ADA87562C175942D6
+                  xor-digest = 8D32FFAA409C8CCDA6892C388D5D654B
+                               4AD50ED00BA649737BA8F350811A2AE5
+                               5C89463C7D63F1F1F16C4007826C2CF0
+                               E4BD9453A60D88BE86F60BADC3E71E98
+
+Set 5, vector#180:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000008000000000000000000
+               stream[0..63] = EBABC8B756971D46C1A5E86CC7AEB329
+                               4DEDACFC795F2AE02CCAF68B933DEF4A
+                               19E96BA64DF14EB6FE67CA48861B49BC
+                               16052E33C8B47556DFBD96037B7DE5F2
+            stream[192..255] = 0438A8CF718F4C52E33DA087FFEC01E0
+                               459D26757D5DF55D5D7BC9BA88F57EC0
+                               4B84D854374F95317CBDDEE928A2CCAB
+                               E4BA1BBBF47776B29890DF00D864FBD2
+            stream[256..319] = BC4A80F9CACFE63D2E54044ACFF39F97
+                               2C69015058AD3F81CBBA28FB0987FFCF
+                               9CD1F6AE4F0602BAE2B828D3FA162936
+                               23CF3AC2950BD651F7E467DF8B454BD6
+            stream[448..511] = EDC95FB80C9FED4A73D6EE9B2CD74BB7
+                               E6DEB9E7868D40FC49BD1C52838457F0
+                               88DCB29C2107066D55A80908EFD1392A
+                               B4F2F13C0A79F67E58C91A89A5C88991
+                  xor-digest = BECD7FD2014BB9A25701E69F9788FC84
+                               1AA9DA56CDE1CD93DF45D28F29D32E22
+                               F488B0C2D9FE95B267CBFD35EDB2F6E3
+                               05DFA5A2CF09D7E2D13348BC0C9405E2
+
+Set 5, vector#189:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000040000000000000000
+               stream[0..63] = F28A15A90386237127A5682EB09E0E58
+                               30709455034A7189AC9710DBB50D5012
+                               9EB4E0E9036D4504054B281F3FE9F45F
+                               C80116B8FFC0B42F9A636A399B7A8BD1
+            stream[192..255] = 1219EF9BDC250E88BD0A62DDCF9AA1DB
+                               B62E19FBA748DFE1035C6A5B3B94954E
+                               1370487A455916F7DAB451F79C5E1298
+                               F549CE005A1321E6B136B59BAD9EBCD5
+            stream[256..319] = EBBE81DAE5637C4C7EE6FF9251D5407E
+                               DF7E8EAE384D1E588CAD39AD9F763004
+                               9A8E028120B5065B658EF3E2B357E52F
+                               F18891819EEE3EE021BD1AF08A4B1F53
+            stream[448..511] = 50086FCFCF5EFFEDC4A52B0212B7321A
+                               8664F2976493868F13D7CFDFB7583E99
+                               EBA70778A83CB88850D45B300F7F6A80
+                               E721860560B2FA642B2E77C7F7AB0662
+                  xor-digest = 336516670616300FD5FB014C1076B53F
+                               6637AD0EFB453615924396785CA4D284
+                               B03F526FC2179FF3BFB0A1A2ACFFD87E
+                               EDC4C8360DFFC132CE6A502EB173A0D4
+
+Set 5, vector#198:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000200000000000000
+               stream[0..63] = 93261A7231FD030CEAA974BBF8F3A721
+                               33334C5F3B25D5831B203C353A566D80
+                               DA578081A047E28DDF8E4BD5B68BE4A7
+                               FDE4BB3A4875BA84553AE120ED77C9CF
+            stream[192..255] = DEC4B603E6A6F911B68E5C1265FA2004
+                               71B296A647D20C13E42202C1A3AAE880
+                               305F969BB88002C8FC00CC5DBE40AA06
+                               4AF85646AA8C7F7191FE26FAA2918A95
+            stream[256..319] = 849431145F27957D53CD355501363E4C
+                               5F191DA666B77364E5866CAA16A9DEF0
+                               DDB9BC266EF41DB0C2A7642B9E8DD27D
+                               60DEA6E69052D4BDE9FC83B2578C72E7
+            stream[448..511] = 5556EF9874E3150FC539C9BD3BAFD308
+                               8FB347D5E38DB318A72AE0C6B6FB4163
+                               082545A9AD8872AC383A78230729D083
+                               31BFC3F2C80DA20617435FFDF2529A7D
+                  xor-digest = BA9CA5F3C27246F931824A9A425F2390
+                               E183188FEDE5BE3591053ADCC933E1F3
+                               DDF5627A94F80F8922F53E951490E96B
+                               F51491ED2D6DA26F3BF69CC41B8C0C98
+
+Set 5, vector#207:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000001000000000000
+               stream[0..63] = C449AF4CD437641A3B40D0E0E7B5696D
+                               CE973B3B217E02DC20B2F5573FDDF78F
+                               E6E55D75CFAB8EE04C8962376D22A843
+                               A80BB79C8B8D8B500C4B6DA27748C398
+            stream[192..255] = D5C92B62B0818165096551DF2B007F66
+                               2DF953742EF0BBE97982FF9D3EE83E1B
+                               87EC9D710CF1700262B1CAA9C68A897A
+                               8AB4A162DB0443A43962EECFE5B4C0DF
+            stream[256..319] = 3B8CC7E847669AC6858B7BB716206386
+                               40D8C2DD259EE4970A5F254077101271
+                               DF745AD7F57712065E2D03B9D7220591
+                               5C8C033A4F9146EE561B4179DB465989
+            stream[448..511] = BA4ECB7D74CEE56CF1D5AB636BBD6421
+                               C30A51DABDCED17C8D50F5293424AFCE
+                               33AF71095CAAD3913A8A3A12286A8E91
+                               89DAFCC1E2E744FBF4B526E910B5F2CF
+                  xor-digest = FAD57A608E04CD71B176BBFADED7B229
+                               D855A8025E963B55FB83EC7311427779
+                               490F25D34C6385FE1C036FF0807E136F
+                               40C10588678E2414163AF1819EF7D3C9
+
+Set 5, vector#216:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000008000000000
+               stream[0..63] = 989F302DF6BF8C63F9EB69D2625115B1
+                               2CCDA42A2D33BC6F21BD55E0594DBAAD
+                               9A294DDFD6710E36000C27FEA7E03440
+                               C8A6E728716D0DF14E825B798A6C420C
+            stream[192..255] = 3F3140320AA02367512E7C1789F5C03D
+                               83CC634354237E78E16B1A64DBDFA6EF
+                               0697B28BDFFAEC311C6E2089BCF64203
+                               A2EC7BF3CA922080380241A47A673634
+            stream[256..319] = 6049048A5307D55D6DB387A6149C7B23
+                               0AE33195D53E0026103EB44489BB86C6
+                               BAEC7A0D920CAE25B1E7B9F07C07C4AF
+                               6485FF281C7B7FE1D61E660AE55C20EA
+            stream[448..511] = A6DCBEC85525FA19FA6066470B4CD83F
+                               17D42DB3353B327BF3DD6E7D047CD752
+                               71E79CCBD46E757F3654C2506C2B593A
+                               BC93B8985C491017A8E616D69E8974FD
+                  xor-digest = 55BE97FD8317A47742F8F3BB762160AA
+                               7FDFBA371864823D93EF6C029D457AC1
+                               2D679CB424DA9EAF8E4FE28271C66F06
+                               1E91D8F2EF41733AC1084F54330C9786
+
+Set 5, vector#225:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000040000000
+               stream[0..63] = B8989CF76BB1AE894699604320C14706
+                               E20C8BD86C016B5E2EF705AEC54C6023
+                               2A9AA961C10914A8D910D517059A93F9
+                               78C537767A057E0E11DBB5C9BBC4EFA9
+            stream[192..255] = 83FC232D21D0DB82747D9EDFEDFB58E2
+                               BB37362FA2B4E1AA0C9A58AE521EFC86
+                               C512831CC6D2E85FBD96FD3B60D1D153
+                               E83DDC6C5755899CF96FDF69E3732E4E
+            stream[256..319] = 201DDE5D82B754341A3452BF7DDDBF6F
+                               167B2A087900EF40E4268A80217D7310
+                               F1E9E25C707A1EC05219E3CCFEC0F6F5
+                               28CD98534F6C579A1ACD3171D131D87B
+            stream[448..511] = C2F68B5F03B0045FEE0FC92DA08F8545
+                               762F73E553D2F539C64B88D4FAC9B011
+                               DE0504D66007A115E428F627A667FA2E
+                               296F222734FA0F905548058897DEA990
+                  xor-digest = 7DFA65F57FD58891C5576B3CC7002513
+                               C1A983E9D31317B681604DA09F176AAC
+                               4FD78CE84EB9427BE8D6A63058582F16
+                               148D55B3C2544CF4DB9306699CA74D80
+
+Set 5, vector#234:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000200000
+               stream[0..63] = 307B13F3D3EEEA4C8FAF34416689F354
+                               AD26336D6B33DFC5AA004420D2DEAA69
+                               F69E531EB6D672AD62B2A6A136046373
+                               F70272E84E14CABA9AEA3102863A0B10
+            stream[192..255] = 8E4DA19FEDAD4C842917ECD5E7256097
+                               C2F524324D8A974D4185D8B11B611C72
+                               6C39DDB5E58180971DA181D36A289CBC
+                               1937E8F020645EC8D0363A58C6147F38
+            stream[256..319] = 012A99871D6C4CB7328C1374F37D0BE3
+                               DCC2232F6484A22C8F330D77316A1756
+                               71DF7CB32773F25D772BFE9DED5981B2
+                               0C3F0DDB2879AF61E7549F03AE26D233
+            stream[448..511] = 47C6CA462D35580BC0C78C6427FB96F3
+                               BB762662F5B52FB3938CCCEAC35884C1
+                               54F5BBF513970FC08F51C91059A757B9
+                               A8B6F1EFE467FAADA8D4DF68C6AC1942
+                  xor-digest = 6409F8C255BAE6167686F5F9C7EB2349
+                               0FC7BA4DCBC80006B57A5F56CA9F907F
+                               849C2A0FB0D74CAAFC0E2D4367E2912E
+                               BA6487D8A48DA60E48277A20E326266A
+
+Set 5, vector#243:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000001000
+               stream[0..63] = 543BAEFA799FA0CF5295B92EF3FDC07D
+                               69B87C1B5FF0A9F25B32F8FCC473D04D
+                               54B6E467D6183F25E3664A330889889F
+                               A530E354B6E53EBC78354100637A62C3
+            stream[192..255] = E15997D1E7C0FA38333DEE2EE2477A4F
+                               AD32F0810E8D3D65EAFB110C2B8D0948
+                               59DC45C4AA38B8050A87C23782E1A26C
+                               C193985BB0C3E754A528BEAAE1508D76
+            stream[256..319] = A94F1BD38219097B70EC0700A64B0ADC
+                               7BA8883B5C2C3BBABD0497E80D53121A
+                               2DC5A5C6A77913330EF5469871BABF86
+                               0A09F1474D893ADC28B473EE508F473F
+            stream[448..511] = A43AC01FC186AB42241ED3729E7EEA39
+                               F0823D124E8CB696E2F4B047A6B71164
+                               5B803623CD0371C4975217B3CBD7D9B2
+                               FD89D3B6BD23FD11FEC0B03B9CC22AC0
+                  xor-digest = 792A5EDB6E7FDBE99B7EC2119665C2F2
+                               34038F561BB1923F3BF493AE35CE2006
+                               55B8EE47490B53EBB481AB7C6B82FACB
+                               233AD86D74385FA108C94666CD34C164
+
+Set 5, vector#252:
+                         key = 00000000000000000000000000000000
+                               00000000000000000000000000000000
+                          IV = 00000000000000000000000000000000
+                               00000000000000000000000000000008
+               stream[0..63] = CB4377099B2D7CD6A982A1B1A53E05F2
+                               E097164EDCB381468C21D8F0615A654A
+                               45A4D09B7C0218A19496EA71CEEEAE5A
+                               886307DB0026C96049B60E5154F99AA4
+            stream[192..255] = 25FCE0B7E28D5D0D1654D912DBB21AE0
+                               288CCC71396CA5AA36AC44AB08EC72A1
+                               01E5B189535C1987B79DE4C4E32DB7FA
+                               48ACBC8F854868FC287E03D54752230C
+            stream[256..319] = D3B02A39A4E467C44C109E1E25593278
+                               2E9B3CCB02D6F107C9263A24E113FAEF
+                               847A9064E1AD1EC8881EFEB239CAD6C4
+                               E90ACEC36A7E87E002F35D477CD63F2B
+            stream[448..511] = 7D4282D7E11439C04ACFF087708DA22D
+                               236F1A08A6343704DA4D24EA3582253A
+                               35419183A915B571DDE80C1DEE2B8A13
+                               76EE973234FFF6A0DD91D31037F51C72
+                  xor-digest = D52720D8DF114235D99E5292E14DE96F
+                               9D8478E016CD40EBA25C4B9D8E11713E
+                               FE9AC151E1F39377FCC07D06E9BF6931
+                               6EFD7E27F87E9F76DCBF7831CC3FA98B
+
+Test vectors -- set 6
+=====================
+
+Set 6, vector#  0:
+                         key = 0053A6F94C9FF24598EB3E91E4378ADD
+                               3083D6297CCF2275C81B6EC11467BA0D
+                          IV = 0D74DB42A91077DE45AC137AE148AF16
+                               7DE44BB21980E74EB51C83EA51B81F86
+               stream[0..63] = 23D9E70A45EB0127884D66D9F6F23C01
+                               D1F88AFD629270127247256C1FFF91E9
+                               1A797BD98ADD23AE15BEE6EEA3CEFDBF
+                               A3ED6D22D9C4F459DB10C40CDF4F4DFF
+        stream[65472..65535] = CFF0058C45807C1F4300D118FDFC3B21
+                               370936B39391791C92A821E1C8E8F248
+                               BBBF378679468218FF5F6560B79A6015
+                               82B81315DC19D8583263958B068BEA48
+        stream[65536..65599] = 871A09D393D8888EBEA453F518BD300D
+                               8233E906A31631D29A4A1834E268C3E4
+                               F65F4F65B1B9E55606BDF28A571CA4E7
+                               59BDE4718E1E13731663F5CAF1CB0F1E
+      stream[131008..131071] = 15360407DA7B389DF28C08B2221F5E0D
+                               96B34839325795A70A3F65D9CBB3848D
+                               8C0793A53E8C4D71D8B53B2923A90B37
+                               FE412A4485F0CC741E65743C6F1ECB4A
+                  xor-digest = C08A2B344B4A486BEB4568EFA585A481
+                               64C90A34752FC3523C3A99D764AE33D6
+                               825915067FD64D90EE81175416A3B4CE
+                               780426A44A4530994A1A8A83A5E9E243
+
+Set 6, vector#  1:
+                         key = 0558ABFE51A4F74A9DF04396E93C8FE2
+                               3588DB2E81D4277ACD2073C6196CBF12
+                          IV = 167DE44BB21980E74EB51C83EA51B81F
+                               86ED54BB2289F057BE258CF35AC1288F
+               stream[0..63] = C44B5262F2EAD9C018213127686DB742
+                               A72D3F2D61D18F0F4E7DE5B4F7ADABE0
+                               7E0C82033B139F02BAACB4E2F2D0BE30
+                               110C3A8A2B621523756692877C905DD0
+        stream[65472..65535] = 5989C607133DBC6C0F2DD022D4812ABF
+                               91111E266BBC8EF91F1759B3CFD73E12
+                               432C1334E3549EA54917BC0156672E13
+                               DBFDE5F0CE6C504EF4AB69A9C311FC79
+        stream[65536..65599] = 0D22D9DD0AAC594F812839C7C4D0B690
+                               7A19FE4985E1A0DCCA5930E6F5A70055
+                               452978828569A28AC62C30274CAAD865
+                               F4F8BC7E3F058B50C454F3CA360264AF
+      stream[131008..131071] = D17E6611F2754F60629B7CF29CF35888
+                               3765A08C62167AC620C1CBCD1058F527
+                               4B2D4335591F7962A0A76D5F430332AD
+                               C16B13E7EEA80188974860D2EE3BE81F
+                  xor-digest = B7163FD0F8A41562DCB10212DB9C97DF
+                               C25C6BEBEB6331F072118F046E508887
+                               FB82C0A3FF8B0E0B5765131BD58F3181
+                               AFB3803A2C1C8C70877AE29F74D433F4
+
+Set 6, vector#  2:
+                         key = 0A5DB00356A9FC4FA2F5489BEE4194E7
+                               3A8DE03386D92C7FD22578CB1E71C417
+                          IV = 1F86ED54BB2289F057BE258CF35AC128
+                               8FF65DC42B92F960C72E95FC63CA3198
+               stream[0..63] = 9D13AA06122F4F03AE60D507701F1ED0
+                               63D7530FF35EE76CAEDCBFB01D8A239E
+                               FA4A44B272DE9B4092E2AD56E87C3A60
+                               89F5A074D1F6E5B8FC6FABEE0C936F06
+        stream[65472..65535] = 85D7E59D15760E12C5E8D0D5CD9B46E7
+                               00F8E821C91CAC8C37A6200E61A71E84
+                               15932834C0A06DC7E5738E11A0F9A9C4
+                               38ECE66D8D5A654A754FC5858B28EE21
+        stream[65536..65599] = CEC10B6D37543B35CE32B152BE2928FD
+                               C8476E341F23AFB3B404D40EC0657A8E
+                               95F5CF7297EB1948385A5FB2FBBFAF66
+                               E252F35AA1DF199FED99DA532E5858E3
+      stream[131008..131071] = 9DF7785EB3E69ED977E6DCC59EDA18A7
+                               41029BCCC4590A46B8F9FAB96B5C4268
+                               2FE49EC0BF79FBB637E6DEEACC068E4C
+                               93D215555CF876E17F37968576C5D5FC
+                  xor-digest = 0B36039A89999715A7F53207DD60203A
+                               B397397C718C7057E82E36C05E49506C
+                               911F9596F2A5818E0ABE6BE666086DA7
+                               9B18E89A43C64B9227BF9DF65CD55C35
+
+Set 6, vector#  3:
+                         key = 0F62B5085BAE0154A7FA4DA0F34699EC
+                               3F92E5388BDE3184D72A7DD02376C91C
+                          IV = 288FF65DC42B92F960C72E95FC63CA31
+                               98FF66CD349B0269D0379E056CD33AA1
+               stream[0..63] = C8632038DA61679C4685288B37D3E232
+                               7BC2D28C266B041FE0CA0D3CFEED8FD5
+                               753259BAB757168F85EA96ADABD823CA
+                               4684E918423E091565713FEDDE2CCFE0
+        stream[65472..65535] = 340CA4A2B985CCB5C07964B36AB84409
+                               679FFBC616ECFCC672A0F61BBE94AD0F
+                               E6C065CFC069BCA7D33FF35BB2967D0F
+                               FE84BC6006E46D7CA0C1AAEE279E8C32
+        stream[65536..65599] = B5221331961267143AF1A5EC7D1118CD
+                               C96A4B088404F5B6C5BE7320C87C4E90
+                               F5333906AC759D7747EA06903525620B
+                               D05703033C5F1973809B9D674688461B
+      stream[131008..131071] = DF8934D8386B59B681CC9146E6EF9A7D
+                               765366267B4BDE3DE8DD15B714A397D4
+                               08432F2B975F6274132FECDA89E0FB32
+                               379023ACDA101452D30657E6D5059828
+                  xor-digest = 36D3E252F992C30C76818B3364613BE3
+                               7F84FC4B848272404E7D9E689BCB945A
+                               A85CBA790187A4FAF9811CB0824F2F46
+                               6DB05D3F96A0AF233486AD28A593AC24
+
+
+
+End of test vectors
diff --git a/crypto/test/data/keys/README.txt b/crypto/test/data/keys/README.txt
new file mode 100644
index 000000000..352170fec
--- /dev/null
+++ b/crypto/test/data/keys/README.txt
@@ -0,0 +1,4 @@
+The pbes1 and pbes2 folders contain a series of encrypted private keys generated with openssl.
+
+The password for all keys is "12345678a".
+
diff --git a/crypto/test/data/keys/pbes1/pbeWithMD2AndDES_CBC.key b/crypto/test/data/keys/pbes1/pbeWithMD2AndDES_CBC.key
new file mode 100644
index 000000000..a765d9c62
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbeWithMD2AndDES_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbeWithMD2AndRC2_CBC.key b/crypto/test/data/keys/pbes1/pbeWithMD2AndRC2_CBC.key
new file mode 100644
index 000000000..40b449b40
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbeWithMD2AndRC2_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbeWithMD5AndDES_CBC.key b/crypto/test/data/keys/pbes1/pbeWithMD5AndDES_CBC.key
new file mode 100644
index 000000000..f54557e4d
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbeWithMD5AndDES_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbeWithMD5AndRC2_CBC.key b/crypto/test/data/keys/pbes1/pbeWithMD5AndRC2_CBC.key
new file mode 100644
index 000000000..595ee5049
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbeWithMD5AndRC2_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbeWithSHA1AndDES_CBC.key b/crypto/test/data/keys/pbes1/pbeWithSHA1AndDES_CBC.key
new file mode 100644
index 000000000..2eb164ac5
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbeWithSHA1AndDES_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbeWithSHA1AndRC2_CBC.key b/crypto/test/data/keys/pbes1/pbeWithSHA1AndRC2_CBC.key
new file mode 100644
index 000000000..c724d63e4
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbeWithSHA1AndRC2_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbe_WithSHA1And128BitRC2_CBC.key b/crypto/test/data/keys/pbes1/pbe_WithSHA1And128BitRC2_CBC.key
new file mode 100644
index 000000000..4455719c4
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbe_WithSHA1And128BitRC2_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbe_WithSHA1And128BitRC4.key b/crypto/test/data/keys/pbes1/pbe_WithSHA1And128BitRC4.key
new file mode 100644
index 000000000..efc0c1e00
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbe_WithSHA1And128BitRC4.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbe_WithSHA1And2_Key_TripleDES_CBC.key b/crypto/test/data/keys/pbes1/pbe_WithSHA1And2_Key_TripleDES_CBC.key
new file mode 100644
index 000000000..ba349f1f6
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbe_WithSHA1And2_Key_TripleDES_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbe_WithSHA1And3_Key_TripleDES_CBC.key b/crypto/test/data/keys/pbes1/pbe_WithSHA1And3_Key_TripleDES_CBC.key
new file mode 100644
index 000000000..a9098b7f9
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbe_WithSHA1And3_Key_TripleDES_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbe_WithSHA1And40BitRC2_CBC.key b/crypto/test/data/keys/pbes1/pbe_WithSHA1And40BitRC2_CBC.key
new file mode 100644
index 000000000..71dafa9bf
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbe_WithSHA1And40BitRC2_CBC.key
Binary files differdiff --git a/crypto/test/data/keys/pbes1/pbe_WithSHA1And40BitRC4.key b/crypto/test/data/keys/pbes1/pbe_WithSHA1And40BitRC4.key
new file mode 100644
index 000000000..85a18e48f
--- /dev/null
+++ b/crypto/test/data/keys/pbes1/pbe_WithSHA1And40BitRC4.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-128-cbc.key b/crypto/test/data/keys/pbes2/pbes2.aes-128-cbc.key
new file mode 100644
index 000000000..8b8fa28d5
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-128-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb.key b/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb.key
new file mode 100644
index 000000000..a30a3e384
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb1.key b/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb1.key
new file mode 100644
index 000000000..9b3515487
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb1.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb8.key b/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb8.key
new file mode 100644
index 000000000..dc974b0fd
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-128-cfb8.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-128-ecb.key b/crypto/test/data/keys/pbes2/pbes2.aes-128-ecb.key
new file mode 100644
index 000000000..1a9dbfa0e
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-128-ecb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-128-ofb.key b/crypto/test/data/keys/pbes2/pbes2.aes-128-ofb.key
new file mode 100644
index 000000000..0cb9df7ba
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-128-ofb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-192-cbc.key b/crypto/test/data/keys/pbes2/pbes2.aes-192-cbc.key
new file mode 100644
index 000000000..fa9b39b9c
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-192-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb.key b/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb.key
new file mode 100644
index 000000000..ac21ae937
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb1.key b/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb1.key
new file mode 100644
index 000000000..c33f3ea04
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb1.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb8.key b/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb8.key
new file mode 100644
index 000000000..31016341d
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-192-cfb8.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-192-ecb.key b/crypto/test/data/keys/pbes2/pbes2.aes-192-ecb.key
new file mode 100644
index 000000000..0a061a073
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-192-ecb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-192-ofb.key b/crypto/test/data/keys/pbes2/pbes2.aes-192-ofb.key
new file mode 100644
index 000000000..cdc4cb48a
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-192-ofb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-256-cbc.key b/crypto/test/data/keys/pbes2/pbes2.aes-256-cbc.key
new file mode 100644
index 000000000..393f89244
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-256-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb.key b/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb.key
new file mode 100644
index 000000000..7e88cb710
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb1.key b/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb1.key
new file mode 100644
index 000000000..9a8e33fb3
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb1.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb8.key b/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb8.key
new file mode 100644
index 000000000..84643b610
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-256-cfb8.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-256-ecb.key b/crypto/test/data/keys/pbes2/pbes2.aes-256-ecb.key
new file mode 100644
index 000000000..293bde51a
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-256-ecb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes-256-ofb.key b/crypto/test/data/keys/pbes2/pbes2.aes-256-ofb.key
new file mode 100644
index 000000000..f47d92f95
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes-256-ofb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes128.key b/crypto/test/data/keys/pbes2/pbes2.aes128.key
new file mode 100644
index 000000000..0711ff29a
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes128.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes192.key b/crypto/test/data/keys/pbes2/pbes2.aes192.key
new file mode 100644
index 000000000..6fea76e44
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes192.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.aes256.key b/crypto/test/data/keys/pbes2/pbes2.aes256.key
new file mode 100644
index 000000000..b449e07bc
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.aes256.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.bf-cbc.key b/crypto/test/data/keys/pbes2/pbes2.bf-cbc.key
new file mode 100644
index 000000000..4b2601e74
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.bf-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.bf.key b/crypto/test/data/keys/pbes2/pbes2.bf.key
new file mode 100644
index 000000000..7fbb6ed8c
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.bf.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.blowfish.key b/crypto/test/data/keys/pbes2/pbes2.blowfish.key
new file mode 100644
index 000000000..2b19b2446
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.blowfish.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.cast-cbc.key b/crypto/test/data/keys/pbes2/pbes2.cast-cbc.key
new file mode 100644
index 000000000..383b6d447
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.cast-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.cast.key b/crypto/test/data/keys/pbes2/pbes2.cast.key
new file mode 100644
index 000000000..208cc5fa6
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.cast.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.cast5-cbc.key b/crypto/test/data/keys/pbes2/pbes2.cast5-cbc.key
new file mode 100644
index 000000000..728de6fc0
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.cast5-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des-cbc.key b/crypto/test/data/keys/pbes2/pbes2.des-cbc.key
new file mode 100644
index 000000000..8c8f4bc6e
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des-cfb.key b/crypto/test/data/keys/pbes2/pbes2.des-cfb.key
new file mode 100644
index 000000000..0cdba7c57
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des-cfb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des-cfb1.key b/crypto/test/data/keys/pbes2/pbes2.des-cfb1.key
new file mode 100644
index 000000000..9474026e6
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des-cfb1.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des-cfb8.key b/crypto/test/data/keys/pbes2/pbes2.des-cfb8.key
new file mode 100644
index 000000000..c5d5594c0
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des-cfb8.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des-ecb.key b/crypto/test/data/keys/pbes2/pbes2.des-ecb.key
new file mode 100644
index 000000000..1798e4d0c
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des-ecb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des-ede.key b/crypto/test/data/keys/pbes2/pbes2.des-ede.key
new file mode 100644
index 000000000..0ca0df8f4
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des-ede.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des-ede3-cbc.key b/crypto/test/data/keys/pbes2/pbes2.des-ede3-cbc.key
new file mode 100644
index 000000000..dd3579bbe
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des-ede3-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des-ofb.key b/crypto/test/data/keys/pbes2/pbes2.des-ofb.key
new file mode 100644
index 000000000..d92de62ca
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des-ofb.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des.key b/crypto/test/data/keys/pbes2/pbes2.des.key
new file mode 100644
index 000000000..3b4f3cb1a
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.des3.key b/crypto/test/data/keys/pbes2/pbes2.des3.key
new file mode 100644
index 000000000..78ca4a517
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.des3.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.rc2-40-cbc.key b/crypto/test/data/keys/pbes2/pbes2.rc2-40-cbc.key
new file mode 100644
index 000000000..6f50f1381
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.rc2-40-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.rc2-64-cbc.key b/crypto/test/data/keys/pbes2/pbes2.rc2-64-cbc.key
new file mode 100644
index 000000000..1a70f9721
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.rc2-64-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.rc2-cbc.key b/crypto/test/data/keys/pbes2/pbes2.rc2-cbc.key
new file mode 100644
index 000000000..c8778c41f
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.rc2-cbc.key
Binary files differdiff --git a/crypto/test/data/keys/pbes2/pbes2.rc2.key b/crypto/test/data/keys/pbes2/pbes2.rc2.key
new file mode 100644
index 000000000..fef0f143a
--- /dev/null
+++ b/crypto/test/data/keys/pbes2/pbes2.rc2.key
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/README.txt b/crypto/test/data/openpgp/dsa/README.txt
new file mode 100644
index 000000000..9abffbf27
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/README.txt
@@ -0,0 +1,36 @@
+This archive contains material to help verify interoperability to the
+OpenPGP DSA2 design as implemented in GnuPG.
+
+Keys are located in the keys directory.  Included are:
+
+ 1024 bits, 160 bit q size (i.e. regular old DSA)
+ 2048 bits, 224 bit q size
+ 3072 bits, 256 bit q size
+ 7680 bits, 384 bit q size
+15360 bits, 512 bit q size
+
+All secret keys have the passphrase "test".
+
+Note the inclusion of 7680/384 and 15360/512 keys.  They're large,
+inconvenient and absurdly slow.  GnuPG will accept any size key, but
+will not generate DSA keys over 3072 bits.  I include these keys
+mainly for be-liberal-in-what-you-accept testing.
+
+There are are signatures issued by these keys in the sigs directory.
+The filenames indicate the key used to make the signature, and the
+number of bits of the hash.  In the case of the 1024-bit DSA key
+(160-bit q size), there are 5 signatures using different hashes.  This
+is to demonstrate hash truncation to fit in the 160-bit hash size of
+that key.
+
+File			Key size    Hash
+----------------------  ----------  -------
+dsa-1024-160-sign.gpg	 1024 bits  SHA-1
+dsa-1024-224-sign.gpg	 1024 bits  SHA-224 (truncated to 160 bits)
+dsa-1024-256-sign.gpg	 1024 bits  SHA-256 (truncated to 160 bits)
+dsa-1024-384-sign.gpg	 1024 bits  SHA-384 (truncated to 160 bits)
+dsa-1024-512-sign.gpg	 1024 bits  SHA-512 (truncated to 160 bits)
+dsa-2048-224-sign.gpg	 2048 bits  SHA-224
+dsa-3072-256-sign.gpg	 3072 bits  SHA-256
+dsa-7680-384-sign.gpg	 7680 bits  SHA-384
+dsa-15360-512-sign.gpg	15360 bits  SHA-512
diff --git a/crypto/test/data/openpgp/dsa/keys/DSA-1024-160.pub b/crypto/test/data/openpgp/dsa/keys/DSA-1024-160.pub
new file mode 100644
index 000000000..3fec64eb8
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-1024-160.pub
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-1024-160.sec b/crypto/test/data/openpgp/dsa/keys/DSA-1024-160.sec
new file mode 100644
index 000000000..8ee1179a8
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-1024-160.sec
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-15360-512.pub b/crypto/test/data/openpgp/dsa/keys/DSA-15360-512.pub
new file mode 100644
index 000000000..4f931c657
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-15360-512.pub
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-15360-512.sec b/crypto/test/data/openpgp/dsa/keys/DSA-15360-512.sec
new file mode 100644
index 000000000..3c204bff2
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-15360-512.sec
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-2048-224.pub b/crypto/test/data/openpgp/dsa/keys/DSA-2048-224.pub
new file mode 100644
index 000000000..1c8dc6984
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-2048-224.pub
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-2048-224.sec b/crypto/test/data/openpgp/dsa/keys/DSA-2048-224.sec
new file mode 100644
index 000000000..776edfcb5
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-2048-224.sec
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-3072-256.pub b/crypto/test/data/openpgp/dsa/keys/DSA-3072-256.pub
new file mode 100644
index 000000000..307205cf2
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-3072-256.pub
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-3072-256.sec b/crypto/test/data/openpgp/dsa/keys/DSA-3072-256.sec
new file mode 100644
index 000000000..66008cb29
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-3072-256.sec
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-7680-384.pub b/crypto/test/data/openpgp/dsa/keys/DSA-7680-384.pub
new file mode 100644
index 000000000..6c888a44d
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-7680-384.pub
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/keys/DSA-7680-384.sec b/crypto/test/data/openpgp/dsa/keys/DSA-7680-384.sec
new file mode 100644
index 000000000..b57f5d9ea
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/keys/DSA-7680-384.sec
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-1024-160-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-160-sign.gpg
new file mode 100644
index 000000000..c90658540
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-160-sign.gpg
@@ -0,0 +1 @@
+$xp=)O'gT<ꑚ_(ba~IbSZ/겠պe,(p̊=sK
\ No newline at end of file
diff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-1024-224-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-224-sign.gpg
new file mode 100644
index 000000000..8485bd335
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-224-sign.gpg
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-1024-256-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-256-sign.gpg
new file mode 100644
index 000000000..bebe1fdbb
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-256-sign.gpg
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-1024-384-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-384-sign.gpg
new file mode 100644
index 000000000..f84c3035d
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-384-sign.gpg
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-1024-512-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-512-sign.gpg
new file mode 100644
index 000000000..f700ce473
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-1024-512-sign.gpg
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-15360-512-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-15360-512-sign.gpg
new file mode 100644
index 000000000..bbdb44c2a
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-15360-512-sign.gpg
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-2048-224-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-2048-224-sign.gpg
new file mode 100644
index 000000000..d64c8176f
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-2048-224-sign.gpg
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-3072-256-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-3072-256-sign.gpg
new file mode 100644
index 000000000..2da027129
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-3072-256-sign.gpg
Binary files differdiff --git a/crypto/test/data/openpgp/dsa/sigs/dsa-7680-384-sign.gpg b/crypto/test/data/openpgp/dsa/sigs/dsa-7680-384-sign.gpg
new file mode 100644
index 000000000..f313c6aec
--- /dev/null
+++ b/crypto/test/data/openpgp/dsa/sigs/dsa-7680-384-sign.gpg
Binary files differdiff --git a/crypto/test/data/openssl/README.txt b/crypto/test/data/openssl/README.txt
new file mode 100644
index 000000000..03d993374
--- /dev/null
+++ b/crypto/test/data/openssl/README.txt
@@ -0,0 +1,8 @@
+Some OpenSSL-generated files, all containing the same DSA or RSA key,
+with various types of encryption applied (as well as the unencrypted version).
+
+The password used for all the encrypted files is "changeit".
+
+The PKCS#8 files which contain ENCRYPTED PRIVATE KEY use this password for
+the EncryptedPrivateKeyInfo object stored in them.
+
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes128_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes128_cbc.pem
new file mode 100644
index 000000000..7af858e9c
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes128_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-128-CBC,3D7028A746BE6B09694E16A222C543CB
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes128_cfb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes128_cfb.pem
new file mode 100644
index 000000000..de088f91e
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes128_cfb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-128-CFB,C0CCB782DF620FA388D9A356F8B7C346
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes128_ecb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes128_ecb.pem
new file mode 100644
index 000000000..4f69fa7c7
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes128_ecb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-128-ECB,174C8C70B397BCF00CAECA7AAF7A0A73
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes128_ofb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes128_ofb.pem
new file mode 100644
index 000000000..cddcea9fa
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes128_ofb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-128-OFB,B32C602DACAACE3A4C55B4600D974E5F
+
+w1+kMXURdxpREW3giZg+PooayvatT1Pf1bY/h0Wcm8z0w7zRtQOyjCOdEPNxsdd5
+ZYn3qEIOO+wkw0v0PdK1AaegJfYMbMpSp/iEyFXU/LHS0FpO7o8zmUiAvdeEKAFt
+Qk90gFBiyQyvWEWsp32KQH1/eDSeSLeQbfRfDbh70DkB4nUjYMW/eFL9E/cHCmdw
+0LKUpEycc4s8i/mWCYJF+cQd4J8RHK+Ose2+5z86kHTrbFSlTBEZEXPDRHl8ZsZE
+477A6/Ndy0Mq3+NgMLSl8xacs2v3itdza3AJREVOzvnRmV+NmWtYQ4MQrJrLg2yv
+wfAf4b2r+k8Igbpzn3NCEYolecGfyEWftzTsqTutlFO7RfeW8go4v2MvEsmHTphQ
+k2qaQkdSTFaA7a2O4PKezJap4RRCJhq1d5bw7RwkCpbRshsvrKQqGdTGJxEZZfGY
+6pOt/qRL9LVCGUVdTTdje7fx9okx0LvKo62eKcUBh/AwZGE+ue28g6/77iABuVtQ
+6kgJ3lQK3AQwKislF5cBC9MAkiIomsoVOKiP6+yX74XIa7T+3aWXlsY1oX13+kMW
+zijwOrc114Sus2eS3xSCOWLYN+0GECMrh2NDGDW6tx7i3R20BuEF/IwHob1qjbkz
+hnS8KrRY+174avQDeF1lMSBz4Wfi0O1IDuxWRDRT2z31E4E8EIoJh+73NZr7w6JA
+8usK8RkiJ4ypoOPtRegXX6GBG5UYgI5bn1Ms2X5xSUGIXgG8IwjHDbAAd5xLSWp+
+01HzUsR+6wA3MxYiybTU4eOKNMviM1G4gGsKeuGrDsNnidrHfSzVyOGVVHr51xRI
+9Xie4FX/VX8/7Q5RMsA8Y2eN/yeVwXup65JRhDD5LjILVMy7aA90KX7y/s8KIYae
+n6lB7PtcpRWwhdYSYtnlrJmYmrl55d6ZQtJm2/xjnOBd+igY4YKNjh11xBL8YNo3
+wBjW4/lgrlvC7kbLxO6JIWipPr/6F3bjvmeLclTAZxjM1NU5HhTScGaEA8A4bq4+
+6Jiw9ZUw+TDCOmntkgEublcCMjcAxrawWYO/5EWuOAOkyBsa7BbfsUv3pgPugz70
+qa/CEkshP5e/1VZgFq/BNFtb
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes192_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes192_cbc.pem
new file mode 100644
index 000000000..9b916321a
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes192_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-192-CBC,7FA13403627D9E1FA02FF88F6D594679
+
+hZYB09uY4gjQFEHX8KGI33EzcJijYhBMNJCR9v8UK8IcQIITOfZxYV2BmrfQhuVh
+Kcar1JrQdnc4S7+UDFIjlLV9ErBCvIUQEflP2ByDhxl892EtVcoMKB3BJ2Rgi9mk
+32KhayXo5V2bu2kOv2nTAjp91LebDz/ylmhhJhI86BL0DLjnjTEl99v9OHQsMtb9
+cXZb51mwIynmqU7Wf+PchH83Yw0WOKs4MOrCtsqO9lL7Mf/MiSSiE+S/rpKLPXY0
+4aBxP6fw+HG57gPlNAvv/qKtJu8YgZDqVXhIKNDZRTSRX+B9R1Yo1tgmJVPhk/7x
+mmYUxIb7w9nqa5OrxzFHyNvo1U5dJcXyCEhvUZ3ImR1DZt/oGJYgrPd/8YcYbsNP
+LKmTLUKI5CARZ5KcOjfM8vpKqlfpCg3Yl1FaNIjM0eAhD6XrepLj3faAJW4/YEoZ
+SGMO5atbM0ERT9sNDJTG0iMW6xGL5l/6pzfsTKI/2yMaAeWAyvg1PySNoSH7s6CC
+CfqF0w0VpQEiOPb+qjtmjBDB/VW5kNrRiBQqZAgpO6mED0jAdg9o31tyuuaFDWzX
+41C2viVvxTx5A/xOtPvaDo9EMecc+7MpPLM2VhWhPDiDBYb8PCKqBOEwIyH119MN
+gQEC0IN/itc/J9ybHLCjrF1Rp83T3/XhAaXNVU9msBBpKNjawnwsUUj8gI0JRbx/
+5ehO32sQm8wkMyP/8iKDAqBRkDT3RIEmLi8ms+ZZRmLwGBkSZZzvOK3A5Dder4bp
+dIhOOetvoN6Bs9l1i6Dds64pwsy8IcnLLeNmOag+Qh8+pVUBNZ1zUV3KSizRKh5U
+dyT6VMILd2EAUJYLXs9HNFTtHZglRb96jQ3rkHGmAepeIVnJlNGKByvDUsJQDGl/
+bGNk5Ejz93ylY8JzR1GaYyFVIUU0qY8khbo7bSn/o6II+KjyTTyTkV28jTSD5dYe
+upGHOzmqpGi3Pzaz3DXpbLcMzwYrMP9FuXuqkVWToDs87DCfGqskKtko+zlTV7/P
+eBILwUawtXMJfYntkV247FffKgS3/BNkgEE+iNthOsFMSoqX/3ESBKJdJDfKRH0J
+BkYL8O0I7OwYzfU3gCWVZ8AvAhd+nSqp4H3QUK0QM2w=
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes192_cfb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes192_cfb.pem
new file mode 100644
index 000000000..9dd5b153f
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes192_cfb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-192-CFB,3E445502677C77AC6ED115F8EFD9BBB7
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes192_ecb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes192_ecb.pem
new file mode 100644
index 000000000..c7608e02e
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes192_ecb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-192-ECB,C625A2E97BCB192B31A8E33CB0CD857C
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes192_ofb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes192_ofb.pem
new file mode 100644
index 000000000..501003586
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes192_ofb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-192-OFB,7E4DC037A44E5DEE4E005CED36B18C16
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes256_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes256_cbc.pem
new file mode 100644
index 000000000..17289b2db
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes256_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-256-CBC,307CEE18F79CA333A38CA90E75B248C5
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes256_cfb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes256_cfb.pem
new file mode 100644
index 000000000..06718a55b
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes256_cfb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-256-CFB,337D3978222A1367F5CFE08611416E9C
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes256_ecb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes256_ecb.pem
new file mode 100644
index 000000000..ab0f64d8e
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes256_ecb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-256-ECB,267E98B92F05ECECABF28790E81DCFA0
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_aes256_ofb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_aes256_ofb.pem
new file mode 100644
index 000000000..7192ffc10
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_aes256_ofb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-256-OFB,A2D4D65382905DF6EEE7A315B10CF2D9
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_cbc.pem
new file mode 100644
index 000000000..8b71187c2
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: BF-CBC,B23E9DCDF6361CCB
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_cfb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_cfb.pem
new file mode 100644
index 000000000..8372cff2e
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_cfb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: BF-CFB,A39496D20CA5F694
+
+A9ZO/WPm319cQ3hoxaEsmuGVDkMVhCuRzFfSWC4hVBsxKHd3FIw8xZpGSkEI7+aL
+cMtcyxTQn4jVV71Sw3vyb4N1+2i+DAd+63l8LztpTBQi1o2gTBqmqL9esV3shqWB
+JV7uyOi94olPea0Rf5PMRXx1bAZs9U0TV+5XHAQxM04lXRJajxiN9LBZ1OMRiUVu
+SdoHdXh077ylUQmgDaGQktWYuVH6leq7Yc9CF3nre6njFiUrpk61iPki7+/FgWzq
+vToqiYaWffy+1lB7sXcL88BtFaMWAOV5A48Mv05miTb00VbJqdKL+SDmu6j2Soxi
+Qk3k6Le0heXFHqqkURMKOrr6tepqKEjmy8WTELwMnuT5vNngMqDKpNyhdsIEJW69
++L0imi4fWIelCd7PMI1bbPAp2QsB8Rndjlfj3irVm0AtubL/rbep3JT0ezukoScd
+wLYNTlDdaLfEggry/1kYvPBMolU4xqDxg7C0quwYxLuycEFzU2QmWNtRn0xkfx+j
+ruApr4getT6q2fJznW7coiW+OE9Ik7JgtYUGEZuWFUeydDHa9PiJ34w9t/aw50Sk
+arATzKH66zM//g1zgzg31SmziKeE375skyQr2+1S9RajmdZzEUDL5ajsdrbALflf
+UPQNr0YEF92DRHsI4O39L/+k5fesiiU38u0NoKv5DDRb5T1lQeesDZCZBowQP5KP
++6o6lnj8kCeccpGX/eUukPXFl6mdddAJ/vLptHC1zaRp2dlKPRfedZkRm4Wduplh
+vQ+6oGqkjep0Q/LSRcVP69m91CZot86lAn9Ct0jfJu8o7Ua7KBeOB2k/rx1nUaZG
+BOjHQRaSvPA7FVKCP1UlT0GR2hTb/VcW3UQJ7fCY8E4hc1kPfoa/T+mf0JrHtlMm
+364YQh6KLgcsgVjsPBXnTN1+POH0Qy0xp/0VwQIQFWKwU7gsXprfs/uYx0uD2Ev1
+w9kIWLovIGmBh6HKptqTnjtdwhqueez5kb3MkrCMi3kqVmV1TEQoklz6eBbloXbX
+SyR5jivLmuaoCJOA3oQ/A+75bwcvUP4iULZbdTpM2rnURyljKNU9Hwxim0neZ0Zv
+4kiOZuhQKkGfj0gv5bRkDAZC
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_ecb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_ecb.pem
new file mode 100644
index 000000000..58acd6f7d
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_ecb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: BF-ECB,6105920EB281329C
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_ofb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_ofb.pem
new file mode 100644
index 000000000..2558ae409
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_blowfish_ofb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: BF-OFB,56A8F965C6533468
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des1_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des1_cbc.pem
new file mode 100644
index 000000000..f6fb1c9bf
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des1_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-CBC,7D7F5AED62DF7398
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des1_cfb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des1_cfb.pem
new file mode 100644
index 000000000..c3af8d5e6
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des1_cfb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-CFB,6215481F0FAE54A9
+
+4ZA2xcGT6hS0kQObPwTWmluIl2wTnoL2jRMbxrr7usOZSLYISprcATZWieEKLsu0
+kNNzIptFCmRDt0b8VlothTS2jBIh5nlu9LqvaUlIrVuMEn7umslWrLK8JWnHVKOO
+dMfqNcgmYlkbEfmmXLtlCbfQHT2kVlopD58yxf26FTQ+27l+hSX4wn2uD+xFUAcn
++9ZxAWQDhi2PYVKqTTPfhCPaKW7hjYdocADnIZg+1mhH++8fPxlDmBQBmMOid53Q
+WV9LI4Fps90d7GumX7qSUFZTkBKN3v+E2ahnoP2bTBQGkqWamKFTc/4uLCEGlSWU
+qXaGCy1AwPa9As1+B/jLkTstoslJppqvOooWW2R1o7JHqN44luXXQPZ+BcA7dSdf
+zRcMCpudB0AwHBy3mnUNuBlUjsf4rEpq51HPSS8duYow2I127uI8m8OCoZCaUVid
+msxVMSJIiDCiBi18EfCjMfGLtQVxJefMv2hmcAXQXSRDJTEw8Lrtm0Mtp7XK2B0A
+v8Kqpf3x+VBc770Xoy0K1/fe5oLdvJrJOLO5PVcVXIS9B/DTqIQ8ObABJPZ1sCKA
+sV8XebteS8fNXmFrVKBTmHBpUY8H5Z++VfDtKZZUBYSOqbFT+UU/+xJKlKICzFTo
+YWsmPTgFsu0Z7/PMyg/rccrb9fMWRXa8et0JGoF2NlYu+lkRb/nYPe84oS8RzZT1
+dtWJMiiom4xRgENDhV6/AmA9IuyXT3QbDfFB+ntdyk94U+Ms0ODNcdA4JmEa/f2k
+zFjtEGWHPH8Quit+zUt+8JnWSSFp0mjyA2ZtEj/6Qg5rqAZMdlpTo7rcuYOTHScn
+ic/H7V43SuMlRAM+xx1bGrNzjWUugHrVb7Kar56pSRPtSOQ00Dmz7gB8V5LU63n1
+YX3faatiPUNRG1dArcW36o9dZ5x8O5TErPHRJNYG+96UNoAzHMXoi5thuRyVbzne
+FpOqgxsryobcht7fwHuYgUq92QoY2qG6qMwHc2A3NrVFi8lJ0R83SN0lOzLebulu
++zDvrvkkRyH14uoAWi/o5IGBv1yIkO9vYApntrSO2aLnbevht9MuDJqW/Lkb579Y
+LG/sVwxTmBT6jdCgTdpd1ExE
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des1_ecb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des1_ecb.pem
new file mode 100644
index 000000000..d17a90f37
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des1_ecb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-ECB,1040C4105685E404
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des1_ofb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des1_ofb.pem
new file mode 100644
index 000000000..2d36cbfd8
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des1_ofb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-OFB,BB20E846FFFBD3EF
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des2_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des2_cbc.pem
new file mode 100644
index 000000000..98d36821a
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des2_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE-CBC,89A720DEE88FA71E
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des2_cfb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des2_cfb.pem
new file mode 100644
index 000000000..edd5d8b3a
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des2_cfb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE-CFB,AC1BA482ADC9EB3E
+
+tPu6t71kZlKyKaRiXgAMCmyxL/P6dVH/sPVY3KDFI0FsAGoPZaD8s7BkLLOy30Y1
+66kmaaWiaPjQN2g5zMrszrXh4AXazrjMrmIJ2NksNXz7aiySFafyYjyCPA+LIu/n
+KnfoE42KYEmENgMSUV9sh/nlwYS8I6LWva384BIWaG3qnFgfZ4gwgiI/R+1/lPXa
+olOpnI5szYMiV+som2E+I8lgd+Ahf2rempMnuwyWTDmUvYWwst7F5bz9XbmJyeWY
+HDDaTPy2Q1yRYBRvLTm64iA0J9j1TpJnSNm0uIRTVOEIZfOwOx20tFjo7RREunAx
+mEm+kmn4AIYhw5RQE5XQQvD42X4MLyc0M94k5pQHvgJFypXeJ4VsH8pkd4bqfy91
+qiPiKdA7nWnbedExwiwSPOhjOLkmQrXjsMVmoqqexhckJfmNOaXYtnQ8cZc50HjB
+6ccsjyLdQbLx1KT3e/NgfH4VxW4/hbbt3p0HMIxTnwt2lNG3AoKmLlOYSecuA4PB
+EE6oOauIKyJM8pwMV0hfBQ/MUQOnhHG+dbTn0kW91fRZiVPPvJiJ4NmEwD3ks3jM
+pLYZRot1Cd2ksJ79G4NXDFakB2bZ8EwtlQUrQHwW/ykPwiwpqCCha1PUzgsmG3hK
+U8bDWWQMqXtpSmItno1mF0H2TZzdbLpRAZe2lu8/mwww1qZfPE+MLPnCp050+BCw
+Hbq8fF1WVpJvsE5CKzi7Ll7bSrJ6BslrlzL4mFnnGmuz/mbBIL0MO24FNyVGKQlI
+hEzGu8lgp53pG4oSUZ+79CWBkn8mesk6iEOWcFojLKrlhnxZ7mDxBYfDp/2Bmna4
+lFt53zmQHJeYiO4J2TEXOQxvDWvcOK/SnAoLXEhUCRP9vTQm2Ahj1QMmEVvEybOd
+mRpcaJXUOgirS7Ulwc6ZhW7MoFFnS3UluI+gS0oXRW6hCm6l9poDem4etU+IsG2m
+4k6MoMLrak9lSheB1uL+xC0S9k20CZH0X8Hj5atb4R7T5+lTle/fVw1RGdfil1NK
+/ytD+CLpSV15Z6VGVGlzfXTIXYgCIgbZpFxOZk2tsdUm0dPBjR/ZhdUh4ofaxA8K
+jE8HLuW7kCkvmEfdsJxuRVVQ
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des2_ecb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des2_ecb.pem
new file mode 100644
index 000000000..35c220f7b
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des2_ecb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE,3D3D716B17DFBD33
+
+XDCVsv17xsOpLWONR8xKRYxnxvWs+bdU+2XCqoqH+cM/vR4+g4lqSPSAco0/LkyX
+q0/C7/BE7mN6fzUMiECYUKS2c739CBVwDJZJBVGbMNFexaQRmlSxqhmbQ60oalaG
+HZfpCLLHQvrOZ3O82aYuEfsbqJTEPkGm4lUn/5psQwudmu4qyv8GFR4wVpNcg9JB
+rDzesxi1aU6dgHSlLHrG5ot+lAITh40SCBQdwkcvixyDIi6l4FX2AyNrcQYmFGp1
+C3XaOn74ADLyo31Iy6rCb0KId6J+S+1aPUW2r1Xb6irI13/QYzIe8/fDfuyV7Ofq
+BKtHdu/oIfzl2X8BkuxJ0CEFxyyEE9majfItPnUEjX0Sn2PfOEwzq5LYYExpNuxe
+pHr9gtB+hSXC5t1b6ifv9PHErMNmBLdgLX/FT4PuL6URrn3LtydPcfW6XMkHtGgH
+zD/nnn8Kl1qXmkRbWHbREcOJB/O/Q53UwD26BsX+Sjwn2cfsgwQvZFzvmq/RwsCg
+Ej9FK80Tvn3ce+Kdt7LGUc9+KaH1OIn7qLcYu0Fhid/TzPCBPQffxpUJ1HylDaUz
+v1txJe3C//rg/42e5GUlKqf+/nzCmQeoaqZDG+VU3UKlngIYitlpwEq5fq/E8V35
+JeuHzFjYj0k9VNsOHY/4AqmEm9qi1yxb7WGINsysO+29RvfRD1bm2Zqhi/Mg7YBo
+8K1GowhW6uGFf+VCPORihMIxoT6xBU4xn2kX09EKrVdekrAi23QzslZXM6Ze0fxH
+7LlktJwah4/QFHwB5qXwmHq3lN4Nj1id+CElVZXjvbKvc4+mRd7VSn++05IFjTK5
+2r4FHifwpkGASJtVbF/7ZseaoOz9sHARx/MFSUp8kRZjOCzstWj6I0Fou51BTtRn
+1ZCey4e1eKVnV4F1XNdo27Aw9aZjF4Zn5hZfUPuUYBwN3W33l8FXRdYEoT/JpiQO
+8LS36SSZGVA0c6nanZoeDZsrPNtPJa8ANHR0QMwBDOwNr22uuJEG/nLvBfquG4HL
+Iy7nxBebe/0MXvsxK4OjjDzmYQL2msMlYffOABOVLCbtaPC/HBKUcmcpZ28WAzdN
+ArkPEcJFTgzI+hCAVG//uV59MkDnUZ+e
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des2_ofb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des2_ofb.pem
new file mode 100644
index 000000000..d06c31f16
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des2_ofb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE-OFB,0472499818A0CFA5
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des3_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des3_cbc.pem
new file mode 100644
index 000000000..f73edf131
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des3_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-CBC,9BF24F7ACA100D50
+
+71AQTQlq7BkcUMR0+Ghc8O2ykT347aaFUD9BYHXBW7SzEq4th3itEQQ4QxflbgR0
+2XZQE+dNK+s891XnEkf+8ZIIQc4LKr4m3P1t8UeAQvMbHRfAQ1u2/fMf5xwYMqsW
+BscjoQ0lFOcb69nb24E4taRu+MRDF2+eah2hlbHGbsTezIm1VzFRX2C4mnWyfffX
+2WyJQPlZpvOY4kkv8tRvW+nbZ0P7bRjjxrSbCeUVI8X3m0fiCJ0fMVg1MMaj8JxD
+AgIKBBIJV8SYRw3NqiGk/mIlMq4Qtl8PWEFBRf30DRD8RIqOO0yV9Czu/u1hcmxN
+x1/ZExbwOFAFwE/GU+NMegFRXC4toNIU2Xo1C84URpAvVAwwe6SiqWFTSTEHnRu2
+N/tfJlaL2yFrfRnp6mcNN3T8Rk376skXk1zml8Deh6rNU254yK2CFRgm+79W+CeR
+Gb1wxDw0GQ07Zr6/hNBfpAND4qEdyxYAfJQYOCufXiFFxWp+99TGKN4T/+Ab5D2j
+zKmpYFPJj2vuULLPGIJPnCVNjM5v2KwbFY/95Jh3JEF255TORfj2P6HETcjZr0pD
+TCk13jxgKs3mq98Vr5LGEJ4nUcm4GoZayIbeaM7heJTWmvQyP6PRZIDWi5mHs7K2
+wGUrutGZcxzLtaQkavQPf79xt+0CI9D8Nuz4FrKMS2ng+rWLzT3be46f6hJaX1KP
+cy8RLQfaWpFGBPHr8UKhicOpdbGjxxfBUM7Jlg2o1hQIWmSuj53SygZ/EQnqBV7E
+GG+Gf3RDl1Ab9ncOr2WAA5TOQ/yVBEYXy2W3TDmxuwf/fWvwF2z4DLq/J7pieEM1
+b1IuOlcDWNu6eKAhsrq0t6I/wYNB/7qOmIcMxn1dzDHjic3uO65IMH2swXmk7tuZ
+ExdHGutPDZKYG3TgMyMYk3W9YeoEZAjF3TodOYNpmtaDmftjIuxlaYzmtkQCFHGh
+cRlnPXJwaExSYrySX+1zsuqU2QaLB0AyTlAgkUdiLQOzfmHtiHt4Pgyv/o1z/PgJ
+VTVyu2IFh75H6CnSQGgNHIH6QGN3mcMIZQ5G0U2r46X+7+nnodOky09H2Gq71nQf
+vSk1M2ZoaOuo437zG8SlEuPKimz/d+PH
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des3_cfb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des3_cfb.pem
new file mode 100644
index 000000000..eb957ba43
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des3_cfb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-CFB,DDDE26F919588654
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des3_ecb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des3_ecb.pem
new file mode 100644
index 000000000..1dc818296
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des3_ecb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3,695F5DA31042DDE2
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_des3_ofb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_des3_ofb.pem
new file mode 100644
index 000000000..86f201939
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_des3_ofb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-OFB,BB994897E99A8F6F
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_cbc.pem
new file mode 100644
index 000000000..8a7d018e5
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-CBC,B0CBF8975CC514AC
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_cfb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_cfb.pem
new file mode 100644
index 000000000..acd0a47a8
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_cfb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-CFB,CB9482EEE6EC0DA2
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_ecb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_ecb.pem
new file mode 100644
index 000000000..1ded3d7bc
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_ecb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-ECB,4C5CF049EFF2E116
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_ofb.pem b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_ofb.pem
new file mode 100644
index 000000000..331542c4e
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_128_ofb.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-OFB,F01B181DC9520301
+
+azqFQnexfYYO2tX4qlC6XLU2tPX5EdwOHsruz4uzVJmYFyRLlrgG57KkahVjWupu
+AHkkjhr9d9m/0/t2vFy5JEnF9WWcNA1nxqzfsaIKmnuCULzYzMWu1cFfTV2DZoAn
+npdxa/eYmcGRZ0u3aZHRGpGtP1y2sKvWmUInYCc69oigiEn1qyDkRE/tDAREh7C6
+DWRcva94GLj1igIHc61lBugZKBlchv+q8t02Ga1slM10QRg2dgAlF8uCPZe+NLUk
+8uOifATkKTsA8OsUgn9nRK9dH4FuZeD64NMCszOw7mYtjJ7YW0J0wYgC9BuEUcNm
+QTxellBcs/qSdi4pZWsO9JXxvoc0lTmvoiS0rL+JlB/UfubVQYq+C7ScVJeTUNKL
+6fF8hvfQzqDDjqx+qP4SgboAmIbL7tTJBeABnnhCOtaY5vSuT0l96rIQm/EZdlWD
+hXKcrhawaq6pqh/mV2S16e2gDRQyUX+jKvumTQhjN1+AkIb7EMR1ZLJFX1l343Fj
+5/V4D2+H3EZhbCdkz4uI6I0swDasUjtigcn19kOy5t1r49zpTJ3wxQptLRx4AXUZ
+zjVXVebGyFYSdu+Lks1VC9WDeisBW18kCg5IpOz3eo9ULBBQZnzSKS30OXlyO000
+/1Em8FPKSKYeST3SmI1aDObXOG/s4tyKTCj+e2VKROq8hDhJQUYUP0AgYkAnwURR
++XylYEfUrW9v758Kk3u82ZhEen/lLUQhWeXkzhVi44Lgih3Bjsm3jP5f7KO/5KfM
+UqECKIHR/p/H/klXPNmdFo919AFGcnxFjQCyhlv0Bl8FSc5FUkRl9TTLu+h5m/p2
+ONV63odsVGt2q/HmL+3hojX/BxSEP/8Mq1JHR4Dk0qqUpSxRtDw0XE9/LU6s9NZp
+zm6lkr5E2U6EN677bmem5QoxObNvc88EXGr0EvoWPnhh20lD3vQok7GBucnycoj0
+9NMmRUIflnj47quAGXI6LuTSzKqOOCZC4yNvdyRdil3DgyLLefr99m2WEe0HolDu
+pIyUsgHMlZC/YRVzqP/6DklhKDcvgWbBeqqhV1r/30rRkegHdsWiAEjmJadlBrJF
+szJZpa9obMH/q0xUH3AXXCkS
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_rc2_40_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_40_cbc.pem
new file mode 100644
index 000000000..d44bc8631
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_40_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-40-CBC,7AFE1927D7FEE9F6
+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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_rc2_64_cbc.pem b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_64_cbc.pem
new file mode 100644
index 000000000..4a1ec9823
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_rc2_64_cbc.pem
@@ -0,0 +1,23 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-64-CBC,6646FC6A291EFE41
+
+KWLSTeo6nX30rQ3WbgL/13WAEMCtaC32ksYorVhlN4ijjiDu5gEnmfLRNYK4c3LH
+IUJawIdZvHSVxjrKNjmKA18w+4kedYCCL9NbNswd5eO18wldFR5NlSI2FGggzANN
+OwJoHUOXggYxhc2/xbYHpQpl7gvJqZtAjyewyTDYeTC3VDFoB/JywQ/8vv1MN8Ce
+Zx1k6preAQrnqo/LEIm+GPUa9flzWZlCGTIC+obNkjJGZPuUKLM/1TqNsrum33aa
+gFwnz//khQULylIRwxfuOMCHTslFmrs/7MLLbJQyTa99S9kc+s2VDlaKWUn0BVe/
+MoCseykcuIcskavuj01SYySJU1YHBTu7RvhuYO8AQmnsAP3gWQUMvKy9aXmzsoC2
+0Nk3QCZiG+1hN423So4NPOh42OWbqrDls9PKhXvQ8H+58rAxW2s7OTN29Klo39ek
+w8SFjMEtt9kLNpwBCJrIlolXvhD5WQu6XbqI0CtoOrh2Ote1c4uN88HyIUi1Y2Op
+QsfLkKyx7yJcJrz356Ab5lbJKVpKJW+frEHI7rLlfJrj88uzsh1B7oPL/4fhaj84
+vNUfadRJ25ZivBiHHdUTrKk9CLsIDS/1DWM6sDclYjXiA7kgGNwJupOb2L6VEKPv
+eimiJ9ooKq00E96Dc8s23FteQqySNaUAcqDnAkS+ck6pXQECZs4uD79k4pck1SX4
+O20OIPo79pzcWrmYOrTIXH6ttOcB3lUQtB1fmcMT5RSJYVSKtgBxLPKhLcL18xfb
+1HbDkpdUqS0R/nK7ecMd/LP+UmMKPUyMUTfTUnlXZzsNsgIBkm1eDn9RkOGaV+oc
+wau6FWmxVSPs9Inb+7A+B/2bP0qyYnciKX41I/PClKGitm52ScJyrEN0XJhQ0O+C
+mPp9weJI3IwpDn/Mc46NQO9uk4rC2P9o1zfJXC38PlEDEC66a1Y6SEQOVN6iYkYm
+rVytxWjD4o5vC+GwYJPYrmkOg/SQK1AlK8TSpNC5TeRcZ8YIbPLRfKRUQvUVtFS0
+fyPK9zdariwubkiG1a9/NWCF9gN1/DPKFYy+p5Au2ICD0iTtOND9I/Yw8dqsjzsF
+4jhYQ+No+ytLYc4Zo+8s1RO7yduFz7XQ
+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/dsa/openssl_dsa_unencrypted.pem b/crypto/test/data/openssl/dsa/openssl_dsa_unencrypted.pem
new file mode 100644
index 000000000..ee815db16
--- /dev/null
+++ b/crypto/test/data/openssl/dsa/openssl_dsa_unencrypted.pem
@@ -0,0 +1,20 @@
+-----BEGIN DSA PRIVATE KEY-----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+-----END DSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/eckey.pem b/crypto/test/data/openssl/eckey.pem
new file mode 100644
index 000000000..8ceb3a8a3
--- /dev/null
+++ b/crypto/test/data/openssl/eckey.pem
@@ -0,0 +1,9 @@
+-----BEGIN EC PARAMETERS-----
+BgUrgQQAIg==
+-----END EC PARAMETERS-----
+-----BEGIN EC PRIVATE KEY-----
+MIGkAgEBBDCSBU3vo7ieeKs0ABQamy/ynxlde7Ylr8HmyfLaNnMrjAwPp9R+KMUE
+hB7zxSAXv9KgBwYFK4EEACKhZANiAQQyyolMpg+TyB4o9kPWqafHIOe8o9K1glus
++w2sY8OIPQQWGb5i5LdAyi/SscwU24rZM0yiL3BHodp9ccwyhLrFYgXJUOQcCN2d
+no1GMols5497in5gL5+zn0yMsRtyv5o=
+-----END EC PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/enckey.pem b/crypto/test/data/openssl/enckey.pem
new file mode 100644
index 000000000..137fab345
--- /dev/null
+++ b/crypto/test/data/openssl/enckey.pem
@@ -0,0 +1,30 @@
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/pkcs7.pem b/crypto/test/data/openssl/pkcs7.pem
new file mode 100644
index 000000000..6104acd72
--- /dev/null
+++ b/crypto/test/data/openssl/pkcs7.pem
@@ -0,0 +1,54 @@
+-----BEGIN PKCS7-----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+-----END PKCS7-----
diff --git a/crypto/test/data/openssl/pkcs8/openssl_pkcs8_rsa.pem b/crypto/test/data/openssl/pkcs8/openssl_pkcs8_rsa.pem
new file mode 100644
index 000000000..8111b0d69
--- /dev/null
+++ b/crypto/test/data/openssl/pkcs8/openssl_pkcs8_rsa.pem
@@ -0,0 +1,28 @@
+-----BEGIN PRIVATE KEY-----
+MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDIY6+Wgj6MqdEd
+Yq6FgH5xMgTBmFqAonR/eshjxY2C6MHs+WmCmNSDik2NgZWIaODvOF9uOEK2U0Zf
+JEG2LcZxoeIEgg/mfII2f4DLy1JYajm/llzwFBzAd/Rkcs3qwP2ba5VKn/pSqNLl
+nKHMXkXO+9SjfHDx95x2dK1dB8eGQGculOMcTm3uK7UlWNO4TSlwG9qHZ1aoM3GI
+g5C1fIpbxJqDVjFq6fFAapE3KRIWIQmKd3E5ICcDErqr/AapxnfO8UFNxVWSOLW7
+ZAfis4w/c8/EAgyQHw42R0dNyjUOZsToF8McCsOpRjGolSU8aUyqspvd8IWJPd5d
+6HBHueXNAgMBAAECggEAV3q9MpVVPQ79TTjBO2Km0D+nt+QMzk8dUHGHfZbGejmm
+Pw96shqJ24rK5FWHs+8lEwmnD3TcGsAr3mjzjtZY5U5oXtNwoYwFRElRLqZqIlLt
+NugrVltRWeyD8j30CuGJVQoYOGWyX9d3ielg8NjO3NcvMtembttLoKK68/vrbH11
+9W7wr5p8/xyMfyl9curnmCFk5QqJ1FBpjPWY05NDIBCUJB0tGAqViCpxEeWPSlvb
+xcElqWfdbtnsYUxYU+iOTHHotoKnz4nLHYK2/njMhlCEyMXfu1DJOd8rg5yXewJF
+v6NhXgWStSexAT1bZ17LROazVcHfWB9QmXF1Fm7vOQKBgQD+dZxPDOi3Y4gCFegn
+Z+epNyl2aPTkseEZxrIqPKLHsGxUfYjQqkX2RdfTrq2vf4vFlN6uCXhSlZKXfLH/
+iQ8FAzqenhVVHK2fv5xB0SE5zNmcHDrHshl+/zUNI2u5AMFECVO2SVbgoFjvgkou
+FolK8XUXfHfb4f732LUyYI0lEwKBgQDJmkWHhzekz3P5iWaAt1SH8bZpt2hqa6Bx
+A4VvMdtmjCxEDETN0Rb3CPYxw3qa3xGfW1y1j/49xi4gr69yaT2Tbca7PFGUmWRo
+OJwfCUB5uBUi6UVytK19OVKReOm4666x8P3YO4cxxSI/HeoSU0HR1kkX9rGmrsGN
+MgUQ15+FnwKBgAKf6/DUzUG3ARwkZbSiWb1hGEhkZMJHI29EoWnWHke5BiUI9nRQ
+jVAxADzqvFfnFOYA1xssddVEPbLaUmu0WjdPBTfFoaqzFQdkzpPPOGyENGpr0B9n
+MuQgdceg6eeKnnO5NOfYcdD3VnOCAInhKaFgRDjty7604hBkZ9oRLOOJAoGBAIJ+
+dmUMlGr80XADjTLh+DhqsA1r542DDv44LkXUetS9BOYjHuIuZnQO+/UoOBNJMsn4
+xGDNzN7FihQkRCeFkZL9arbFi3TpeUGw6vV38qEXE69eWVKvOuEkmpqJLphBDfom
+KNmvZopDtTAvt9SWybL+xp9ZUpK26ZfwebD2MU63AoGBAOa2Kt01DxoqiWiQP/ds
+Mc9wOw1zJsSmIK7wEiW3FkCz8uw3UgjF9ymYY/YAW3eZtuUpuxEzyENb9f21p4b2
+zYoZ7nCUo4TmVXxgCjiEWglg3b/R3xjQr1dAABhTeI8bXMv5r/tMUsnS79uKqwGD
+2Gc1syc3+055K4qcfZHH0XWu
+-----END PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/pkcs8/openssl_pkcs8_rsa_enc.pem b/crypto/test/data/openssl/pkcs8/openssl_pkcs8_rsa_enc.pem
new file mode 100644
index 000000000..fa3cff6b3
--- /dev/null
+++ b/crypto/test/data/openssl/pkcs8/openssl_pkcs8_rsa_enc.pem
@@ -0,0 +1,30 @@
+-----BEGIN ENCRYPTED PRIVATE KEY-----
+MIIFDjBABgkqhkiG9w0BBQ0wMzAbBgkqhkiG9w0BBQwwDgQIleYNcQVMEocCAggA
+MBQGCCqGSIb3DQMHBAjb8ZXri5RWRwSCBMjR3ICOxCzBu74U87lV1QXPNlnlHD2v
+TlRv2LNLPseEBAMiJkgP47rYwpzMmJjW5bNzCLxT0pYv2Z3/pXPUqy6aNJmOgCmU
+HvVGdz2jS+WYBtfijc1J6MkuvkhRIBxL4CYJidVurc5X/ebRu3BHbj9Kg/j5Hjx7
+DV4qTxZR8vbRFH+ETdnVqj3pCYNOeYXvV+S0W7IN3rKmEk2su3u19YhbwnZH7Ny2
+YMjAn9FaYT8bK+zlPBZBiQ8TuZxm/jxvW2ScQPLk1pRUs8WkDsaYY1gdg5XuKDND
+xA+mq5xskAMUliQmhJaYxlmv83QZ89JzSd44lLvnNeiaP2xjAhj10ZSVQ8eOXP63
+NfHr9Ehqne5k0CI2fGg78pp8vIihw5D4WjHR46NvmbL1KIlxuYi4nFMtc9aK1zgq
+3rhDL9m3fZZ9Rdd6lb1LN3ZOL8e54tL4KKVkl5jxhrThHujACB94remv6da2z6K1
+LZPuDwI0njzC6Y6LgyGgAP75NKNAH0UzbpPncZxBdhyI5mOgRZnTMNt1XoToXOHP
+CMR5JfKqpczhoJnfcQJhFy44E1NH+qBOsNQTpypDe7Qiz878e6ebfcmXID0OyU/j
+o8czO+1BVT1S2LoN+xpeWcyNYoT+BnRVC99G7vKUoOeo90zNzQQOAEyoAjAg/52Y
+JWnOqnaxDqa0uJ/BPmESFvxeYZypJtoTd/g7n45J4fGBSwiH05TB9PbLHD3YcfxR
+NorFiq/RVXMXkgOGv+2ovJ/A6GK5mS/r1xr4qKnnO44zqwaie/xdZpXuQfQ8ZS7H
+XLVWgbdGP7fbTW72mAG5UzUr6c6gwPo8g6aiOaOnRU32SswhLp4CFgiKFhhgZ4YW
+tLmWc1Lz92D8ctTMvXhV+z8NEPF+livmfANpyhXl6ErCr8jEnhGgj4r7BA19dUXC
+Tttq+Gpo05tMXqom8/6PbQ3Cg2iCT8RGk6v0p2ne3Dg1LlbnklEfV8/DbYO5tUD/
++BXZhF1otr/ZaSdz/jJ+GzmD9KvhheQHBikj1/KicYp1KHYfo9oZJT5ulBO1UX/w
+JbpLaarntLOqb5im6OdjkPFkklVV9m6EByrfd35BTEfowNaasEvrj/VpchGPo7yf
+eFB6HGeIFHNloG7xXn9rv4npJLJOleqmBgyb4cQAk2KwjEJ38LHOyXQL/+tfI5DK
+NKzoFH33dtHnP2ZwaAE5ffMYv284y06n09yOFqPi8YkeFs+UiFeV4Kcht1gUNkPo
+IOLhwfVxoc9H5CbIBC3emckvbpnuBT9+EefGU3pU9e9et60mQ8sp28vtx16rN/e9
+CiXhRXcLyQZxucmoLKXnyXgJbf3+nXcr4zMkNurqUisc+YVMALePkJCCsqRWPCvo
+vDqwMl8rkG3jAqmMJbtZCx7+vvnRnFQSE4BXOlzEQNPZK+EdlfvY5uvksIt93FF+
+E6CIPHW4ki/X6gTIR6piDKiNEle+2e/fJpYqk/pFuVfmiN50QXzrnLrPCznhzQ9V
+GN2j9/b8iKzBk5y4wMNkOS8LT2qdcJoJRzZBb4VV981GwFxhAagwM29wko4sdNG/
+vU4hrrm8WAfmp6d3/UdG6VdQj0O57z7BX6Vr91OBNw5RZKRkQvMu3Q5vCH7ZfYEj
++YM=
+-----END ENCRYPTED PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/pkcs8test.pem b/crypto/test/data/openssl/pkcs8test.pem
new file mode 100644
index 000000000..17606931b
--- /dev/null
+++ b/crypto/test/data/openssl/pkcs8test.pem
@@ -0,0 +1,175 @@
+-----BEGIN PRIVATE KEY-----
+MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQDBvYyk4LsBVS3S
+34GZc8uuddHq7cUJx1lZaxWK7C6nnTNKJmJEhxW80VIukpo2RODL1hPFlgCJY3ch
+/4437UoG8ZNAE1BfuVMIkS1AX/l/KAyqUIX/bsXgvZch0Joo92KaPfDB7QA8VCGd
+NCcRaOnusDdsFDdF4/Mrd7/x+Ipkd56FXVEk14QGizFc86aNJrzXjy9ent34PTcS
+uGPXUX7pbiZj8gK9f77pDuH+JymqXdfBKz/x0T54i8N4QFfVp2LbGzeRnduaX4Ff
+79ikdo/XQYTPOYoDwgdiAR+n0+mvDNkI5rbukSLcz+xbWdkJ1ReHW/QQAiqQWK37
+4D1fFNrZAgMBAAECggEAGbH+GVAE/WRCs5kZIzUMapMNyE7It0dNPmLJdKdmeKyM
+xOTaW6Re6bAJakvfUBtKhT5bWPVQFOiwQD4Yqqo6Czm3AeSN4GQ/8v7uNX+FI6w4
+Ic6UNxCGBgyfIsj76TsGRNa6O74nLdkqrCLim5iCjjmo4Bi+S/Kzqaw0NO91y2Um
+9XyCzM7Oh4LukmF94pd5gZBQjjVEkEsw3+oQlOznm3rCNIhYSjfStnFZT5stvcIw
+BscQg386Wo+UvXV8zDI0qrAi0pNepVGsdpGGGUIHkogaF9HHElcSIAVBOQLhxvf5
+S27j3bvHBzWmmR/MgOsBH5+ZqQCTzVGJdzIzXkCRUQKBgQDkQIQNsRv0V44UriNr
+nageBkbjVFxczl5k2qN193qb0GalSOoeKcT9jsBO32mcaBd84vuueSNS69rGlj8+
+7rKyMsRAnjhbMJ0FCWv2muQjxZWEcTWV38wgXkbzos4fon19wQo3JPg0ikOjmGbK
+Z4EIJE0PIw6hjGrTXqc9wK4kgwKBgQDZSv2KVaTX80ZyLIOlbs5+CTAzlEde8+u+
+7LcFOvrrzeo86i6+65yvu395Dlm6PAhz0KocaUECeEDakdQHEDfvEf29BsU+p7fU
+kfNPotacAD7kNo2WenzH0mIhtBWchSUz1P3cIbq4Rxm4XPlAzMEXcDtFRqf+4wVV
+d8Thcjl8cwKBgQCKVGczfRC6Bo3/DoI86DFI8PjpMOlA/XjLmo3SIofWAnkS1pu8
+aAgQuwDlTBTPS25gq5doZ9X2nSXbkJcH5tW5lXbGypzQ9ydSNCGQNNLqswYoXAvj
+ptwpCbnqUdKl7W4sVl+AiBE8lkbj0KsLI6tZadahw9dMJLNhIk4s6KchTQKBgB4f
+PCh6GODq04AuVY2QX8WvBmSQEJjEHZEZBYIPHAumPut010gWJ2FhD5m7eIrNmapc
+aciIer+Z5fumrYrRH7/fcZpLnvpBi8VG+kC25SM5EX7XZSdQEY4txva/HSPWfULD
+KvHiJx02lgUttkvaVoYmQ8Elu1IlLG8drEhIalmrAoGAKLjcIIAcAhuE0QkstS/z
+ZiFhp7tCCrH5sVvXPJfxuKtEC3iTfgOoMywaX3SQGkOP5kVngziGemv1b493Vmek
+T8JLbnNbkooCvPsbMlMgcqZcb/5ckymabMaJBTqhYP4w/uRETNyjmb0uxX2CqXk0
+RoIdgWsw0IiLCNMn16z5O5w=
+-----END PRIVATE KEY-----
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----
+-----BEGIN ENCRYPTED PRIVATE KEY-----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+-----END ENCRYPTED PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes128_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes128_cbc.pem
new file mode 100644
index 000000000..e31505333
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes128_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-128-CBC,8DA91D5A71988E3D4431D9C2C009F249
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes128_cfb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes128_cfb.pem
new file mode 100644
index 000000000..8bd32ace1
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes128_cfb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-128-CFB,2F7AF90B0C0A420FFD62214EBEFC4CD5
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes128_ecb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes128_ecb.pem
new file mode 100644
index 000000000..b6def0873
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes128_ecb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-128-ECB,3E3ACDA483AAD613760CC55C7DBFE582
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes128_ofb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes128_ofb.pem
new file mode 100644
index 000000000..2986eb219
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes128_ofb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-128-OFB,271025C313E6EFC0403320C73382F15B
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes192_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes192_cbc.pem
new file mode 100644
index 000000000..b80686d8a
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes192_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-192-CBC,51C73DF9487965B976234C88321E3F30
+
+6yLkX7C2XTX5AE6KqWsB2Lmt+TMGsoHIH5BDl+o7Yjx7aBSzB9X9KPTsVoPmTCOg
++yhhV6am/yBImCdyuY8d9Q0A1kPIJTEkshgk5vc2KpW08blLCHSCjokEVbQ4TJDH
+bMtrEBVMU1g9KBTMuBpbu6MLVaFth2GTsqExX2gu7FB5EAKvEGhkmLudo1jKkgvR
+aiiyMd2CH2MTdatZtw5PrJmkhV/6RMZRKP8r9wkez8NN14ehmk5QDY2s/hj5uaEf
+xK0GXY6OcwoRo85PsOYhmOeFDqHKGRo9a0pPBy5ZaV4udj0QZekE1fziOxiPf6K8
+0BL50UUzQBW+3n0dIZbzlOiJQScQkjoxi0kc088FHXHf74VBoJUo6pckAu4OwpXW
+L4XLIGAr2Kv4OMiFSJOcaihyawE312B2URcAzVCO7skhTYHaC0fMYDJCGTc2D9rR
++V5tVfT1dG4xdB+p/b9TQyAu8PE10jT+tVNJqGsZRI8I3iOtyWsBcn4sQInpYFYU
+R/v2tgG4hDdq1beEY5N/ZaLsoSyFYZmwbzB+BVhPg0W/9s91/nYAQgOL6XrExQjF
+lZxS28ujAq1LDNzg0NDA2KsDGJF2TuST2stnxyvf23h8+KV2nZLOZXjhlVl/Nr5O
+WPm3gCmuPf8F6FPqM+zI4YBBRtvLRkXafUNuvc7PYVNiaPyuMh7I7U1EUUzTpkqi
+OI/YD4xv6DpDand/WEtLHaYfVYU6PAapLV0T28BoFITp/qxHYYnXVfhn4htSgiwW
+R1btcxWyNjsIedjb1LJ2EwEfuXqZmzDz51uDLBq3XQ/dbvDkDzfZR3O1KGaACxAT
+tAeAdnTnAVliWYQiJ7BHn4LTJZ0ERGL/R1xpQs4quki4WHtEBRRzP6BbmUYYhigO
+QwvTK9darP1Ev7miF5BkRnrzWqCQHNTlDB3i/RzIfIDChQbSZtrpZH/V/quPuPlO
+1353Q6D221UiChhw0+8GmIszbLwBkDq+Zr7/poUBAqHmTaA3LeiahACM55ATbg1+
+FKf0nvUL0SaEBAqFxSdQ1mnW83VCMlCE7Luh49BDl4/nufCdF+iv3cYRW2SDHPrU
+HELYYLz+b4QLl+XO2SgUYEkU9s1Z+eCKcVUXGzz6vZUsA8UwvYIy8b/1cz4Y5sZ4
+MLpEXnQRMwAjArh4fvmosAG+diC18H2asLWpUS5HBBrSb8lAqKPLl+n72SlZkFjE
+WP+qq3koz3EyJsjwH2qbpx5BLhTPcEVHl3DZ1eOQmCXcpSm/cqKp2MKQFubCC4rr
+nphTD8uYKCP3mJXB8vqIIO9ho7+GVlCHJdZGu+3bw1L89O6ZG6WClbY56eGz2xUn
+DBmikb9sppeYSs0eX+yQ9kjQRf/BGnRab2dSTGtDT7jp6cL+zWUUOawLHWS72XtN
+3XYSEvvAWPygwbBuAuw17pwPPmTXduRiJosR1lRk28FGsMwzbj4byXm77IO3vD80
+cyrAQ/bmSpvlmYEHvmRn9N7QT7SFANY4a03aBK2iuqZQUz/zeo3eyrJudBXIiwUz
+/ZRteBa6SQagqDsmfeuGCjgTFGVnutCokh9lajm9BZ1pZtCmHEDd7yz4Odx5CmxG
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes192_cfb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes192_cfb.pem
new file mode 100644
index 000000000..00cbae570
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes192_cfb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-192-CFB,58F8574921C585278A50F7A2EA529595
+
+RQtPMTKDNttPq1R+DiwHrEK33FOfxK1Cst5x1jrDhXe5MObLhqbz4Ft2idjtG/vC
+pemznnZqQYKsuJl/Th6Ydsthkg7HH1pYLRstc/tWQTESa0RseHDtdw3e/Wxhm6DH
+pSqymOfRq8R7PQKPxboj9fjxeooWlA+RQxGdyRJ6gki6PljOD29C2hxZV4HuL2II
+tUn/cdzaGu6bCvpFDvDuFja3TRtIrHSbCq01uZg6XrFui7BuwJxxR5lERsauJ6RX
++lAvhwXqN4nsEQefvZc/GeTFzklsoJ+c3HJy7pN15nyfwNzmmH5EK7C4CdBJQymv
+MRwe9hY/LGXB5IFEgXvop9bh2qYk9tb/zb8aAHcLS9rwFsGOo+5+Yib3ds4GC5fx
+ILKH234g+hkhutao530kmWXFf7qup8lvTlBZueAWcIFdmBCsWjm8ejxQUZaPCqEY
+sZ1UMDw1HPX7/4TXdVNZWrxHisv0VWnhwJNflEcI/k/GR0/qUgkHnUPycWTtg0W2
+7ivs7D0EkIJy2OyFj5swWs+eqhsSDmd0BgGL0VduLB0voi1eU908Af3PllsTwf4D
+UaLFvOkllIbul+YweImT9TinmkWIFMZuNDR/PHjpbLN/39YkvSub6oS4LOgKEu1Y
+Xr779QOZHMcIP+PXoaxqOWls9hgI6M3PAH+gAjwF77OWIQIh8JZCibR6HWYcr/qo
+iFTzJGNN7P06s3IOek+YoHG1c0GoPsNungPOzthNnaAUcRyvZ1Yg8cy/nhrA8Eeo
+A4G/I241jr/Ex5jooykpeotV1/AMIF7qxFeTARQgObRi/fiR0r9rjaSMbOt4PlRv
+Ln0ZBqedtkkRBPRGO0VViSbUAUOq0oSb98FWqPFpcFl8tXRyqe9m/W2zACczZplz
+OySvRuASdKYpGk4DmMlQtS8wjzMYTesBx68OiZfw9W2nkH+Xapc4cH8hyb3+aXXb
+b53nbp59+mx4UwPOcrdzVHdKhDT3BjYrJTv9kHAY8yA4Nr08ZsO5tOeI7vF+bUKx
+kWu4AIEccB030iu87/xHXUEOBzsV6HzzT1TrZ5GKSh43vhRwoasYON2xlO6RuKCD
+Yv6GbcPd4lv2mv4lAaDXk5IThABHUL8yhqfwru4L43av5AwdslRKIvBM7UWrlXFe
+A/Hipy6jjcusGiOyH7WfWBFV2/f6NtX6lGuna03F/yMZcHI/HEK5RyhqOYOmcxfw
+A1eGKSqOnq9IJ6vXnF8PuRYKB9i8Ha0z5JmWkh/dX5dhTzwH6wOz4+bLgkgXBdhY
+jptSs5zsvrxGiLCbENPTjArsBbT5NISh+VTrrUtmA5BLPWx6d4NNJ5eBXTnpOIJr
+rxA0halZtFYKj0mp1ZgnVylHC45QDiwzDnhXra83RVrcgQjcX4npjKOaYZRQ5cKR
+2F1QdvoLvE9YqhjH0QFQWMWfvmLHGIDIDkSB6EyFsgzWdv6kIaiYsmdir5FzE8c5
+SvHvu28j1X4OL62AquOFKMXQVns1/jLp0KERx1EhrQChHUxpA/cbqNJbhjHoRQK6
+0zXWP9gNlyrSIKY4egyQmjcTDvNXVcSDu2o7EfnprNCYirFgsAbw5A==
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes192_ecb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes192_ecb.pem
new file mode 100644
index 000000000..106704e94
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes192_ecb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-192-ECB,A3A4C4B92548B906A635B84B3D67591E
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes192_ofb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes192_ofb.pem
new file mode 100644
index 000000000..88dd91a78
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes192_ofb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-192-OFB,9797077D8AC3052C37DE4D719CA8FC00
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes256_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes256_cbc.pem
new file mode 100644
index 000000000..7b032036d
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes256_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-256-CBC,1876F5A50C9046D504D47B2BF8951875
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes256_cfb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes256_cfb.pem
new file mode 100644
index 000000000..a616b68fd
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes256_cfb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-256-CFB,37639E4753C0E4CD43EEDEEA18AA66D7
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes256_ecb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes256_ecb.pem
new file mode 100644
index 000000000..f679d6dcd
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes256_ecb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-256-ECB,C5DF56EE3F83A1F8C1AC805EA73D4D24
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_aes256_ofb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_aes256_ofb.pem
new file mode 100644
index 000000000..34ed53b55
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_aes256_ofb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: AES-256-OFB,E6AB8D4FECB44185E26505049A97B0D6
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_cbc.pem
new file mode 100644
index 000000000..e3f6e2443
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: BF-CBC,E59962EBB3DD3C74
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_cfb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_cfb.pem
new file mode 100644
index 000000000..b3581daaf
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_cfb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: BF-CFB,A6C793D28C38F56A
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_ecb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_ecb.pem
new file mode 100644
index 000000000..bc3353eca
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_ecb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: BF-ECB,1E15270A7DD42BA2
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_ofb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_ofb.pem
new file mode 100644
index 000000000..acbd8da99
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_blowfish_ofb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: BF-OFB,B9F95E282FEAA06D
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des1_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des1_cbc.pem
new file mode 100644
index 000000000..2d2233e45
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des1_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-CBC,4629ADA1FF55BE00
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des1_cfb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des1_cfb.pem
new file mode 100644
index 000000000..814ff8946
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des1_cfb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-CFB,07BD7DC7BB2EAC98
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des1_ecb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des1_ecb.pem
new file mode 100644
index 000000000..91a3f4900
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des1_ecb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-ECB,451BC59702897B57
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des1_ofb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des1_ofb.pem
new file mode 100644
index 000000000..93766e7b8
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des1_ofb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-OFB,62D0879F9BE636D0
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des2_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des2_cbc.pem
new file mode 100644
index 000000000..9dbe30d5c
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des2_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE-CBC,A48C2683D96452DF
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des2_cfb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des2_cfb.pem
new file mode 100644
index 000000000..451670c08
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des2_cfb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE-CFB,36E0C8A965F07E25
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des2_ecb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des2_ecb.pem
new file mode 100644
index 000000000..c3f285f0f
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des2_ecb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE,8B0E5396F9D19442
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des2_ofb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des2_ofb.pem
new file mode 100644
index 000000000..c34872d3a
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des2_ofb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE-OFB,0A4E382F6060AA1B
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des3_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des3_cbc.pem
new file mode 100644
index 000000000..6a632f23f
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des3_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-CBC,6D7B3D8B829964B1
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des3_cfb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des3_cfb.pem
new file mode 100644
index 000000000..129e02eef
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des3_cfb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-CFB,B99E3DD88C3A9D7B
+
+4Dsk+pNUGsgEqelOveMyrkoDb+khouKf83Yt4/qxX8CHs5q6i70NLViQWwqvIqQP
+g3h8Gs8cYKZfkEAFKP6BRFPy8EttnBCzhAdvLKrKFCZoDmhxC5ia+FxPLtNaDEb5
+6bgSoZ07KUMvfMZdnG5Kogex4DedqENVHBi2Rl3Dck1pAgxwzMntgHsluT4ht3id
+SgyUT/xAaMSwIklsjclR998N6V8Nilu8TDDf5X12RHOq/MSqGZ7yJC3Wb/dsirNs
+7jsEQwg9tIg5B/5hxjN12E4Ov7orIuO/WHNVtLznx1w1t/umPjLFn100Kln8GvfN
+jiGSB5TUz4t8r3deN7oDrGjoyr5OMnKWSsIwKcMsNSh9aTdkjIJBUUhIB2PStdX7
+WbeNXicNMQeteIrY+ZDDPpMbjsH1Kqcz5y9OWnvaXso5lSHLBp1IamCv/XbQcAPR
+zbnbN8DCOYAMcUiwcRAt0U+BNc1edX8VmCB0d4RQq5BTFbjGKqzo6yFVUOVLhiFg
+E8G3v8sTqUhJyH4Dmjn0oDMtfdplk30Ywg2wZAahnI9w+cZFvzqXshL3mGdu+rbb
+h7PkiJE5vS6/4VKA7pngsVanCRQa3btL43ekShth+DXwsziQixGD9HhTb2iYeF+u
+9niDPI5gzi9IfxIpb3QjR1xDJYAzKDDBA4gHhbEBSObByMsVzjS0+dwP9N6DV60v
+3x7RfO094FXxlVWSh2SMvz/sB9fsD9dCp/gadqHxhk2aJf7lfSU1C7EmM9hxGZku
+vR3J1QcSu2FMrvHyRzFZGKozSHq3QunOLno/KmY0ja1754NEkntGvPuB7LhGBNB6
+14NvQsl7qFw5wJxmEdY5rhVdz4PxLfjnMyvCiWlku83QIC51I5DbhRP7eG9rJSMw
+b7KFSQwmp2yzDeX+Ipd0JAgd14GvtmICKJVushO352O7mVnx3Jy1ZtJsonhzySz6
+1fGIvJI8jxZOdO7q1OD0bfrXS/kwdXnxoxn4pkjw3ZN3hdFTfAerVQ+qYJ7zIez5
+0lUihHNw1C/KRsggraOl9rTUNppcNtMYwKXCJOGXI2UEn8p3JIxEHLwXyOjTDfg/
+5oK2nPAmBdGsLb5ivJLPivmaqDXf7fdn0XBQQmtYUQRotlGmfpztujt/b2pL5YSE
+Uqginw65zyedjL6Aff3crvP8/CUR0JARx9vF12R+v2iAnDqVk/yqYpRqOp5elm1t
+yGB/PtpoRFsNU1hDnPZDu7kZV9oSeXaBDFOnHmX09qE2r869Aye1xOVmxiG5tm/u
+KGA+zlJVVpQSwnPc/qk17S0dvNAlgt6MH+vYlhKw8zk1nDCuavUK3hTFT+9w31cQ
+yjPdV4/K8seK4zIqpH4LZrC306/1/7BT5JXL6ZChATHaI68xwEY2GsEl/Ze0JrQv
+WpWSN/I269rUfaBDE6eFaiSDzq1xY+qyApHSTNPSPDHbFeCXz+puqv9lw0bJFnRJ
+nLsK2fUAKNvyCF18IydyhiGz42LYbwwjlEWuVsfWtgvftDebZRIfQFlj7DJwXfZU
+zcEOI5YyuQs+wFK/8b/bknF4xRpaXwt9Il7tcV07h96TDJV05illig==
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des3_ecb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des3_ecb.pem
new file mode 100644
index 000000000..bcdc5d3f6
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des3_ecb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3,9675E5342C359F94
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_des3_ofb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_des3_ofb.pem
new file mode 100644
index 000000000..dad36ead7
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_des3_ofb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-OFB,C8F1482CB09D61BF
+
+0GfYpcSxvnnRri3s5PutcESsHTuupx6UcprKRS+B1neyPR7Ga0Z3mZ2/X0trJVpM
+cxJW4g/cU4TknCZLjIJlClYQenpPRH69yw6BTi6/pgUhKeGmQK9Oob6G1RMjS9lO
+MTb8DKz8P9GmDR4/3SvJwPU0aEM1EAmwGJV2beB2QWRhaPkAZBzeijYf+uYn0mgm
+hZwjU8tdwnNnCdUXdaHeRkeqFcL6OjJHV+U5SZaMbaky1U9lyIJL+GUQZkRfZzJD
+41Qt6yVtetTgzljtCtd4ix+RX6EYsWfZ3OVtwHGYpg28IdfJ3LVE//O9EkLZoBeg
+DyU9c0gDnQ8Dxl9VHGFwQvgdSEyJLvWDv+6RXvCX4Kb2Spy847yxqcfqDpjUhzgv
+C7FoBwswS0pkQzGXKgdM+WlBe9/GYOrzW08IYwrX88aihf50jXi472th6ILIkFHD
+6m419YsrmOeEMXGW/VIKxk8H8MGHwdvK82xewu8Ftgfx0WihfA70EyI28VLMQTAE
+MMHxxCWtdWWnmd1xiHQSX6vedPLXQKKt2AYxYmHQYfqNFMcvDc5uM5uM+mNkX0qt
+VL5PeYRYtdDtT5Xj4/acZD7X7DhqcOwvNll3J7PRdadNXKfjHR7iRP62YkIiESE5
+sCHhYXmtQqK2JUJr8a9M1QPhmAIF3FYr8wSFu/eWw8ooBaTxVoGCw70lT8LNHVql
+TYdW9sOnvUjz36oz6H+z55CNldor0tS/Bu5jNPOZ8F6j5r4xpTWi3d/UWLW7uBbw
+VTAG25EiFvQBXpJFqgRCBdD1Gcfoc+ZefLXQ1l0RJpRf1jJMkfSWvUWDRNm87PSs
+qTeDBzuLNx4A1wYcJ1H+R7ds5QK4moNlvv0hJrsqbOESpLv/XPcYrFgzms0b+Q1d
+uJEWjz38AgIJQxBxmoglzDSRx9OBh9D8HQ+aJLSVcz0dBmEOEtPjZn2AmxxccwCc
+NkMnAxXyNPEJhecTp2/lOOupQqMYTGe8aoiee3m01QPzfgL6m5p6IJdKzOKi0TGJ
+xNW6fD486B7i8d+VOnst6vnd4xiQ03gNNA654mrXIM881X5elqmoFWyup+Ct9lw5
+lxllAJGh7w+hf8P6mIsezOkZGieGhzrFnuLVM2srRDEId+shTV/0lZi4LhfDYroN
+VAbZ6bySn9fmP4Pn42zu4XjoZJffF74u8gFPo8oSFYg88tzjbPN9KAPInNxD6lBA
+cwp3vc1n71CEepmfeZFR6pm1wKRSupkOZNL/PV9rqsyP1pmPE3AEU7WYjNbf2ah0
+GE9f6dtLWcDP/3SssoSnZGy5SdqcNPymG9vOR+QD12YNxn7yA87HM3+swparlSYy
+Mhg1BuDXb5Q5XFVFdajFwAnXJblAIbuJAeHQ/mNCAnR3HNv/Qic2GF7X757MA+dP
+z86gFzJJtb7dtZ0WDQzzEVHgnfVHP5buXnHdepFLsETw9fp4ZjqPfHjLXIOvp9/9
+G9pmSzB1JL8kK8sexWgsMRnl2j2hUDYiVJ/LQjMzk2YLF5I0D5msNTAJvb/gFBdv
+ynVKUpIoJEfRaY7pxR3tufbzADNiqa8OUCGxZ8jo26j7XWDkunfGAw==
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_cbc.pem
new file mode 100644
index 000000000..176334059
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-CBC,C9CEE2FFE7D795D6
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_cfb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_cfb.pem
new file mode 100644
index 000000000..4284fff63
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_cfb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-CFB,AEA62B1564D645C9
+
+NX4iex15O1Dwp6ADN+uFIycPB1ELvBDVRGh+OZnisNU9h+8dPO1cb3j2tkwLFK4i
+Pml4zz797d4I4GqdF2Y23dz2AoBrl2Lj0N0W01AlOGagh92pZ9dKjjU+S5N85OBw
+buDbADh16fSPW6Y88guWFXYBlGJ6HZFK/9D4CZmEfI2Pt9AwEIZ/JvWrs/zW5eGP
+YMFsLslsNu9TOIKF8iDnfcWM9MFpgwcFCIqTwyQ/+dka0hw33WsBREhFcNleLxhW
+NKBIMC6jNjpW916IClH5sBu7T8ps/7JVw4DUfpl8NAOaqJSicPGpZrGIZ9N9cfLp
+KD1XEy+yWc9ahV0mfiyOuzNnP2x9IEBdrk5uqJwIT9RuiFZixIH9MRuqAtrA5BIP
+dc2kw50AbXRghE0JdUEFfUm9zcRKdG366SgADnteNk/77gqI0OZJDD0XL9R/N3Tn
+uh3EI9joJciWDbEX0/751MfcLaa/EkI7quKMEyFGWvox9sKLLEKRUV6SfO/YX8ZM
+RV7ebJdW+Mxya/beG3Yb9TAYkrG2TT2+uhRqZlZllJQFnX7k5MxyfN5I+WJP7SEs
+Uy5PAkNv3h7DTV7dBFMy/gPYAooY4JzBnbq33af+w/VbhyhVid/hn9UAONahw7H/
+1Ao24IlYMza2fJ9yOn+ejLhjvwYIP5992cmElneqMdBfV+oaQTHtWUuVF6g4gJBw
+9QucqxH4JbYccwA1UiKIqkmOlePm5I57RbBw1OG/Un3SiPcAwiAW/UpI5yv8kNwq
+kZeWnD79kMBEW2pU1CTvf5f8aBmcgQykC0M8H25Jj2kVvj0EsRGx1LuQx3ZCSM9y
+sZejgZouYA1WuZaIsz+3t4fgYFiOHDxmSvPt6VtZAMJGmLB/Xa/PVI4rsyNv99wB
+UinlINhzeGKpYYHnUgN0PrRQl0LBR0TdrJ0eG1djEvflXsuAQVP7+gP+oCckkT2c
+pIVm2IzplT2wzsza6+o1SA5BF7RKI3A6IxySFEBJTeaiZnYeeJHxE2DJvU1Fe29G
+ML/lM02waLJNbIs0Vk/i+hyE1wtMwZetptG+En5TDzTkWlVSLSqW6LXVJ53J2E+q
+wypuz4akL8CaYRm4XTmIH3Tom3qSf7rdbL9gk8llZacFNqAl7x1C9zDUzKU0DAOg
+qPKAtD1s7Rtg+4p+5cIEAWD0TKX6DlXKC/EdYO1w0vmavGSvQrr+KENE4+/gIRst
+qlTCiEW2U+PPyOgpZAFF0g5y5Xw0Fea/0HwBBLfCiPKRmDHQIzWIEW7RkkNfQlHC
+iCTBoMRFDbwXJEI9XUu2N4RdmlP+84i6fSRWuzZGUACvzEnRJEc6H0FaaN+fX0wM
+Op5O2hcdA0YTGGmTLUAeajiQnqGRobC8jQL/WQRVwOiFU9rgy1K4Cu2T6eBubvVh
+gk/R12LezvD/KwLgQz1+vXa5Vgjp0xhpnLnJVzPqLG0Fmj3V4uRDc1Lvvl4uLJiR
+VFjFYlqxP6w+ToRqnrfbmUCuiq6pS9FQi2Tghd02P5TnZcyS2xF2X7o45gegMplS
+skPzTCON8140xpx6Flep3bHwzEI0CEwO8goVMc6x4a2Ggekjn/Nz2A==
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_ecb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_ecb.pem
new file mode 100644
index 000000000..d9609d749
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_ecb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-ECB,270AFD04879E8434
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_ofb.pem b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_ofb.pem
new file mode 100644
index 000000000..cafccf9ea
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_128_ofb.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-OFB,E5989634C878E65D
+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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_rc2_40_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_40_cbc.pem
new file mode 100644
index 000000000..5a9eecfeb
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_40_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-40-CBC,BA10EF99A1862AB2
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_rc2_64_cbc.pem b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_64_cbc.pem
new file mode 100644
index 000000000..7d0960811
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_rc2_64_cbc.pem
@@ -0,0 +1,30 @@
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: RC2-64-CBC,DA39EAD05DD48A5B
+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-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/rsa/openssl_rsa_unencrypted.pem b/crypto/test/data/openssl/rsa/openssl_rsa_unencrypted.pem
new file mode 100644
index 000000000..f540dccf7
--- /dev/null
+++ b/crypto/test/data/openssl/rsa/openssl_rsa_unencrypted.pem
@@ -0,0 +1,27 @@
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/openssl/test.pem b/crypto/test/data/openssl/test.pem
new file mode 100644
index 000000000..c52453c61
--- /dev/null
+++ b/crypto/test/data/openssl/test.pem
@@ -0,0 +1,133 @@
+-----BEGIN DSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-CBC,079DD7CA8A9BAA19
+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+-----END DSA PRIVATE KEY-----
+-----BEGIN RSA PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-CBC,9AC3CD3B4ED42426
+
+AzAvQsDkxXGdPMlFjqO0lYXSlypkfGJWIMqij00cZI1B6K7pMnBHo3wIYStlKDg2
+SMMTYwJfsbFA8+cyCyzsqVBQC63ZgEnStMrDOt/U0SGXNb/C4mFsf1ksnAI6y/3J
+3lhuPAZbMKCmANslivbj9gp4hSe828btXDhvIPKKJgKHhwHveeW9JDulySAN5KYn
+s4aeasvSWVBOYtefFaS+NzrXjDnPtOMX6TQDxd9CE8es1RQbU9Ze2CEa9S7l4coj
+0abWVTjxu55foDCDzbukkQm+eU0aaI4OoydoOCz6bcOfADgRx3/fJ9Z9IuS5w73O
+BiF8Z4S8e7GYpgsPVEqj06PuNH7t6bwzKC9U2FTiNcejZIYPqz21d9iA4hsEfFDd
+0DlXqYUKMazE+TjU8goss5cEqyLNDQmWLYLKUE2p8QmSZC/UqEsZ9pu1VZz3xpFT
+k2sju26HCV14XPG5oi9LpxDQaVRmXBMFxz5b+RmUwPfZuWntTzHQXuNyH2J3B9FN
+el8gaskt4hxHI28hB/eF0h7pOIBUDiR9n/BB+feOrNW8y7/ThSkdI3OK0+dyOzLg
+go9s7SGz5WLyy8FWevw0k2Is4IpCueTwclDrOAPixW+paHhDGIasnvvCsz5jGqQz
+4F4JPmA2ZYg/Z8dYob/ZeF/3KuJqFZAm9gseGS19sT7UzVvvmSf5IXOFfpb7VdRn
+ScFMRVr8PY9ANGh7zYg/8w+G3JJj4C7djA3RB/yOhK4KwbTz/2cnEDI26VREjKs0
+7/WPQXxr/oQ+XEBTnYuJZfa7o7orGL+6wA0Vk/GJqjA=
+-----END RSA PRIVATE KEY-----
+-----BEGIN CERTIFICATE REQUEST-----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+-----END CERTIFICATE REQUEST-----
+-----BEGIN NEW CERTIFICATE REQUEST-----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+-----END NEW CERTIFICATE REQUEST-----
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN X509 CERTIFICATE-----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+-----END X509 CERTIFICATE-----
+-----BEGIN ATTRIBUTE CERTIFICATE-----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+-----END ATTRIBUTE CERTIFICATE-----
+-----BEGIN X509 CRL-----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+-----END X509 CRL-----
+-----BEGIN EC PRIVATE KEY-----
+Proc-Type: 4,ENCRYPTED
+DEK-Info: DES-EDE3-CBC,ADBCD679C6C6363E
+
+MmYmhTgKNKwwnA4AIskePMy+gp3Ch7Pn/UqRGjQypIyibbp/UFY+aSbQmvQNG2R9
+6Zj6cbBJGt/C2EYXk9UonUTA9Q+FVytkpR8ON6NHlSc2twrvDpqi7lpeSB9ywlH7
+WLffwNZMNsNHfcNK2slHf4RCmpqcGsXffHe45dQG0CI=
+-----END EC PRIVATE KEY-----
diff --git a/crypto/test/data/rfc4134/3.1.bin b/crypto/test/data/rfc4134/3.1.bin
new file mode 100644
index 000000000..c4e92dd7c
--- /dev/null
+++ b/crypto/test/data/rfc4134/3.1.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/3.2.bin b/crypto/test/data/rfc4134/3.2.bin
new file mode 100644
index 000000000..9c82edf72
--- /dev/null
+++ b/crypto/test/data/rfc4134/3.2.bin
@@ -0,0 +1 @@
+0+	*H
This is some sample content.
\ No newline at end of file
diff --git a/crypto/test/data/rfc4134/4.1.bin b/crypto/test/data/rfc4134/4.1.bin
new file mode 100644
index 000000000..d99f79d34
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.1.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.10.bin b/crypto/test/data/rfc4134/4.10.bin
new file mode 100644
index 000000000..d3815bdfa
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.10.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.11.bin b/crypto/test/data/rfc4134/4.11.bin
new file mode 100644
index 000000000..e203651ff
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.11.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.2.bin b/crypto/test/data/rfc4134/4.2.bin
new file mode 100644
index 000000000..c1b602413
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.2.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.3.bin b/crypto/test/data/rfc4134/4.3.bin
new file mode 100644
index 000000000..1bc6b1549
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.3.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.4.bin b/crypto/test/data/rfc4134/4.4.bin
new file mode 100644
index 000000000..3245c115d
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.4.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.5.bin b/crypto/test/data/rfc4134/4.5.bin
new file mode 100644
index 000000000..6608d9b13
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.5.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.6.bin b/crypto/test/data/rfc4134/4.6.bin
new file mode 100644
index 000000000..1a7eb9591
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.6.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.7.bin b/crypto/test/data/rfc4134/4.7.bin
new file mode 100644
index 000000000..ea6b1df67
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.7.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/4.8.eml b/crypto/test/data/rfc4134/4.8.eml
new file mode 100644
index 000000000..206ebf023
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.8.eml
@@ -0,0 +1,39 @@
+MIME-Version: 1.0
+To: User2@examples.com
+From: aliceDss@examples.com
+Subject: Example 4.8
+Message-Id: <020906002550300.249@examples.com>
+Date: Fri, 06 Sep 2002 00:25:21 -0300 
+Content-Type: multipart/signed;
+    micalg=SHA1;
+    boundary="----=_NextBoundry____Fri,_06_Sep_2002_00:25:21";
+    protocol="application/pkcs7-signature"
+
+This is a multi-part message in MIME format.
+
+------=_NextBoundry____Fri,_06_Sep_2002_00:25:21
+
+This is some sample content.
+------=_NextBoundry____Fri,_06_Sep_2002_00:25:21
+Content-Type: application/pkcs7-signature; name=smime.p7s
+Content-Transfer-Encoding: base64
+Content-Disposition: attachment; filename=smime.p7s
+
+MIIDdwYJKoZIhvcNAQcCoIIDaDCCA2QCAQExCTAHBgUrDgMCGjALBgkqhkiG9w0BBwGgggLgMIIC
+3DCCApugAwIBAgICAMgwCQYHKoZIzjgEAzASMRAwDgYDVQQDEwdDYXJsRFNTMB4XDTk5MDgxNzAx
+MTA0OVoXDTM5MTIzMTIzNTk1OVowEzERMA8GA1UEAxMIQWxpY2VEU1MwggG2MIIBKwYHKoZIzjgE
+ATCCAR4CgYEAgY3N7YPqCp45PsJIKKPkR5PdDteoDuxTxauECE//lOFzSH4M1vNESNH+n6+koYkv
+4dkwyDbeP5u/t0zcX2mK5HXQNwyRCJWb3qde+fz0ny/dQ6iLVPE/sAcIR01diMPDtbPjVQh11Tl2
+EMR4vf+dsISXN/LkURu15AmWXPN+W9sCFQDiR6YaRWa4E8baj7g3IStii/eTzQKBgCY40BSJMqo5
++z5t2UtZakx2IzkEAjVc8ssaMMMeUF3dm1nizaoFPVjAe6I2uG4Hr32KQiWn9HXPSgheSz6Q+G3q
+nMkhijt2FOnOLl2jB80jhbgvMAF8bUmJEYk2RL34yJVKU1a14vlz7BphNh8Rf8K97dFQ/5h0wtGB
+SmA5ujY5A4GEAAKBgFzjuVp1FJYLqXrd4z+p7Kxe3L23ExE0phaJKBEj2TSGZ3V1ExI9Q1tv5VG/
++onyohs+JH09B41bY8i7RaWgSuOF1s4GgD/oI34a8iSrUxq4Jw0e7wi/ZhSAXGKsZfoVi/G7NNTS
+ljf2YUeyxDKE8H5BQP1Gp2NOM/Kl4vTyg+W4o4GBMH8wDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8E
+BAMCBsAwHwYDVR0jBBgwFoAUcEQ+gi5vh95K03XjPSC8QyuT8R8wHQYDVR0OBBYEFL5sobPjwfft
+Q3CkzhMB4v3jl/7NMB8GA1UdEQQYMBaBFEFsaWNlRFNTQGV4YW1wbGUuY29tMAkGByqGSM44BAMD
+MAAwLQIUVQykGR9CK4lxIjONg2q1PWdrv0UCFQCfYVNSVAtcst3a53Yd4hBSW0NevTFjMGECAQEw
+GDASMRAwDgYDVQQDEwdDYXJsRFNTAgIAyDAHBgUrDgMCGjAJBgcqhkjOOAQDBC4wLAIUM/mGf6gk
+gp9Z0XtRdGimJeB/BxUCFGFFJqwYRt1WYcIOQoGiaowqGzVI
+
+------=_NextBoundry____Fri,_06_Sep_2002_00:25:21--
diff --git a/crypto/test/data/rfc4134/4.9.eml b/crypto/test/data/rfc4134/4.9.eml
new file mode 100644
index 000000000..543157589
--- /dev/null
+++ b/crypto/test/data/rfc4134/4.9.eml
@@ -0,0 +1,28 @@
+MIME-Version: 1.0
+To: User2@examples.com
+From: aliceDss@examples.com
+Subject: Example 4.9
+Message-Id: <021031164540300.304@examples.com>
+Date: Thu, 31 Oct 2002 16:45:14 -0300 
+Content-Type: application/pkcs7-mime; smime-type=signed-data;
+    name=smime.p7m
+Content-Transfer-Encoding: base64
+Content-Disposition: attachment; filename=smime.p7m
+
+MIIDmQYJKoZIhvcNAQcCoIIDijCCA4YCAQExCTAHBgUrDgMCGjAtBgkqhkiG9w0BBwGgIAQeDQpU
+aGlzIGlzIHNvbWUgc2FtcGxlIGNvbnRlbnQuoIIC4DCCAtwwggKboAMCAQICAgDIMAkGByqGSM44
+BAMwEjEQMA4GA1UEAxMHQ2FybERTUzAeFw05OTA4MTcwMTEwNDlaFw0zOTEyMzEyMzU5NTlaMBMx
+ETAPBgNVBAMTCEFsaWNlRFNTMIIBtjCCASsGByqGSM44BAEwggEeAoGBAIGNze2D6gqeOT7CSCij
+5EeT3Q7XqA7sU8WrhAhP/5Thc0h+DNbzREjR/p+vpKGJL+HZMMg23j+bv7dM3F9piuR10DcMkQiV
+m96nXvn89J8v3UOoi1TxP7AHCEdNXYjDw7Wz41UIddU5dhDEeL3/nbCElzfy5FEbteQJllzzflvb
+AhUA4kemGkVmuBPG2o+4NyErYov3k80CgYAmONAUiTKqOfs+bdlLWWpMdiM5BAI1XPLLGjDDHlBd
+3ZtZ4s2qBT1YwHuiNrhuB699ikIlp/R1z0oIXks+kPht6pzJIYo7dhTpzi5dowfNI4W4LzABfG1J
+iRGJNkS9+MiVSlNWteL5c+waYTYfEX/Cve3RUP+YdMLRgUpgObo2OQOBhAACgYBc47ladRSWC6l6
+3eM/qeysXty9txMRNKYWiSgRI9k0hmd1dRMSPUNbb+VRv/qJ8qIbPiR9PQeNW2PIu0WloErjhdbO
+BoA/6CN+GvIkq1MauCcNHu8Iv2YUgFxirGX6FYvxuzTU0pY39mFHssQyhPB+QUD9RqdjTjPypeL0
+8oPluKOBgTB/MAwGA1UdEwEB/wQCMAAwDgYDVR0PAQH/BAQDAgbAMB8GA1UdIwQYMBaAFHBEPoIu
+b4feStN14z0gvEMrk/EfMB0GA1UdDgQWBBS+bKGz48H37UNwpM4TAeL945f+zTAfBgNVHREEGDAW
+gRRBbGljZURTU0BleGFtcGxlLmNvbTAJBgcqhkjOOAQDAzAAMC0CFFUMpBkfQiuJcSIzjYNqtT1n
+a79FAhUAn2FTUlQLXLLd2ud2HeIQUltDXr0xYzBhAgEBMBgwEjEQMA4GA1UEAxMHQ2FybERTUwIC
+AMgwBwYFKw4DAhowCQYHKoZIzjgEAwQuMCwCFD1cSW6LIUFzeXle3YI5SKSBer/sAhQmCq7s/CTF
+HOEjgASeUjbMpx5g6A==
diff --git a/crypto/test/data/rfc4134/5.1.bin b/crypto/test/data/rfc4134/5.1.bin
new file mode 100644
index 000000000..9750174a0
--- /dev/null
+++ b/crypto/test/data/rfc4134/5.1.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/5.2.bin b/crypto/test/data/rfc4134/5.2.bin
new file mode 100644
index 000000000..de17b0137
--- /dev/null
+++ b/crypto/test/data/rfc4134/5.2.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/5.3.eml b/crypto/test/data/rfc4134/5.3.eml
new file mode 100644
index 000000000..55013adcf
--- /dev/null
+++ b/crypto/test/data/rfc4134/5.3.eml
@@ -0,0 +1,19 @@
+MIME-Version: 1.0
+Message-Id: <00103112005203.00349@amyemily.ig.com>
+Date: Tue, 31 Oct 2000 12:00:52 -0600 (Central Standard Time)
+From: User1
+To: User2
+Subject: Example 5.3
+Content-Type: application/pkcs7-mime;
+	name=smime.p7m;
+	smime-type=enveloped-data
+Content-Transfer-Encoding: base64
+Content-Disposition: attachment; filename=smime.p7m
+
+MIIBHgYJKoZIhvcNAQcDoIIBDzCCAQsCAQAxgcAwgb0CAQAwJjASMRAwDgYDVQQDEwdDYXJsUlNB
+AhBGNGvHgABWvBHTbi7NXXHQMA0GCSqGSIb3DQEBAQUABIGAC3EN5nGIiJi2lsGPcP2iJ97a4e8k
+bKQz36zg6Z2i0yx6zYC4mZ7mX7FBs3IWg+f6KgCLx3M1eCbWx8+MDFbbpXadCDgO8/nUkUNYeNxJ
+tuzubGgzoyEd8Ch4H/dd9gdzTd+taTEgS0ipdSJuNnkVY4/M652jKKHRLFf02hosdR8wQwYJKoZI
+hvcNAQcBMBQGCCqGSIb3DQMHBAgtaMXpRwZRNYAgDsiSf8Z9P43LrY4OxUk660cu1lXeCSFOSOpO
+J7FuVyU=
+
diff --git a/crypto/test/data/rfc4134/6.0.bin b/crypto/test/data/rfc4134/6.0.bin
new file mode 100644
index 000000000..dfbfaaaed
--- /dev/null
+++ b/crypto/test/data/rfc4134/6.0.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/7.1.bin b/crypto/test/data/rfc4134/7.1.bin
new file mode 100644
index 000000000..9184c5852
--- /dev/null
+++ b/crypto/test/data/rfc4134/7.1.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/7.2.bin b/crypto/test/data/rfc4134/7.2.bin
new file mode 100644
index 000000000..b95b34140
--- /dev/null
+++ b/crypto/test/data/rfc4134/7.2.bin
Binary files differdiff --git a/crypto/test/data/rfc4134/AliceDSSSignByCarlNoInherit.cer b/crypto/test/data/rfc4134/AliceDSSSignByCarlNoInherit.cer
new file mode 100644
index 000000000..7e96210fc
--- /dev/null
+++ b/crypto/test/data/rfc4134/AliceDSSSignByCarlNoInherit.cer
Binary files differdiff --git a/crypto/test/data/rfc4134/AlicePrivDSSSign.pri b/crypto/test/data/rfc4134/AlicePrivDSSSign.pri
new file mode 100644
index 000000000..e123ee72d
--- /dev/null
+++ b/crypto/test/data/rfc4134/AlicePrivDSSSign.pri
Binary files differdiff --git a/crypto/test/data/rfc4134/AlicePrivRSASign.pri b/crypto/test/data/rfc4134/AlicePrivRSASign.pri
new file mode 100644
index 000000000..c885108e7
--- /dev/null
+++ b/crypto/test/data/rfc4134/AlicePrivRSASign.pri
Binary files differdiff --git a/crypto/test/data/rfc4134/AliceRSASignByCarl.cer b/crypto/test/data/rfc4134/AliceRSASignByCarl.cer
new file mode 100644
index 000000000..848ba8726
--- /dev/null
+++ b/crypto/test/data/rfc4134/AliceRSASignByCarl.cer
Binary files differdiff --git a/crypto/test/data/rfc4134/BobPrivRSAEncrypt.pri b/crypto/test/data/rfc4134/BobPrivRSAEncrypt.pri
new file mode 100644
index 000000000..b0805b84a
--- /dev/null
+++ b/crypto/test/data/rfc4134/BobPrivRSAEncrypt.pri
Binary files differdiff --git a/crypto/test/data/rfc4134/BobRSASignByCarl.cer b/crypto/test/data/rfc4134/BobRSASignByCarl.cer
new file mode 100644
index 000000000..1068ab9d4
--- /dev/null
+++ b/crypto/test/data/rfc4134/BobRSASignByCarl.cer
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlDSSCRLEmpty.crl b/crypto/test/data/rfc4134/CarlDSSCRLEmpty.crl
new file mode 100644
index 000000000..42af3a09a
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlDSSCRLEmpty.crl
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlDSSCRLForAll.crl b/crypto/test/data/rfc4134/CarlDSSCRLForAll.crl
new file mode 100644
index 000000000..52b818d4a
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlDSSCRLForAll.crl
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlDSSCRLForCarl.crl b/crypto/test/data/rfc4134/CarlDSSCRLForCarl.crl
new file mode 100644
index 000000000..2a4e79499
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlDSSCRLForCarl.crl
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlDSSSelf.cer b/crypto/test/data/rfc4134/CarlDSSSelf.cer
new file mode 100644
index 000000000..b47c682fd
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlDSSSelf.cer
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlPrivDSSSign.pri b/crypto/test/data/rfc4134/CarlPrivDSSSign.pri
new file mode 100644
index 000000000..4b1fdc00d
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlPrivDSSSign.pri
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlPrivRSASign.pri b/crypto/test/data/rfc4134/CarlPrivRSASign.pri
new file mode 100644
index 000000000..7fee220a6
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlPrivRSASign.pri
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlRSACRLEmpty.crl b/crypto/test/data/rfc4134/CarlRSACRLEmpty.crl
new file mode 100644
index 000000000..c3eb30466
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlRSACRLEmpty.crl
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlRSACRLForAll.crl b/crypto/test/data/rfc4134/CarlRSACRLForAll.crl
new file mode 100644
index 000000000..3708ccbf5
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlRSACRLForAll.crl
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlRSACRLForCarl.crl b/crypto/test/data/rfc4134/CarlRSACRLForCarl.crl
new file mode 100644
index 000000000..2ce8e4db5
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlRSACRLForCarl.crl
Binary files differdiff --git a/crypto/test/data/rfc4134/CarlRSASelf.cer b/crypto/test/data/rfc4134/CarlRSASelf.cer
new file mode 100644
index 000000000..ce6737d90
--- /dev/null
+++ b/crypto/test/data/rfc4134/CarlRSASelf.cer
Binary files differdiff --git a/crypto/test/data/rfc4134/DianeDSSSignByCarlInherit.cer b/crypto/test/data/rfc4134/DianeDSSSignByCarlInherit.cer
new file mode 100644
index 000000000..e0fa3ac75
--- /dev/null
+++ b/crypto/test/data/rfc4134/DianeDSSSignByCarlInherit.cer
Binary files differdiff --git a/crypto/test/data/rfc4134/DianePrivDSSSign.pri b/crypto/test/data/rfc4134/DianePrivDSSSign.pri
new file mode 100644
index 000000000..68ddc9594
--- /dev/null
+++ b/crypto/test/data/rfc4134/DianePrivDSSSign.pri
Binary files differdiff --git a/crypto/test/data/rfc4134/DianePrivRSASignEncrypt.pri b/crypto/test/data/rfc4134/DianePrivRSASignEncrypt.pri
new file mode 100644
index 000000000..b7bcb2953
--- /dev/null
+++ b/crypto/test/data/rfc4134/DianePrivRSASignEncrypt.pri
Binary files differdiff --git a/crypto/test/data/rfc4134/DianeRSASignByCarl.cer b/crypto/test/data/rfc4134/DianeRSASignByCarl.cer
new file mode 100644
index 000000000..062260a9d
--- /dev/null
+++ b/crypto/test/data/rfc4134/DianeRSASignByCarl.cer
Binary files differdiff --git a/crypto/test/data/rfc4134/ExContent.bin b/crypto/test/data/rfc4134/ExContent.bin
new file mode 100644
index 000000000..22ddba65c
--- /dev/null
+++ b/crypto/test/data/rfc4134/ExContent.bin
@@ -0,0 +1 @@
+This is some sample content.
\ No newline at end of file
diff --git a/crypto/test/data/rfc4134/rfc4134.txt b/crypto/test/data/rfc4134/rfc4134.txt
new file mode 100644
index 000000000..a53cec5e1
--- /dev/null
+++ b/crypto/test/data/rfc4134/rfc4134.txt
@@ -0,0 +1,7619 @@
+
+
+
+
+
+
+Network Working Group                                    P. Hoffman, Ed.
+Request for Comments: 4134                      Internet Mail Consortium
+Category: Informational                                        July 2005
+
+
+                      Examples of S/MIME Messages
+
+Status of This Memo
+
+   This memo provides information for the Internet community.  It does
+   not specify an Internet standard of any kind.  Distribution of this
+   memo is unlimited.
+
+Copyright Notice
+
+   Copyright (C) The Internet Society (2005).
+
+Abstract
+
+   This document gives examples of message bodies formatted using
+   S/MIME.  Specifically, it has examples of Cryptographic Message
+   Syntax (CMS) objects and S/MIME messages (including the MIME
+   formatting).  It includes examples of many common CMS formats.  The
+   purpose of this document is to help increase interoperability for
+   S/MIME and other protocols that rely on CMS.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                      [Page 1]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+Table of Contents
+
+   1.  Introduction ................................................   3
+   2.  Constants Used in the Examples ..............................   3
+       2.1.  Content of Documents ..................................   4
+       2.2.  Private Keys ..........................................   4
+       2.3.  Certificates ..........................................  13
+       2.4.  CRLs ..................................................  33
+   3.  Trivial Examples ............................................  39
+       3.1.  ContentInfo with Data Type, BER .......................  39
+       3.2.  ContentInfo with Data Type, DER .......................  39
+   4.  Signed-data .................................................  39
+       4.1.  Basic Signed Content, DSS .............................  39
+       4.2.  Basic Signed Content, RSA .............................  44
+       4.3.  Basic Signed Content, Detached Content ................  49
+       4.4.  Fancier Signed Content ................................  53
+       4.5.  All RSA Signed Message ................................  68
+       4.6.  Multiple Signers ......................................  75
+       4.7.  Signing Using SKI .....................................  83
+       4.8.  S/MIME multipart/signed Message .......................  87
+       4.9.  S/MIME application/pkcs7-mime Signed Message ..........  88
+       4.10. SignedData with Attributes ............................  89
+       4.11. SignedData with Certificates Only ..................... 101
+   5.  Enveloped-data .............................................. 109
+       5.1.  Basic Encrypted Content, TripleDES and RSA ............ 109
+       5.2.  Basic Encrypted Content, RC2/128 and RSA .............. 110
+       5.3.  S/MIME application/pkcs7-mime Encrypted Message ....... 112
+   6.  Digested-data ............................................... 112
+   7.  Encrypted-data .............................................. 113
+       7.1.  Simple EncryptedData .................................. 113
+       7.2.  EncryptedData with Unprotected Attributes ............. 114
+   8.  Security Considerations ..................................... 115
+   9.  References .................................................. 115
+       9.1.  Normative References .................................. 115
+       9.2.  Informative References ................................ 115
+   A.  Binaries of the Examples .................................... 116
+       A.1.  How the Binaries and Extractor Works .................. 116
+       A.2.  Example Extraction Program ............................ 116
+   B.  Examples in Order of Appearance ............................. 118
+   C.  Acknowledgements ............................................ 135
+
+
+
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                      [Page 2]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+1.  Introduction
+
+   The examples in this document show the structure and format of CMS
+   message bodies, as described in [CMS].  They are useful to
+   implementors who use protocols that rely on CMS, such as the S/MIME
+   message format protocol.  There are also examples of simple S/MIME
+   messages [SMIME-MSG] (including the MIME headers).
+
+   Every example in this document has been checked by two different
+   implementors.  This strongly indicates (but does not assure) that the
+   examples are correct.  All CMS implementors must read the CMS
+   document carefully before implementing from it.  No one should use
+   the examples in this document as stand-alone explanations of how to
+   create CMS message bodies.
+
+   This document explicitly does not attempt to cover many PKIX [PKIX]
+   examples.  Documents with examples of that format may be forthcoming.
+   Also, note that [DVCS], which covers PKIX Data Validation and
+   Certification Server Protocols, has examples of formats for its
+   protocol.
+
+   The examples shown here were created and validated by many different
+   people over a long period of time.  Because of this, some of the
+   dates used in the examples are many years in the past.  This, plus
+   the fact that some of the certificates in the examples have very long
+   lifespans, may cause problems in some test situations.
+
+2.  Constants Used in the Examples
+
+   This section defines the data used in the rest of the document.  The
+   names of the constants indicate their use.  For example,
+   AlicePrivDSSSign is the private part of Alice's DSS signing key.
+
+   - Alice is the creator of the message bodies in this document.
+
+   - Bob is the recipient of the messages.
+
+   - Carl is a CA.
+
+   - Diane sometimes gets involved with these folks.
+
+   - Erica also sometimes gets involved.
+
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                      [Page 3]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+2.1.  Content of Documents
+
+   ExContent is the following sentence:
+
+      This is some sample content.
+
+   That is, it is the string of characters starting with "T" up to and
+   including the ".".
+
+   The hex for ExContent is
+
+   5468 6973 2069 7320 736f 6d65 2073 616d 706c 6520 636f 6e74 656e 742e
+
+   The MD5 hash of ExContent is
+
+   9898 cac8 fab7 691f f89d c207 24e7 4a04
+
+   The SHA-1 hash of ExContent is
+
+   406a ec08 5279 ba6e 1602 2d9e 0629 c022 9687 dd48
+
+2.2.  Private Keys
+
+   The following private keys are needed to create the samples.  To find
+   the public keys, see the certificates in the next section.
+
+   AlicePrivDSSSign =
+      0 30  331: SEQUENCE {
+      4 02    1:   INTEGER 0
+      7 30  299:   SEQUENCE {
+     11 06    7:     OBJECT IDENTIFIER dsa (1 2 840 10040 4 1)
+               :       (ANSI X9.57 algorithm)
+     20 30  286:     SEQUENCE {
+     24 02  129:       INTEGER
+               :         00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+               :         48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+               :         53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+               :         0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+               :         2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+               :         DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+               :         9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+               :         8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+               :         C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+               :         78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+               :         B5 E4 09 96 5C F3 7E 5B DB
+    156 02   21:       INTEGER
+               :         00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+               :         B8 37 21 2B 62 8B F7 93 CD
+
+
+
+Hoffman, Ed.                 Informational                      [Page 4]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    179 02  128:       INTEGER
+               :         26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+               :         4B 59 6A 4C 76 23 39 04 02 35 5C F2
+               :         CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+               :         AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+               :         7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+               :         3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+               :         E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+               :         01 7C 6D 49 89 11 89 36 44 BD F8 C8
+               :         95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+               :         1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+               :         D1 81 4A 60 39 BA 36 39
+               :       }
+               :     }
+    310 04   23:   OCTET STRING, encapsulates {
+    312 02   21:       INTEGER
+               :         00 BB 44 46 D1 A5 C9 46 07 2E D0 FE
+               :         7A D6 92 07 F0 9A 85 89 3F
+               :       }
+               :   }
+
+   AlicePrivRSASign =
+      0 30  630: SEQUENCE {
+      4 02    1:   INTEGER 0
+      7 30   13:   SEQUENCE {
+      9 06    9:     OBJECT IDENTIFIER
+               :       rsaEncryption (1 2 840 113549 1 1 1)
+               :       (PKCS #1)
+     20 05    0:     NULL
+               :     }
+     22 04  608:   OCTET STRING, encapsulates {
+     26 30  604:       SEQUENCE {
+     30 02    1:         INTEGER 0
+     33 02  129:         INTEGER
+               :           00 E0 89 73 39 8D D8 F5 F5 E8 87 76
+               :           39 7F 4E B0 05 BB 53 83 DE 0F B7 AB
+               :           DC 7D C7 75 29 0D 05 2E 6D 12 DF A6
+               :           86 26 D4 D2 6F AA 58 29 FC 97 EC FA
+               :           82 51 0F 30 80 BE B1 50 9E 46 44 F1
+               :           2C BB D8 32 CF C6 68 6F 07 D9 B0 60
+               :           AC BE EE 34 09 6A 13 F5 F7 05 05 93
+               :           DF 5E BA 35 56 D9 61 FF 19 7F C9 81
+               :           E6 F8 6C EA 87 40 70 EF AC 6D 2C 74
+               :           9F 2D FA 55 3A B9 99 77 02 A6 48 52
+               :           8C 4E F3 57 38 57 74 57 5F
+    165 02    3:         INTEGER 65537
+    170 02  128:         INTEGER
+               :           00 A4 03 C3 27 47 76 34 34 6C A6 86
+
+
+
+Hoffman, Ed.                 Informational                      [Page 5]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           B5 79 49 01 4B 2E 8A D2 C8 62 B2 C7
+               :           D7 48 09 6A 8B 91 F7 36 F2 75 D6 E8
+               :           CD 15 90 60 27 31 47 35 64 4D 95 CD
+               :           67 63 CE B4 9F 56 AC 2F 37 6E 1C EE
+               :           0E BF 28 2D F4 39 90 6F 34 D8 6E 08
+               :           5B D5 65 6A D8 41 F3 13 D7 2D 39 5E
+               :           FE 33 CB FF 29 E4 03 0B 3D 05 A2 8F
+               :           B7 F1 8E A2 76 37 B0 79 57 D3 2F 2B
+               :           DE 87 06 22 7D 04 66 5E C9 1B AF 8B
+               :           1A C3 EC 91 44 AB 7F 21
+    301 02   65:         INTEGER
+               :           00 F6 D6 E0 22 21 4C 5F 0A 70 FF 27
+               :           FC E5 B3 50 6A 9D E5 0F B5 85 96 C6
+               :           40 FA A8 0A B4 9B 9B 0C 55 C2 01 1D
+               :           F9 37 82 8A 14 C8 F2 93 0E 92 CD A5
+               :           66 21 B9 3C D2 06 BF B4 55 31 C9 DC
+               :           AD CA 98 2D D1
+    368 02   65:         INTEGER
+               :           00 E8 DE B0 11 25 09 D2 02 51 01 DE
+               :           8A E8 98 50 F5 77 77 61 A4 45 93 6B
+               :           08 55 96 73 5D F4 C8 5B 12 93 22 73
+               :           8B 7F D3 70 7F F5 A4 AA BB 74 FD 3C
+               :           22 6A DA 38 91 2A 86 5B 6C 14 E8 AE
+               :           4C 9E FA 8E 2F
+    435 02   65:         INTEGER
+               :           00 97 4C F0 87 9B 17 7F EE 1B 83 1B
+               :           14 B6 0B 6A 90 5F 86 27 51 E1 B7 A0
+               :           7F F5 E4 88 E3 59 B9 F9 1E 9B D3 29
+               :           77 38 22 48 D7 22 B1 25 98 BA 3D 59
+               :           53 B7 FA 1E 20 B2 C8 51 16 23 75 93
+               :           51 E7 AB CD F1
+    502 02   64:         INTEGER
+               :           2C F0 24 5B FA A0 CD 85 22 EA D0 6E
+               :           4F FA 6C CD 21 D3 C8 E4 F1 84 44 48
+               :           64 73 D7 29 8F 7E 46 8C EC 15 DE E4
+               :           51 B3 94 E7 2C 99 2D 55 65 7B 24 EA
+               :           A3 62 1F 3E 6C 4D 67 41 11 3B E1 BE
+               :           E9 83 02 83
+    568 02   64:         INTEGER
+               :           58 88 D9 A1 50 38 84 6A AB 03 BC BB
+               :           DF 4B F4 9C 6F B8 B4 2A 25 FB F6 E4
+               :           05 2F 6E E2 88 89 21 6F 4B 25 9E D0
+               :           AB 50 93 CA BF 40 71 EC 21 25 C5 7F
+               :           FB 02 E9 21 96 B8 33 CD E2 C6 95 EE
+               :           6F 8D 5F 28
+               :         }
+               :       }
+               :   }
+
+
+
+Hoffman, Ed.                 Informational                      [Page 6]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+   BobPrivRSAEncrypt =
+      0 30  645: SEQUENCE {
+      4 02    1:   INTEGER 0
+      7 30   13:   SEQUENCE {
+      9 06    9:     OBJECT IDENTIFIER
+               :       rsaEncryption (1 2 840 113549 1 1 1)
+               :       (PKCS #1)
+     20 05    0:     NULL
+               :     }
+     22 04  608:   OCTET STRING, encapsulates {
+     26 30  604:       SEQUENCE {
+     30 02    1:         INTEGER 0
+     33 02  129:         INTEGER
+               :           00 A9 E1 67 98 3F 39 D5 5F F2 A0 93
+               :           41 5E A6 79 89 85 C8 35 5D 9A 91 5B
+               :           FB 1D 01 DA 19 70 26 17 0F BD A5 22
+               :           D0 35 85 6D 7A 98 66 14 41 5C CF B7
+               :           B7 08 3B 09 C9 91 B8 19 69 37 6D F9
+               :           65 1E 7B D9 A9 33 24 A3 7F 3B BB AF
+               :           46 01 86 36 34 32 CB 07 03 59 52 FC
+               :           85 8B 31 04 B8 CC 18 08 14 48 E6 4F
+               :           1C FB 5D 60 C4 E0 5C 1F 53 D3 7F 53
+               :           D8 69 01 F1 05 F8 7A 70 D1 BE 83 C6
+               :           5F 38 CF 1C 2C AA 6A A7 EB
+    165 02    3:         INTEGER 65537
+    170 02  128:         INTEGER
+               :           67 CD 48 4C 9A 0D 8F 98 C2 1B 65 FF
+               :           22 83 9C 6D F0 A6 06 1D BC ED A7 03
+               :           88 94 F2 1C 6B 0F 8B 35 DE 0E 82 78
+               :           30 CB E7 BA 6A 56 AD 77 C6 EB 51 79
+               :           70 79 0A A0 F4 FE 45 E0 A9 B2 F4 19
+               :           DA 87 98 D6 30 84 74 E4 FC 59 6C C1
+               :           C6 77 DC A9 91 D0 7C 30 A0 A2 C5 08
+               :           5E 21 71 43 FC 0D 07 3D F0 FA 6D 14
+               :           9E 4E 63 F0 17 58 79 1C 4B 98 1C 3D
+               :           3D B0 1B DF FA 25 3B A3 C0 2C 98 05
+               :           F6 10 09 D8 87 DB 03 19
+    301 02   65:         INTEGER
+               :           00 D0 C3 22 C6 DE A2 99 18 76 8F 8D
+               :           BC A6 75 D6 66 3F D4 8D 45 52 8C 76
+               :           F5 72 C4 EB F0 46 9A F1 3E 5C AA 55
+               :           0B 9B DA DD 6B 6D F8 FC 3B 3C 08 43
+               :           93 B5 5B FE CE EA FD 68 84 23 62 AF
+               :           F3 31 C2 B9 E5
+    368 02   65:         INTEGER
+               :           00 D0 51 FC 1E 22 B7 5B ED B5 8E 01
+               :           C8 D7 AB F2 58 D4 F7 82 94 F3 53 A8
+               :           19 45 CB 66 CA 28 19 5F E2 10 2B F3
+
+
+
+Hoffman, Ed.                 Informational                      [Page 7]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           8F EC 6A 30 74 F8 4D 11 F4 A7 C4 20
+               :           B5 47 21 DC 49 01 F9 0A 20 29 F0 24
+               :           08 84 60 7D 8F
+    435 02   64:         INTEGER
+               :           34 BA 64 C9 48 28 57 74 D7 55 50 DE
+               :           6A 48 EF 1B 2A 5A 1C 48 7B 1E 21 59
+               :           C3 60 3B 9B 97 A9 C0 EF 18 66 A9 4E
+               :           62 52 38 84 CE E5 09 88 48 94 69 C5
+               :           20 14 99 5A 57 FE 23 6C E4 A7 23 7B
+               :           D0 80 B7 85
+    501 02   65:         INTEGER
+               :           00 9E 2F B3 37 9A FB 0B 06 5D 57 E1
+               :           09 06 A4 5D D9 90 96 06 05 5F 24 06
+               :           40 72 9C 3A 88 85 9C 87 0F 9D 62 12
+               :           88 16 68 A8 35 1A 1B 43 E8 38 C0 98
+               :           69 AF 03 0A 48 32 04 4E E9 0F 8F 77
+               :           7D 34 30 25 07
+    568 02   64:         INTEGER
+               :           57 18 67 D6 0A D2 B5 AB C2 BA 7A E7
+               :           54 DA 9C 05 4F 81 D4 EF 01 89 1E 32
+               :           3D 69 CB 31 C4 52 C8 54 55 25 00 3B
+               :           1C 2A 7C 26 50 D5 E9 A6 D7 77 CB CF
+               :           15 F5 EE 0B D5 8D EE B3 AF 4C A1 7C
+               :           63 46 41 F6
+               :         }
+               :       }
+    634 A0   13:   [0] {
+    636 30   11:     SEQUENCE {
+    638 06    3:       OBJECT IDENTIFIER keyUsage (2 5 29 15)
+               :         (X.509 id-ce (2 5 29))
+    643 31    4:       SET {
+    645 03    2:         BIT STRING 0 unused bits
+               :           '00001000'B (bit 3)
+               :           Error: Spurious zero bits in bitstring.
+               :         }
+               :       }
+               :     }
+               :   }
+
+   CarlPrivDSSSign =
+      0 30  330: SEQUENCE {
+      4 02    1:   INTEGER 0
+      7 30  299:   SEQUENCE {
+     11 06    7:     OBJECT IDENTIFIER dsa (1 2 840 10040 4 1)
+               :       (ANSI X9.57 algorithm)
+     20 30  286:     SEQUENCE {
+     24 02  129:       INTEGER
+               :         00 B6 49 18 3E 8A 44 C1 29 71 94 4C
+
+
+
+Hoffman, Ed.                 Informational                      [Page 8]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :         01 C4 12 C1 7A 79 CB 54 4D AB 1E 81
+               :         FB C6 4C B3 0E 94 09 06 EB 01 D4 B1
+               :         C8 71 4B C7 45 C0 50 25 5D 9C FC DA
+               :         E4 6D D3 E2 86 48 84 82 7D BA 15 95
+               :         4A 16 F6 46 ED DD F6 98 D2 BB 7E 8A
+               :         0A 8A BA 16 7B B9 50 01 48 93 8B EB
+               :         25 15 51 97 55 DC 8F 53 0E 10 A9 50
+               :         FC 70 B7 CD 30 54 FD DA DE A8 AA 22
+               :         B5 A1 AF 8B CC 02 88 E7 8B 70 5F B9
+               :         AD E1 08 D4 6D 29 2D D6 E9
+    156 02   21:       INTEGER
+               :         00 DD C1 2F DF 53 CE 0B 34 60 77 3E
+               :         02 A4 BF 8A 5D 98 B9 10 D5
+    179 02  128:       INTEGER
+               :         0C EE 57 9B 4B BD DA B6 07 6A 74 37
+               :         4F 55 7F 9D ED BC 61 0D EB 46 59 3C
+               :         56 0B 2B 5B 0C 91 CE A5 62 52 69 CA
+               :         E1 6D 3E BD BF FE E1 B7 B9 2B 61 3C
+               :         AD CB AE 45 E3 06 AC 8C 22 9D 9C 44
+               :         87 0B C7 CD F0 1C D9 B5 4E 5D 73 DE
+               :         AF 0E C9 1D 5A 51 F5 4F 44 79 35 5A
+               :         73 AA 7F 46 51 1F A9 42 16 9C 48 EB
+               :         8A 79 61 B4 D5 2F 53 22 44 63 1F 86
+               :         B8 A3 58 06 25 F8 29 C0 EF BA E0 75
+               :         F0 42 C4 63 65 52 9B 0A
+               :       }
+               :     }
+    310 04   22:   OCTET STRING, encapsulates {
+    312 02   20:       INTEGER
+               :         19 B3 38 A5 21 62 31 50 E5 7F B9 3E
+               :         08 46 78 D1 3E B5 E5 72
+               :       }
+               :   }
+
+   CarlPrivRSASign =
+      0 30  630: SEQUENCE {
+      4 02    1:   INTEGER 0
+      7 30   13:   SEQUENCE {
+      9 06    9:     OBJECT IDENTIFIER
+               :       rsaEncryption (1 2 840 113549 1 1 1)
+               :       (PKCS #1)
+     20 05    0:     NULL
+               :     }
+     22 04  608:   OCTET STRING, encapsulates {
+     26 30  604:       SEQUENCE {
+     30 02    1:         INTEGER 0
+     33 02  129:         INTEGER
+               :           00 E4 4B FF 18 B8 24 57 F4 77 FF 6E
+
+
+
+Hoffman, Ed.                 Informational                      [Page 9]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           73 7B 93 71 5C BC 33 1A 92 92 72 23
+               :           D8 41 46 D0 CD 11 3A 04 B3 8E AF 82
+               :           9D BD 51 1E 17 7A F2 76 2C 2B 86 39
+               :           A7 BD D7 8D 1A 53 EC E4 00 D5 E8 EC
+               :           A2 36 B1 ED E2 50 E2 32 09 8A 3F 9F
+               :           99 25 8F B8 4E AB B9 7D D5 96 65 DA
+               :           16 A0 C5 BE 0E AE 44 5B EF 5E F4 A7
+               :           29 CB 82 DD AC 44 E9 AA 93 94 29 0E
+               :           F8 18 D6 C8 57 5E F2 76 C4 F2 11 60
+               :           38 B9 1B 3C 1D 97 C9 6A F1
+    165 02    3:         INTEGER 65537
+    170 02  129:         INTEGER
+               :           00 AE 73 E4 5B 5F 5B 66 5A C9 D7 C6
+               :           EF 38 5F 53 21 2A 2F 62 FE DE 29 9A
+               :           7A 86 67 36 E7 7D 62 78 75 3D 73 A0
+               :           BC 29 0E F3 8F BD C3 C9 C9 B6 F8 BA
+               :           D6 13 9B C3 97 7A CA 6A F0 B8 85 65
+               :           4E 0F BD A7 A8 F7 54 06 41 BD EB DC
+               :           20 77 90 DF 61 9B 9A 6F 74 DE EA 3B
+               :           D4 9C 87 60 ED 76 84 F1 6A 30 37 D5
+               :           E0 90 16 F8 80 47 C3 19 6B ED 75 77
+               :           BA 4A ED 39 B6 5D 02 47 3B 5F 1B C8
+               :           1C AB CB E8 F5 26 3F A4 81
+    302 02   65:         INTEGER
+               :           00 FF DF 09 A0 56 0B 42 52 9E C4 4D
+               :           93 B3 B0 49 BB DE E7 81 7D 28 99 D0
+               :           B1 48 BA 0B 39 E1 1C 7B 22 18 33 B6
+               :           40 F6 BF DC AE 1D D0 A1 AD 04 71 5A
+               :           61 0A 6E 3B CE 30 DA 36 9F 65 25 29
+               :           BB A7 0E 7F 0B
+    369 02   65:         INTEGER
+               :           00 E4 69 68 18 5F F9 57 D0 7C 66 89
+               :           0F BA 63 1D 72 CB 20 A4 81 76 64 89
+               :           CD 7D D1 C2 27 A9 2E AC 7A 56 9A 85
+               :           07 D9 30 03 A3 03 AB 7F 88 92 50 24
+               :           01 AA 1B 07 1F 20 4C B7 C9 7B 56 F7
+               :           B6 C2 7E AB 73
+    436 02   64:         INTEGER
+               :           57 36 6C 8F 8C 04 76 6C B6 D4 EE 24
+               :           44 00 F8 80 E2 AF 42 01 A9 0F 14 84
+               :           F8 E7 00 E0 8F 8C 27 A4 2D 5F A2 E5
+               :           6D B5 63 C0 AD 44 E9 76 91 A7 19 49
+               :           2E 46 F8 77 85 4B 3B 87 04 F0 AF D2
+               :           D8 54 26 95
+    502 02   64:         INTEGER
+               :           64 A1 0F AC 55 74 1B BD 0D 61 7B 17
+               :           03 CD B0 E6 A7 19 1D 80 AF F1 41 48
+               :           D8 1A B6 88 14 A0 2C 7A C5 76 D4 0F
+
+
+
+Hoffman, Ed.                 Informational                     [Page 10]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           0E 1F 7A 2A B2 6E 37 04 AB 39 45 73
+               :           BA 46 A8 0F 8D 82 5F 22 14 05 CF A2
+               :           A3 F3 7C 83
+    568 02   64:         INTEGER
+               :           26 1E 1D 1C A1 98 2B E4 DB 38 E8 57
+               :           6E 6B 73 19 88 61 3A FA 74 4A 36 8B
+               :           47 68 5D 50 EB 26 E3 EA 7D 9B 4E 65
+               :           A9 AF 7B AB 4B 2E 76 51 3D A8 D0 11
+               :           AB A3 D6 A8 C0 27 36 1D 54 0B AA A7
+               :           D1 6D 8D FA
+               :         }
+               :       }
+               :   }
+
+   DianePrivDSSSign =
+      0 30  331: SEQUENCE {
+      4 02    1:   INTEGER 0
+      7 30  299:   SEQUENCE {
+     11 06    7:     OBJECT IDENTIFIER dsa (1 2 840 10040 4 1)
+               :       (ANSI X9.57 algorithm)
+     20 30  286:     SEQUENCE {
+     24 02  129:       INTEGER
+               :         00 B6 49 18 3E 8A 44 C1 29 71 94 4C
+               :         01 C4 12 C1 7A 79 CB 54 4D AB 1E 81
+               :         FB C6 4C B3 0E 94 09 06 EB 01 D4 B1
+               :         C8 71 4B C7 45 C0 50 25 5D 9C FC DA
+               :         E4 6D D3 E2 86 48 84 82 7D BA 15 95
+               :         4A 16 F6 46 ED DD F6 98 D2 BB 7E 8A
+               :         0A 8A BA 16 7B B9 50 01 48 93 8B EB
+               :         25 15 51 97 55 DC 8F 53 0E 10 A9 50
+               :         FC 70 B7 CD 30 54 FD DA DE A8 AA 22
+               :         B5 A1 AF 8B CC 02 88 E7 8B 70 5F B9
+               :         AD E1 08 D4 6D 29 2D D6 E9
+    156 02   21:       INTEGER
+               :         00 DD C1 2F DF 53 CE 0B 34 60 77 3E
+               :         02 A4 BF 8A 5D 98 B9 10 D5
+    179 02  128:       INTEGER
+               :         0C EE 57 9B 4B BD DA B6 07 6A 74 37
+               :         4F 55 7F 9D ED BC 61 0D EB 46 59 3C
+               :         56 0B 2B 5B 0C 91 CE A5 62 52 69 CA
+               :         E1 6D 3E BD BF FE E1 B7 B9 2B 61 3C
+               :         AD CB AE 45 E3 06 AC 8C 22 9D 9C 44
+               :         87 0B C7 CD F0 1C D9 B5 4E 5D 73 DE
+               :         AF 0E C9 1D 5A 51 F5 4F 44 79 35 5A
+               :         73 AA 7F 46 51 1F A9 42 16 9C 48 EB
+               :         8A 79 61 B4 D5 2F 53 22 44 63 1F 86
+               :         B8 A3 58 06 25 F8 29 C0 EF BA E0 75
+               :         F0 42 C4 63 65 52 9B 0A
+
+
+
+Hoffman, Ed.                 Informational                     [Page 11]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :       }
+               :     }
+    310 04   23:   OCTET STRING, encapsulates {
+    312 02   21:       INTEGER
+               :         00 96 95 F9 E0 C1 E0 41 2D 32 0F 8B
+               :         42 52 93 2A E6 1E 0E 21 29
+               :       }
+               :   }
+
+   DianePrivRSASignEncrypt =
+      0 30  631: SEQUENCE {
+      4 02    1:   INTEGER 0
+      7 30   13:   SEQUENCE {
+      9 06    9:     OBJECT IDENTIFIER
+               :       rsaEncryption (1 2 840 113549 1 1 1)
+               :       (PKCS #1)
+     20 05    0:     NULL
+               :     }
+     22 04  609:   OCTET STRING, encapsulates {
+     26 30  605:       SEQUENCE {
+     30 02    1:         INTEGER 0
+     33 02  129:         INTEGER
+               :           00 D6 FD B8 C0 70 C6 4C 25 EC EA CF
+               :           EA 7C BB A2 62 FA F0 E6 32 3A 53 FF
+               :           B1 92 5A 17 F4 20 E1 99 24 82 0A D0
+               :           F6 7C FB 44 CA 8B 27 06 F1 7E 26 03
+               :           A9 76 9D CF EC A0 2C 70 96 F2 83 42
+               :           F6 D4 B7 28 0A BB F8 BF 4A 4C 19 3F
+               :           07 DB A0 C1 60 1E B7 7E 67 F7 DE B1
+               :           C3 60 49 AC 45 D7 F8 C6 EF 08 37 21
+               :           93 47 EE F0 73 35 72 B0 02 C4 F3 11
+               :           C3 5E 47 E5 0A B7 83 F1 DB 74 69 64
+               :           8B 44 1D 95 5D CD 28 C0 85
+    165 02    3:         INTEGER 65537
+    170 02  128:         INTEGER
+               :           3D BD CD C2 0E 61 14 5B 4B E7 BF 60
+               :           23 04 2B C5 6B 35 A5 96 45 23 FC 69
+               :           7D 93 3C 0F D3 25 96 BA 62 52 42 E2
+               :           96 CF FE 58 80 8F EB B1 8C BD D4 0D
+               :           65 D0 3A 77 45 24 9E 0C EB 86 80 C3
+               :           AC 21 11 71 44 E3 B2 A8 A9 2E AC 17
+               :           D2 A3 84 25 63 B5 BC 2F 1E DD F6 21
+               :           FF 15 20 24 5B F1 80 2F D5 41 0E 32
+               :           24 F7 D4 4A 32 9E B9 49 D8 19 8E 3F
+               :           39 8D 62 BD 80 FC 0C 24 92 93 E4 C3
+               :           D7 05 91 53 BB 96 B6 41
+    301 02   65:         INTEGER
+               :           00 F3 B8 3F 4A D1 94 B0 91 60 13 41
+
+
+
+Hoffman, Ed.                 Informational                     [Page 12]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           92 0D 8D 44 3F 77 1D FF 96 23 44 08
+               :           D4 0B 70 C9 1A AF E9 90 94 F2 B0 D5
+               :           5F 4F 19 85 50 A1 90 91 AE BD 05 76
+               :           52 B3 22 D8 A8 7C 8E 54 7F 00 72 4F
+               :           36 75 68 73 B5
+    368 02   65:         INTEGER
+               :           00 E1 D2 E7 11 57 06 AE 72 95 22 16
+               :           AA 02 B4 5A ED 4E 9D 82 11 4F 96 3C
+               :           86 C9 10 8D 56 7B 31 75 79 69 E7 75
+               :           68 38 00 4B 2E D2 26 32 DD B1 E2 E0
+               :           2C 54 80 0A 75 BA D1 66 96 1B B0 0E
+               :           A0 7E D2 BB 91
+    435 02   65:         INTEGER
+               :           00 AF B6 BC DB 22 73 43 41 EC B4 B5
+               :           67 A9 A1 99 FC EF D2 8E FD 1D FB E5
+               :           29 8B FE 0A DF D4 C8 5E 57 25 0A 5D
+               :           2B D4 09 A0 56 5B C5 B1 62 FC 20 BE
+               :           08 2D E3 07 B5 A1 E7 B3 FF C4 C0 A5
+               :           5F AC 12 5C A9
+    502 02   65:         INTEGER
+               :           00 B9 98 41 FC 08 50 1F 73 60 8A 01
+               :           A2 7C 52 8A 20 5A EA 2C 89 D9 A5 19
+               :           DD 94 C6 1B C3 25 C0 82 51 E4 EE 2B
+               :           9A 19 DC 73 ED E9 1D 27 D4 F8 6C 03
+               :           DD AB 1D 08 7B B5 AC 7F E9 82 9B F1
+               :           89 8A 71 DB 61
+    569 02   64:         INTEGER
+               :           01 07 21 97 5F 7A 60 A8 FD 5A 5C 07
+               :           DF A8 DE F7 E2 B1 34 7D FC EB 91 BD
+               :           B0 73 74 C8 C4 BE 3F 58 45 30 06 90
+               :           B3 AC 69 CC B3 F7 3F 7C AC C7 B8 1B
+               :           65 A1 16 39 39 B0 E3 74 7D CF CD C5
+               :           AC 6C BF E5
+               :         }
+               :       }
+               :   }
+
+2.3.  Certificates
+
+   AliceDSSSignByCarlNoInherit =
+      0 30  732: SEQUENCE {
+      4 30  667:   SEQUENCE {
+      8 A0    3:     [0] {
+     10 02    1:       INTEGER 2
+               :       }
+     13 02    2:     INTEGER 200
+     17 30    9:     SEQUENCE {
+     19 06    7:       OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+
+
+
+Hoffman, Ed.                 Informational                     [Page 13]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :         (ANSI X9.57 algorithm)
+               :       }
+     28 30   18:     SEQUENCE {
+     30 31   16:       SET {
+     32 30   14:         SEQUENCE {
+     34 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     39 13    7:           PrintableString 'CarlDSS'
+               :           }
+               :         }
+               :       }
+     48 30   30:     SEQUENCE {
+     50 17   13:       UTCTime '990817011049Z'
+     65 17   13:       UTCTime '391231235959Z'
+               :       }
+     80 30   19:     SEQUENCE {
+     82 31   17:       SET {
+     84 30   15:         SEQUENCE {
+     86 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     91 13    8:           PrintableString 'AliceDSS'
+               :           }
+               :         }
+               :       }
+    101 30  438:     SEQUENCE {
+    105 30  299:       SEQUENCE {
+    109 06    7:         OBJECT IDENTIFIER dsa (1 2 840 10040 4 1)
+               :           (ANSI X9.57 algorithm)
+    118 30  286:         SEQUENCE {
+    122 02  129:           INTEGER
+               :             00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+               :             48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+               :             53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+               :             0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+               :             2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+               :             DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+               :             9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+               :             8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+               :             C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+               :             78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+               :             B5 E4 09 96 5C F3 7E 5B DB
+    254 02   21:           INTEGER
+               :             00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+               :             B8 37 21 2B 62 8B F7 93 CD
+    277 02  128:           INTEGER
+               :             26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+               :             4B 59 6A 4C 76 23 39 04 02 35 5C F2
+               :             CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+
+
+
+Hoffman, Ed.                 Informational                     [Page 14]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :             AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+               :             7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+               :             3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+               :             E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+               :             01 7C 6D 49 89 11 89 36 44 BD F8 C8
+               :             95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+               :             1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+               :             D1 81 4A 60 39 BA 36 39
+               :           }
+               :         }
+    408 03  132:       BIT STRING 0 unused bits, encapsulates {
+    412 02  128:           INTEGER
+               :             5C E3 B9 5A 75 14 96 0B A9 7A DD E3
+               :             3F A9 EC AC 5E DC BD B7 13 11 34 A6
+               :             16 89 28 11 23 D9 34 86 67 75 75 13
+               :             12 3D 43 5B 6F E5 51 BF FA 89 F2 A2
+               :             1B 3E 24 7D 3D 07 8D 5B 63 C8 BB 45
+               :             A5 A0 4A E3 85 D6 CE 06 80 3F E8 23
+               :             7E 1A F2 24 AB 53 1A B8 27 0D 1E EF
+               :             08 BF 66 14 80 5C 62 AC 65 FA 15 8B
+               :             F1 BB 34 D4 D2 96 37 F6 61 47 B2 C4
+               :             32 84 F0 7E 41 40 FD 46 A7 63 4E 33
+               :             F2 A5 E2 F4 F2 83 E5 B8
+               :           }
+               :       }
+    543 A3  129:     [3] {
+    546 30  127:       SEQUENCE {
+    548 30   12:         SEQUENCE {
+    550 06    3:           OBJECT IDENTIFIER
+               :             basicConstraints (2 5 29 19)
+               :             (X.509 id-ce (2 5 29))
+    555 01    1:           BOOLEAN TRUE
+    558 04    2:           OCTET STRING, encapsulates {
+    560 30    0:               SEQUENCE {}
+               :               }
+               :           }
+    562 30   14:         SEQUENCE {
+    564 06    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
+               :             (X.509 id-ce (2 5 29))
+    569 01    1:           BOOLEAN TRUE
+    572 04    4:           OCTET STRING, encapsulates {
+    574 03    2:               BIT STRING 6 unused bits
+               :                 '11'B
+               :               }
+               :           }
+    578 30   31:         SEQUENCE {
+    580 06    3:           OBJECT IDENTIFIER
+               :             authorityKeyIdentifier (2 5 29 35)
+
+
+
+Hoffman, Ed.                 Informational                     [Page 15]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :             (X.509 id-ce (2 5 29))
+    585 04   24:           OCTET STRING, encapsulates {
+    587 30   22:               SEQUENCE {
+    589 80   20:                 [0]
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+               :                 }
+               :               }
+               :           }
+    611 30   29:         SEQUENCE {
+    613 06    3:           OBJECT IDENTIFIER
+               :             subjectKeyIdentifier (2 5 29 14)
+               :             (X.509 id-ce (2 5 29))
+    618 04   22:           OCTET STRING, encapsulates {
+    620 04   20:               OCTET STRING
+               :                 BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+               :                 13 01 E2 FD E3 97 FE CD
+               :               }
+               :           }
+    642 30   31:         SEQUENCE {
+    644 06    3:           OBJECT IDENTIFIER subjectAltName (2 5 29 17)
+               :             (X.509 id-ce (2 5 29))
+    649 04   24:           OCTET STRING, encapsulates {
+    651 30   22:               SEQUENCE {
+    653 81   20:                 [1] 'AliceDSS@example.com'
+               :                 }
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+    675 30    9:   SEQUENCE {
+    677 06    7:     OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :       (ANSI X9.57 algorithm)
+               :     }
+    686 03   48:   BIT STRING 0 unused bits, encapsulates {
+    689 30   45:       SEQUENCE {
+    691 02   20:         INTEGER
+               :           55 0C A4 19 1F 42 2B 89 71 22 33 8D
+               :           83 6A B5 3D 67 6B BF 45
+    713 02   21:         INTEGER
+               :           00 9F 61 53 52 54 0B 5C B2 DD DA E7
+               :           76 1D E2 10 52 5B 43 5E BD
+               :         }
+               :       }
+               :   }
+
+   AliceRSASignByCarl =
+
+
+
+Hoffman, Ed.                 Informational                     [Page 16]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+      0 30  556: SEQUENCE {
+      4 30  405:   SEQUENCE {
+      8 A0    3:     [0] {
+     10 02    1:       INTEGER 2
+               :       }
+     13 02   16:     INTEGER
+               :       46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :       C4 10 B3 B0
+     31 30   13:     SEQUENCE {
+     33 06    9:       OBJECT IDENTIFIER
+               :         sha1withRSAEncryption (1 2 840 113549 1 1 5)
+               :         (PKCS #1)
+     44 05    0:       NULL
+               :       }
+     46 30   18:     SEQUENCE {
+     48 31   16:       SET {
+     50 30   14:         SEQUENCE {
+     52 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     57 13    7:           PrintableString 'CarlRSA'
+               :           }
+               :         }
+               :       }
+     66 30   30:     SEQUENCE {
+     68 17   13:       UTCTime '990919010847Z'
+     83 17   13:       UTCTime '391231235959Z'
+               :       }
+     98 30   19:     SEQUENCE {
+    100 31   17:       SET {
+    102 30   15:         SEQUENCE {
+    104 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+    109 13    8:           PrintableString 'AliceRSA'
+               :           }
+               :         }
+               :       }
+    119 30  159:     SEQUENCE {
+    122 30   13:       SEQUENCE {
+    124 06    9:         OBJECT IDENTIFIER
+               :           rsaEncryption (1 2 840 113549 1 1 1)
+               :           (PKCS #1)
+    135 05    0:         NULL
+               :         }
+    137 03  141:       BIT STRING 0 unused bits, encapsulates {
+    141 30  137:           SEQUENCE {
+    144 02  129:             INTEGER
+               :               00 E0 89 73 39 8D D8 F5 F5 E8 87 76
+               :               39 7F 4E B0 05 BB 53 83 DE 0F B7 AB
+
+
+
+Hoffman, Ed.                 Informational                     [Page 17]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :               DC 7D C7 75 29 0D 05 2E 6D 12 DF A6
+               :               86 26 D4 D2 6F AA 58 29 FC 97 EC FA
+               :               82 51 0F 30 80 BE B1 50 9E 46 44 F1
+               :               2C BB D8 32 CF C6 68 6F 07 D9 B0 60
+               :               AC BE EE 34 09 6A 13 F5 F7 05 05 93
+               :               DF 5E BA 35 56 D9 61 FF 19 7F C9 81
+               :               E6 F8 6C EA 87 40 70 EF AC 6D 2C 74
+               :               9F 2D FA 55 3A B9 99 77 02 A6 48 52
+               :               8C 4E F3 57 38 57 74 57 5F
+    276 02    3:             INTEGER 65537
+               :             }
+               :           }
+               :       }
+    281 A3  129:     [3] {
+    284 30  127:       SEQUENCE {
+    286 30   12:         SEQUENCE {
+    288 06    3:           OBJECT IDENTIFIER
+               :             basicConstraints (2 5 29 19)
+               :             (X.509 id-ce (2 5 29))
+    293 01    1:           BOOLEAN TRUE
+    296 04    2:           OCTET STRING, encapsulates {
+    298 30    0:               SEQUENCE {}
+               :               }
+               :           }
+    300 30   14:         SEQUENCE {
+    302 06    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
+               :             (X.509 id-ce (2 5 29))
+    307 01    1:           BOOLEAN TRUE
+    310 04    4:           OCTET STRING, encapsulates {
+    312 03    2:               BIT STRING 6 unused bits
+               :                 '11'B
+               :               }
+               :           }
+    316 30   31:         SEQUENCE {
+    318 06    3:           OBJECT IDENTIFIER
+               :             authorityKeyIdentifier (2 5 29 35)
+               :             (X.509 id-ce (2 5 29))
+    323 04   24:           OCTET STRING, encapsulates {
+    325 30   22:               SEQUENCE {
+    327 80   20:                 [0]
+               :                   E9 E0 90 27 AC 78 20 7A 9A D3 4C F2
+               :                   42 37 4E 22 AE 9E 38 BB
+               :                 }
+               :               }
+               :           }
+    349 30   29:         SEQUENCE {
+    351 06    3:           OBJECT IDENTIFIER
+               :             subjectKeyIdentifier (2 5 29 14)
+
+
+
+Hoffman, Ed.                 Informational                     [Page 18]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :             (X.509 id-ce (2 5 29))
+    356 04   22:           OCTET STRING, encapsulates {
+    358 04   20:               OCTET STRING
+               :                 77 D2 B4 D1 B7 4C 8A 8A A3 CE 45 9D
+               :                 CE EC 3C A0 3A E3 FF 50
+               :               }
+               :           }
+    380 30   31:         SEQUENCE {
+    382 06    3:           OBJECT IDENTIFIER subjectAltName (2 5 29 17)
+               :             (X.509 id-ce (2 5 29))
+    387 04   24:           OCTET STRING, encapsulates {
+    389 30   22:               SEQUENCE {
+    391 81   20:                 [1] 'AliceRSA@example.com'
+               :                 }
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+    413 30   13:   SEQUENCE {
+    415 06    9:     OBJECT IDENTIFIER
+               :       sha1withRSAEncryption (1 2 840 113549 1 1 5)
+               :       (PKCS #1)
+    426 05    0:     NULL
+               :     }
+    428 03  129:   BIT STRING 0 unused bits
+               :     3E 70 47 A8 48 CC 13 58 8F CA 51 71
+               :     6B 4E 36 18 5D 04 7E 80 B1 8D 4D CC
+               :     CA A3 8F CC 7D 56 C8 BC CF 6E B3 1C
+               :     59 A9 20 AA 05 81 A8 4E 25 AD A7 70
+               :     14 75 2F F5 C7 9B D1 0E E9 63 D2 64
+               :     B7 C6 66 6E 73 21 54 DF F4 BA 25 5D
+               :     7D 49 D3 94 6B 22 36 74 73 B8 4A EC
+               :     2F 64 ED D3 3D D2 A7 42 C5 E8 37 8A
+               :     B4 DB 9F 67 E4 BD 9F F9 FE 74 EF EA
+               :     F9 EE 63 6A D8 3F 4B 25 09 B5 D8 1A
+               :     76 AE EB 9B DB 49 B0 22
+               :   }
+
+   BobRSASignByCarl =
+      0 30  551: SEQUENCE {
+      4 30  400:   SEQUENCE {
+      8 A0    3:     [0] {
+     10 02    1:       INTEGER 2
+               :       }
+     13 02   16:     INTEGER
+               :       46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :       CD 5D 71 D0
+
+
+
+Hoffman, Ed.                 Informational                     [Page 19]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+     31 30   13:     SEQUENCE {
+     33 06    9:       OBJECT IDENTIFIER
+               :         sha1withRSAEncryption (1 2 840 113549 1 1 5)
+               :         (PKCS #1)
+     44 05    0:       NULL
+               :       }
+     46 30   18:     SEQUENCE {
+     48 31   16:       SET {
+     50 30   14:         SEQUENCE {
+     52 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     57 13    7:           PrintableString 'CarlRSA'
+               :           }
+               :         }
+               :       }
+     66 30   30:     SEQUENCE {
+     68 17   13:       UTCTime '990919010902Z'
+     83 17   13:       UTCTime '391231235959Z'
+               :       }
+     98 30   17:     SEQUENCE {
+    100 31   15:       SET {
+    102 30   13:         SEQUENCE {
+    104 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+    109 13    6:           PrintableString 'BobRSA'
+               :           }
+               :         }
+               :       }
+    117 30  159:     SEQUENCE {
+    120 30   13:       SEQUENCE {
+    122 06    9:         OBJECT IDENTIFIER
+               :           rsaEncryption (1 2 840 113549 1 1 1)
+               :           (PKCS #1)
+    133 05    0:         NULL
+               :         }
+    135 03  141:       BIT STRING 0 unused bits, encapsulates {
+    139 30  137:           SEQUENCE {
+    142 02  129:             INTEGER
+               :               00 A9 E1 67 98 3F 39 D5 5F F2 A0 93
+               :               41 5E A6 79 89 85 C8 35 5D 9A 91 5B
+               :               FB 1D 01 DA 19 70 26 17 0F BD A5 22
+               :               D0 35 85 6D 7A 98 66 14 41 5C CF B7
+               :               B7 08 3B 09 C9 91 B8 19 69 37 6D F9
+               :               65 1E 7B D9 A9 33 24 A3 7F 3B BB AF
+               :               46 01 86 36 34 32 CB 07 03 59 52 FC
+               :               85 8B 31 04 B8 CC 18 08 14 48 E6 4F
+               :               1C FB 5D 60 C4 E0 5C 1F 53 D3 7F 53
+               :               D8 69 01 F1 05 F8 7A 70 D1 BE 83 C6
+
+
+
+Hoffman, Ed.                 Informational                     [Page 20]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :               5F 38 CF 1C 2C AA 6A A7 EB
+    274 02    3:             INTEGER 65537
+               :             }
+               :           }
+               :       }
+    279 A3  127:     [3] {
+    281 30  125:       SEQUENCE {
+    283 30   12:         SEQUENCE {
+    285 06    3:           OBJECT IDENTIFIER
+               :             basicConstraints (2 5 29 19)
+               :             (X.509 id-ce (2 5 29))
+    290 01    1:           BOOLEAN TRUE
+    293 04    2:           OCTET STRING, encapsulates {
+    295 30    0:               SEQUENCE {}
+               :               }
+               :           }
+    297 30   14:         SEQUENCE {
+    299 06    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
+               :             (X.509 id-ce (2 5 29))
+    304 01    1:           BOOLEAN TRUE
+    307 04    4:           OCTET STRING, encapsulates {
+    309 03    2:               BIT STRING 5 unused bits
+               :                 '100'B (bit 2)
+               :               }
+               :           }
+    313 30   31:         SEQUENCE {
+    315 06    3:           OBJECT IDENTIFIER
+               :             authorityKeyIdentifier (2 5 29 35)
+               :             (X.509 id-ce (2 5 29))
+    320 04   24:           OCTET STRING, encapsulates {
+    322 30   22:               SEQUENCE {
+    324 80   20:                 [0]
+               :                   E9 E0 90 27 AC 78 20 7A 9A D3 4C F2
+               :                   42 37 4E 22 AE 9E 38 BB
+               :                 }
+               :               }
+               :           }
+    346 30   29:         SEQUENCE {
+    348 06    3:           OBJECT IDENTIFIER
+               :             subjectKeyIdentifier (2 5 29 14)
+               :             (X.509 id-ce (2 5 29))
+    353 04   22:           OCTET STRING, encapsulates {
+    355 04   20:               OCTET STRING
+               :                 E8 F4 B8 67 D8 B3 96 A4 2A F3 11 AA
+               :                 29 D3 95 5A 86 16 B4 24
+               :               }
+               :           }
+    377 30   29:         SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 21]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    379 06    3:           OBJECT IDENTIFIER subjectAltName (2 5 29 17)
+               :             (X.509 id-ce (2 5 29))
+    384 04   22:           OCTET STRING, encapsulates {
+    386 30   20:               SEQUENCE {
+    388 81   18:                 [1] 'BobRSA@example.com'
+               :                 }
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+    408 30   13:   SEQUENCE {
+    410 06    9:     OBJECT IDENTIFIER
+               :       sha1withRSAEncryption (1 2 840 113549 1 1 5)
+               :       (PKCS #1)
+    421 05    0:     NULL
+               :     }
+    423 03  129:   BIT STRING 0 unused bits
+               :     7B 8E 66 C5 F1 10 3F 10 20 4C 88 71
+               :     AB 7B 40 6B 21 33 FA 4A 95 DE 9D 0E
+               :     5B 6B 94 21 05 C0 F2 E1 7E 2A CD 9C
+               :     93 88 87 FB 8B B7 7E 7D 41 61 E1 E4
+               :     D6 6D F9 E2 04 55 61 45 BC 64 27 44
+               :     C0 A1 BD 59 79 D9 1D 64 3C 21 D6 45
+               :     B0 5D 68 33 92 EA AC F1 57 E5 81 7D
+               :     98 E6 35 91 A3 39 DE 77 F4 E8 1C 3B
+               :     29 DC 7F 51 07 97 F3 36 F0 50 0A DD
+               :     9B DE B6 5E 38 11 2B FB 57 EA 89 6D
+               :     AD C9 88 D8 8F CF 2B D3
+               :   }
+
+   CarlDSSSelf =
+      0 30  667: SEQUENCE {
+      4 30  602:   SEQUENCE {
+      8 A0    3:     [0] {
+     10 02    1:       INTEGER 2
+               :       }
+     13 02    1:     INTEGER 1
+     16 30    9:     SEQUENCE {
+     18 06    7:       OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :         (ANSI X9.57 algorithm)
+               :       }
+     27 30   18:     SEQUENCE {
+     29 31   16:       SET {
+     31 30   14:         SEQUENCE {
+     33 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     38 13    7:           PrintableString 'CarlDSS'
+
+
+
+Hoffman, Ed.                 Informational                     [Page 22]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           }
+               :         }
+               :       }
+     47 30   30:     SEQUENCE {
+     49 17   13:       UTCTime '990816225050Z'
+     64 17   13:       UTCTime '391231235959Z'
+               :       }
+     79 30   18:     SEQUENCE {
+     81 31   16:       SET {
+     83 30   14:         SEQUENCE {
+     85 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     90 13    7:           PrintableString 'CarlDSS'
+               :           }
+               :         }
+               :       }
+     99 30  439:     SEQUENCE {
+    103 30  299:       SEQUENCE {
+    107 06    7:         OBJECT IDENTIFIER dsa (1 2 840 10040 4 1)
+               :           (ANSI X9.57 algorithm)
+    116 30  286:         SEQUENCE {
+    120 02  129:           INTEGER
+               :             00 B6 49 18 3E 8A 44 C1 29 71 94 4C
+               :             01 C4 12 C1 7A 79 CB 54 4D AB 1E 81
+               :             FB C6 4C B3 0E 94 09 06 EB 01 D4 B1
+               :             C8 71 4B C7 45 C0 50 25 5D 9C FC DA
+               :             E4 6D D3 E2 86 48 84 82 7D BA 15 95
+               :             4A 16 F6 46 ED DD F6 98 D2 BB 7E 8A
+               :             0A 8A BA 16 7B B9 50 01 48 93 8B EB
+               :             25 15 51 97 55 DC 8F 53 0E 10 A9 50
+               :             FC 70 B7 CD 30 54 FD DA DE A8 AA 22
+               :             B5 A1 AF 8B CC 02 88 E7 8B 70 5F B9
+               :             AD E1 08 D4 6D 29 2D D6 E9
+    252 02   21:           INTEGER
+               :             00 DD C1 2F DF 53 CE 0B 34 60 77 3E
+               :             02 A4 BF 8A 5D 98 B9 10 D5
+    275 02  128:           INTEGER
+               :             0C EE 57 9B 4B BD DA B6 07 6A 74 37
+               :             4F 55 7F 9D ED BC 61 0D EB 46 59 3C
+               :             56 0B 2B 5B 0C 91 CE A5 62 52 69 CA
+               :             E1 6D 3E BD BF FE E1 B7 B9 2B 61 3C
+               :             AD CB AE 45 E3 06 AC 8C 22 9D 9C 44
+               :             87 0B C7 CD F0 1C D9 B5 4E 5D 73 DE
+               :             AF 0E C9 1D 5A 51 F5 4F 44 79 35 5A
+               :             73 AA 7F 46 51 1F A9 42 16 9C 48 EB
+               :             8A 79 61 B4 D5 2F 53 22 44 63 1F 86
+               :             B8 A3 58 06 25 F8 29 C0 EF BA E0 75
+               :             F0 42 C4 63 65 52 9B 0A
+
+
+
+Hoffman, Ed.                 Informational                     [Page 23]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           }
+               :         }
+    406 03  133:       BIT STRING 0 unused bits, encapsulates {
+    410 02  129:           INTEGER
+               :             00 99 87 74 27 03 66 A0 B1 C0 AD DC
+               :             2C 75 BB E1 6C 44 9C DA 21 6D 4D 47
+               :             6D B1 62 09 E9 D8 AE 1E F2 3A B4 94
+               :             B1 A3 8E 7A 9B 71 4E 00 94 C9 B4 25
+               :             4E B9 60 96 19 24 01 F3 62 0C FE 75
+               :             C0 FB CE D8 68 00 E3 FD D5 70 4F DF
+               :             23 96 19 06 94 F4 B1 61 8F 3A 57 B1
+               :             08 11 A4 0B 26 25 F0 52 76 81 EA 0B
+               :             62 0D 95 2A E6 86 BA 72 B2 A7 50 83
+               :             0B AA 27 CD 1B A9 4D 89 9A D7 8D 18
+               :             39 84 3F 8B C5 56 4D 80 7A
+               :           }
+               :       }
+    542 A3   66:     [3] {
+    544 30   64:       SEQUENCE {
+    546 30   15:         SEQUENCE {
+    548 06    3:           OBJECT IDENTIFIER
+               :             basicConstraints (2 5 29 19)
+               :             (X.509 id-ce (2 5 29))
+    553 01    1:           BOOLEAN TRUE
+    556 04    5:           OCTET STRING, encapsulates {
+    558 30    3:               SEQUENCE {
+    560 01    1:                 BOOLEAN TRUE
+               :                 }
+               :               }
+               :           }
+    563 30   14:         SEQUENCE {
+    565 06    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
+               :             (X.509 id-ce (2 5 29))
+    570 01    1:           BOOLEAN TRUE
+    573 04    4:           OCTET STRING, encapsulates {
+    575 03    2:               BIT STRING 1 unused bits
+               :                 '1100001'B
+               :               }
+               :           }
+    579 30   29:         SEQUENCE {
+    581 06    3:           OBJECT IDENTIFIER
+               :             subjectKeyIdentifier (2 5 29 14)
+               :             (X.509 id-ce (2 5 29))
+    586 04   22:           OCTET STRING, encapsulates {
+    588 04   20:               OCTET STRING
+               :                 70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                 3D 20 BC 43 2B 93 F1 1F
+               :               }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 24]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           }
+               :         }
+               :       }
+               :     }
+    610 30    9:   SEQUENCE {
+    612 06    7:     OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :       (ANSI X9.57 algorithm)
+               :     }
+    621 03   48:   BIT STRING 0 unused bits, encapsulates {
+    624 30   45:       SEQUENCE {
+    626 02   20:         INTEGER
+               :           6B A9 F0 4E 7A 5A 79 E3 F9 BE 3D 2B
+               :           C9 06 37 E9 11 17 A1 13
+    648 02   21:         INTEGER
+               :           00 8F 34 69 2A 8B B1 3C 03 79 94 32
+               :           4D 12 1F CE 89 FB 46 B2 3B
+               :         }
+               :       }
+               :   }
+
+   CarlRSASelf =
+      0 30  491: SEQUENCE {
+      4 30  340:   SEQUENCE {
+      8 A0    3:     [0] {
+     10 02    1:       INTEGER 2
+               :       }
+     13 02   16:     INTEGER
+               :       46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :       9F F2 50 20
+     31 30   13:     SEQUENCE {
+     33 06    9:       OBJECT IDENTIFIER
+               :         sha1withRSAEncryption (1 2 840 113549 1 1 5)
+               :         (PKCS #1)
+     44 05    0:       NULL
+               :       }
+     46 30   18:     SEQUENCE {
+     48 31   16:       SET {
+     50 30   14:         SEQUENCE {
+     52 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     57 13    7:           PrintableString 'CarlRSA'
+               :           }
+               :         }
+               :       }
+     66 30   30:     SEQUENCE {
+     68 17   13:       UTCTime '990818070000Z'
+     83 17   13:       UTCTime '391231235959Z'
+               :       }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 25]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+     98 30   18:     SEQUENCE {
+    100 31   16:       SET {
+    102 30   14:         SEQUENCE {
+    104 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+    109 13    7:           PrintableString 'CarlRSA'
+               :           }
+               :         }
+               :       }
+    118 30  159:     SEQUENCE {
+    121 30   13:       SEQUENCE {
+    123 06    9:         OBJECT IDENTIFIER
+               :           rsaEncryption (1 2 840 113549 1 1 1)
+               :           (PKCS #1)
+    134 05    0:         NULL
+               :         }
+    136 03  141:       BIT STRING 0 unused bits, encapsulates {
+    140 30  137:           SEQUENCE {
+    143 02  129:             INTEGER
+               :               00 E4 4B FF 18 B8 24 57 F4 77 FF 6E
+               :               73 7B 93 71 5C BC 33 1A 92 92 72 23
+               :               D8 41 46 D0 CD 11 3A 04 B3 8E AF 82
+               :               9D BD 51 1E 17 7A F2 76 2C 2B 86 39
+               :               A7 BD D7 8D 1A 53 EC E4 00 D5 E8 EC
+               :               A2 36 B1 ED E2 50 E2 32 09 8A 3F 9F
+               :               99 25 8F B8 4E AB B9 7D D5 96 65 DA
+               :               16 A0 C5 BE 0E AE 44 5B EF 5E F4 A7
+               :               29 CB 82 DD AC 44 E9 AA 93 94 29 0E
+               :               F8 18 D6 C8 57 5E F2 76 C4 F2 11 60
+               :               38 B9 1B 3C 1D 97 C9 6A F1
+    275 02    3:             INTEGER 65537
+               :             }
+               :           }
+               :       }
+    280 A3   66:     [3] {
+    282 30   64:       SEQUENCE {
+    284 30   15:         SEQUENCE {
+    286 06    3:           OBJECT IDENTIFIER
+               :             basicConstraints (2 5 29 19)
+               :             (X.509 id-ce (2 5 29))
+    291 01    1:           BOOLEAN TRUE
+    294 04    5:           OCTET STRING, encapsulates {
+    296 30    3:               SEQUENCE {
+    298 01    1:                 BOOLEAN TRUE
+               :                 }
+               :               }
+               :           }
+    301 30   14:         SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 26]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    303 06    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
+               :             (X.509 id-ce (2 5 29))
+    308 01    1:           BOOLEAN TRUE
+    311 04    4:           OCTET STRING, encapsulates {
+    313 03    2:               BIT STRING 1 unused bits
+               :                 '1100001'B
+               :               }
+               :           }
+    317 30   29:         SEQUENCE {
+    319 06    3:           OBJECT IDENTIFIER
+               :             subjectKeyIdentifier (2 5 29 14)
+               :             (X.509 id-ce (2 5 29))
+    324 04   22:           OCTET STRING, encapsulates {
+    326 04   20:               OCTET STRING
+               :                 E9 E0 90 27 AC 78 20 7A 9A D3 4C F2
+               :                 42 37 4E 22 AE 9E 38 BB
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+    348 30   13:   SEQUENCE {
+    350 06    9:     OBJECT IDENTIFIER
+               :       sha1withRSAEncryption (1 2 840 113549 1 1 5)
+               :       (PKCS #1)
+    361 05    0:     NULL
+               :     }
+    363 03  129:   BIT STRING 0 unused bits
+               :     B7 9E D4 04 D3 ED 29 E4 FF 89 89 15
+               :     2E 4C DB 0C F0 48 0F 32 61 EE C4 04
+               :     EC 12 5D 2D FF 0F 64 59 7E 0A C3 ED
+               :     18 FD E3 56 40 37 A7 07 B5 F0 38 12
+               :     61 50 ED EF DD 3F E3 0B B8 61 A5 A4
+               :     9B 3C E6 9E 9C 54 9A B6 95 D6 DA 6C
+               :     3B B5 2D 45 35 9D 49 01 76 FA B9 B9
+               :     31 F9 F9 6B 12 53 A0 F5 14 60 9B 7D
+               :     CA 3E F2 53 6B B0 37 6F AD E6 74 D7
+               :     DB FA 5A EA 14 41 63 5D CD BE C8 0E
+               :     C1 DA 6A 8D 53 34 18 02
+               :   }
+
+   DianeDSSSignByCarlInherit =
+      0 30  440: SEQUENCE {
+      4 30  375:   SEQUENCE {
+      8 A0    3:     [0] {
+     10 02    1:       INTEGER 2
+               :       }
+     13 02    2:     INTEGER 210
+
+
+
+Hoffman, Ed.                 Informational                     [Page 27]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+     17 30    9:     SEQUENCE {
+     19 06    7:       OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :         (ANSI X9.57 algorithm)
+               :       }
+     28 30   18:     SEQUENCE {
+     30 31   16:       SET {
+     32 30   14:         SEQUENCE {
+     34 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     39 13    7:           PrintableString 'CarlDSS'
+               :           }
+               :         }
+               :       }
+     48 30   30:     SEQUENCE {
+     50 17   13:       UTCTime '990817020810Z'
+     65 17   13:       UTCTime '391231235959Z'
+               :       }
+     80 30   19:     SEQUENCE {
+     82 31   17:       SET {
+     84 30   15:         SEQUENCE {
+     86 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     91 13    8:           PrintableString 'DianeDSS'
+               :           }
+               :         }
+               :       }
+    101 30  147:     SEQUENCE {
+    104 30    9:       SEQUENCE {
+    106 06    7:         OBJECT IDENTIFIER dsa (1 2 840 10040 4 1)
+               :           (ANSI X9.57 algorithm)
+               :         }
+    115 03  133:       BIT STRING 0 unused bits, encapsulates {
+    119 02  129:           INTEGER
+               :             00 A0 00 17 78 2C EE 7E 81 53 2E 2E
+               :             61 08 0F A1 9B 51 52 1A DA 59 A8 73
+               :             2F 12 25 B6 08 CB CA EF 2A 44 76 8A
+               :             52 09 EA BD 05 22 D5 0F F6 FD 46 D7
+               :             AF 99 38 09 0E 13 CB 4F 2C DD 1C 34
+               :             F7 1C BF 25 FF 23 D3 3B 59 E7 82 97
+               :             37 BE 31 24 D8 18 C8 F3 49 39 5B B7
+               :             E2 E5 27 7E FC 8C 45 72 5B 7E 3E 8F
+               :             68 4D DD 46 7A 22 BE 8E FF CC DA 39
+               :             29 A3 39 E5 9F 43 E9 55 C9 D7 5B A6
+               :             81 67 CC C0 AA CD 2E C5 23
+               :           }
+               :       }
+    251 A3  129:     [3] {
+    254 30  127:       SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 28]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    256 30   12:         SEQUENCE {
+    258 06    3:           OBJECT IDENTIFIER
+               :             basicConstraints (2 5 29 19)
+               :             (X.509 id-ce (2 5 29))
+    263 01    1:           BOOLEAN TRUE
+    266 04    2:           OCTET STRING, encapsulates {
+    268 30    0:               SEQUENCE {}
+               :               }
+               :           }
+    270 30   14:         SEQUENCE {
+    272 06    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
+               :             (X.509 id-ce (2 5 29))
+    277 01    1:           BOOLEAN TRUE
+    280 04    4:           OCTET STRING, encapsulates {
+    282 03    2:               BIT STRING 6 unused bits
+               :                 '11'B
+               :               }
+               :           }
+    286 30   31:         SEQUENCE {
+    288 06    3:           OBJECT IDENTIFIER
+               :             authorityKeyIdentifier (2 5 29 35)
+               :             (X.509 id-ce (2 5 29))
+    293 04   24:           OCTET STRING, encapsulates {
+    295 30   22:               SEQUENCE {
+    297 80   20:                 [0]
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+               :                 }
+               :               }
+               :           }
+    319 30   29:         SEQUENCE {
+    321 06    3:           OBJECT IDENTIFIER
+               :             subjectKeyIdentifier (2 5 29 14)
+               :             (X.509 id-ce (2 5 29))
+    326 04   22:           OCTET STRING, encapsulates {
+    328 04   20:               OCTET STRING
+               :                 64 30 99 7D 5C DC 45 0B 99 3A 52 2F
+               :                 16 BF 58 50 DD CE 2B 18
+               :               }
+               :           }
+    350 30   31:         SEQUENCE {
+    352 06    3:           OBJECT IDENTIFIER subjectAltName (2 5 29 17)
+               :             (X.509 id-ce (2 5 29))
+    357 04   24:           OCTET STRING, encapsulates {
+    359 30   22:               SEQUENCE {
+    361 81   20:                 [1] 'DianeDSS@example.com'
+               :                 }
+               :               }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 29]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           }
+               :         }
+               :       }
+               :     }
+    383 30    9:   SEQUENCE {
+    385 06    7:     OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :       (ANSI X9.57 algorithm)
+               :     }
+    394 03   48:   BIT STRING 0 unused bits, encapsulates {
+    397 30   45:       SEQUENCE {
+    399 02   21:         INTEGER
+               :           00 A1 1A F8 17 0E 3E 5D A8 8C F4 B6
+               :           55 33 1E 4B E3 2C AC B9 5F
+    422 02   20:         INTEGER
+               :           28 4B 10 45 58 D2 1C 9D 55 35 14 18
+               :           91 B2 3F 39 DF B5 6E D3
+               :         }
+               :       }
+               :   }
+
+   DianeRSASignByCarl =
+      0 30  556: SEQUENCE {
+      4 30  405:   SEQUENCE {
+      8 A0    3:     [0] {
+     10 02    1:       INTEGER 2
+               :       }
+     13 02   16:     INTEGER
+               :       46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :       D5 9A 30 90
+     31 30   13:     SEQUENCE {
+     33 06    9:       OBJECT IDENTIFIER
+               :         sha1withRSAEncryption (1 2 840 113549 1 1 5)
+               :         (PKCS #1)
+     44 05    0:       NULL
+               :       }
+     46 30   18:     SEQUENCE {
+     48 31   16:       SET {
+     50 30   14:         SEQUENCE {
+     52 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     57 13    7:           PrintableString 'CarlRSA'
+               :           }
+               :         }
+               :       }
+     66 30   30:     SEQUENCE {
+     68 17   13:       UTCTime '990819070000Z'
+     83 17   13:       UTCTime '391231235959Z'
+               :       }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 30]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+     98 30   19:     SEQUENCE {
+    100 31   17:       SET {
+    102 30   15:         SEQUENCE {
+    104 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+    109 13    8:           PrintableString 'DianeRSA'
+               :           }
+               :         }
+               :       }
+    119 30  159:     SEQUENCE {
+    122 30   13:       SEQUENCE {
+    124 06    9:         OBJECT IDENTIFIER
+               :           rsaEncryption (1 2 840 113549 1 1 1)
+               :           (PKCS #1)
+    135 05    0:         NULL
+               :         }
+    137 03  141:       BIT STRING 0 unused bits, encapsulates {
+    141 30  137:           SEQUENCE {
+    144 02  129:             INTEGER
+               :               00 D6 FD B8 C0 70 C6 4C 25 EC EA CF
+               :               EA 7C BB A2 62 FA F0 E6 32 3A 53 FF
+               :               B1 92 5A 17 F4 20 E1 99 24 82 0A D0
+               :               F6 7C FB 44 CA 8B 27 06 F1 7E 26 03
+               :               A9 76 9D CF EC A0 2C 70 96 F2 83 42
+               :               F6 D4 B7 28 0A BB F8 BF 4A 4C 19 3F
+               :               07 DB A0 C1 60 1E B7 7E 67 F7 DE B1
+               :               C3 60 49 AC 45 D7 F8 C6 EF 08 37 21
+               :               93 47 EE F0 73 35 72 B0 02 C4 F3 11
+               :               C3 5E 47 E5 0A B7 83 F1 DB 74 69 64
+               :               8B 44 1D 95 5D CD 28 C0 85
+    276 02    3:             INTEGER 65537
+               :             }
+               :           }
+               :       }
+    281 A3  129:     [3] {
+    284 30  127:       SEQUENCE {
+    286 30   12:         SEQUENCE {
+    288 06    3:           OBJECT IDENTIFIER
+               :             basicConstraints (2 5 29 19)
+               :             (X.509 id-ce (2 5 29))
+    293 01    1:           BOOLEAN TRUE
+    296 04    2:           OCTET STRING, encapsulates {
+    298 30    0:               SEQUENCE {}
+               :               }
+               :           }
+    300 30   14:         SEQUENCE {
+    302 06    3:           OBJECT IDENTIFIER keyUsage (2 5 29 15)
+               :             (X.509 id-ce (2 5 29))
+
+
+
+Hoffman, Ed.                 Informational                     [Page 31]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    307 01    1:           BOOLEAN TRUE
+    310 04    4:           OCTET STRING, encapsulates {
+    312 03    2:               BIT STRING 5 unused bits
+               :                 '111'B
+               :               }
+               :           }
+    316 30   31:         SEQUENCE {
+    318 06    3:           OBJECT IDENTIFIER
+               :             authorityKeyIdentifier (2 5 29 35)
+               :             (X.509 id-ce (2 5 29))
+    323 04   24:           OCTET STRING, encapsulates {
+    325 30   22:               SEQUENCE {
+    327 80   20:                 [0]
+               :                   E9 E0 90 27 AC 78 20 7A 9A D3 4C F2
+               :                   42 37 4E 22 AE 9E 38 BB
+               :                 }
+               :               }
+               :           }
+    349 30   29:         SEQUENCE {
+    351 06    3:           OBJECT IDENTIFIER
+               :             subjectKeyIdentifier (2 5 29 14)
+               :             (X.509 id-ce (2 5 29))
+    356 04   22:           OCTET STRING, encapsulates {
+    358 04   20:               OCTET STRING
+               :                 8C F3 CB 75 0E 8D 31 F6 D4 29 DA 44
+               :                 92 75 B8 FE ED 4F 39 0C
+               :               }
+               :           }
+    380 30   31:         SEQUENCE {
+    382 06    3:           OBJECT IDENTIFIER subjectAltName (2 5 29 17)
+               :             (X.509 id-ce (2 5 29))
+    387 04   24:           OCTET STRING, encapsulates {
+    389 30   22:               SEQUENCE {
+    391 81   20:                 [1] 'DianeRSA@example.com'
+               :                 }
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+    413 30   13:   SEQUENCE {
+    415 06    9:     OBJECT IDENTIFIER
+               :       sha1withRSAEncryption (1 2 840 113549 1 1 5)
+               :       (PKCS #1)
+    426 05    0:     NULL
+               :     }
+    428 03  129:   BIT STRING 0 unused bits
+               :     7D A6 2C B5 78 42 D6 79 F3 31 FE F6
+
+
+
+Hoffman, Ed.                 Informational                     [Page 32]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :     42 CA 0F 13 07 92 09 1B E0 6F B0 91
+               :     18 F6 BF 4A FB CC 63 79 FB 81 BF DD
+               :     97 C7 90 6B CB 0A 37 2B 41 6A 03 98
+               :     C5 1B 3E 32 C8 45 2B 86 01 9C 1C E2
+               :     36 EF 16 C1 1A 92 B8 BE 62 FB 53 3E
+               :     49 47 0B C4 B9 E4 2B 58 A6 06 83 F0
+               :     B2 A7 BB 85 7E D5 C6 DA CE 9C 7B 31
+               :     72 D7 A2 EA 41 AB 6A C0 DD 1F B9 14
+               :     44 18 CF 84 57 66 E8 C5 E6 B8 DC 2D
+               :     B3 1F 1B 28 43 36 75 7A
+               :   }
+
+2.4.  CRLs
+
+   CarlDSSCRLForAll =
+      0 30  216: SEQUENCE {
+      3 30  153:   SEQUENCE {
+      6 30    9:     SEQUENCE {
+      8 06    7:       OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :         (ANSI X9.57 algorithm)
+               :       }
+     17 30   18:     SEQUENCE {
+     19 31   16:       SET {
+     21 30   14:         SEQUENCE {
+     23 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     28 13    7:           PrintableString 'CarlDSS'
+               :           }
+               :         }
+               :       }
+     37 17   13:     UTCTime '990827070000Z'
+     52 30  105:     SEQUENCE {
+     54 30   19:       SEQUENCE {
+     56 02    2:         INTEGER 200
+     60 17   13:         UTCTime '990822070000Z'
+               :         }
+     75 30   19:       SEQUENCE {
+     77 02    2:         INTEGER 201
+     81 17   13:         UTCTime '990822070000Z'
+               :         }
+     96 30   19:       SEQUENCE {
+     98 02    2:         INTEGER 211
+    102 17   13:         UTCTime '990822070000Z'
+               :         }
+    117 30   19:       SEQUENCE {
+    119 02    2:         INTEGER 210
+    123 17   13:         UTCTime '990822070000Z'
+               :         }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 33]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    138 30   19:       SEQUENCE {
+    140 02    2:         INTEGER 212
+    144 17   13:         UTCTime '990824070000Z'
+               :         }
+               :       }
+               :     }
+    159 30    9:   SEQUENCE {
+    161 06    7:     OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :       (ANSI X9.57 algorithm)
+               :     }
+    170 03   47:   BIT STRING 0 unused bits, encapsulates {
+    173 30   44:       SEQUENCE {
+    175 02   20:         INTEGER
+               :           7E 65 52 76 33 FE 34 73 17 D1 F7 96
+               :           F9 A0 D4 D8 6D 5C 7D 3D
+    197 02   20:         INTEGER
+               :           02 7A 5B B7 D5 5B 18 C1 CF 87 EF 7E
+               :           DA 24 F3 2A 83 9C 35 A1
+               :         }
+               :       }
+               :   }
+
+   CarlDSSCRLForCarl =
+      0 30  131: SEQUENCE {
+      3 30   68:   SEQUENCE {
+      5 30    9:     SEQUENCE {
+      7 06    7:       OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :         (ANSI X9.57 algorithm)
+               :       }
+     16 30   18:     SEQUENCE {
+     18 31   16:       SET {
+     20 30   14:         SEQUENCE {
+     22 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     27 13    7:           PrintableString 'CarlDSS'
+               :           }
+               :         }
+               :       }
+     36 17   13:     UTCTime '990825070000Z'
+     51 30   20:     SEQUENCE {
+     53 30   18:       SEQUENCE {
+     55 02    1:         INTEGER 1
+     58 17   13:         UTCTime '990822070000Z'
+               :         }
+               :       }
+               :     }
+     73 30    9:   SEQUENCE {
+     75 06    7:     OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+
+
+
+Hoffman, Ed.                 Informational                     [Page 34]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :       (ANSI X9.57 algorithm)
+               :     }
+     84 03   48:   BIT STRING 0 unused bits, encapsulates {
+     87 30   45:       SEQUENCE {
+     89 02   21:         INTEGER
+               :           00 B3 1F C5 4F 7A 3D EC 76 D5 60 F9
+               :           DE 79 22 EC 4F B0 90 FE 97
+    112 02   20:         INTEGER
+               :           5A 8B C3 84 BC 66 87 1B BF 79 82 5B
+               :           0A 5D 07 F6 BA A9 05 29
+               :         }
+               :       }
+               :   }
+
+   CarlDSSCRLEmpty =
+      0 30  109: SEQUENCE {
+      2 30   46:   SEQUENCE {
+      4 30    9:     SEQUENCE {
+      6 06    7:       OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :         (ANSI X9.57 algorithm)
+               :       }
+     15 30   18:     SEQUENCE {
+     17 31   16:       SET {
+     19 30   14:         SEQUENCE {
+     21 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     26 13    7:           PrintableString 'CarlDSS'
+               :           }
+               :         }
+               :       }
+     35 17   13:     UTCTime '990820070000Z'
+               :     }
+     50 30    9:   SEQUENCE {
+     52 06    7:     OBJECT IDENTIFIER dsaWithSha1 (1 2 840 10040 4 3)
+               :       (ANSI X9.57 algorithm)
+               :     }
+     61 03   48:   BIT STRING 0 unused bits, encapsulates {
+     64 30   45:       SEQUENCE {
+     66 02   20:         INTEGER
+               :           62 3F 36 17 31 58 2E 67 50 79 F5 09
+               :           4B 8C AD D4 6B F4 64 9F
+     88 02   21:         INTEGER
+               :           00 B5 3B 4E A1 4C 7B FD 0F C3 8D 9B
+               :           B6 FE C3 5D 6F DE 65 28 7D
+               :         }
+               :       }
+               :   }
+
+
+
+
+Hoffman, Ed.                 Informational                     [Page 35]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+   CarlRSACRLForAll =
+      0 30  307: SEQUENCE {
+      4 30  157:   SEQUENCE {
+      7 30   13:     SEQUENCE {
+      9 06    9:       OBJECT IDENTIFIER
+               :         md5withRSAEncryption (1 2 840 113549 1 1 4)
+               :         (PKCS #1)
+     20 05    0:       NULL
+               :       }
+     22 30   18:     SEQUENCE {
+     24 31   16:       SET {
+     26 30   14:         SEQUENCE {
+     28 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     33 13    7:           PrintableString 'CarlRSA'
+               :           }
+               :         }
+               :       }
+     42 17   13:     UTCTime '990827070000Z'
+     57 30  105:     SEQUENCE {
+     59 30   33:       SEQUENCE {
+     61 02   16:         INTEGER
+               :           46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :           C4 10 B3 B0
+     79 17   13:         UTCTime '990822070000Z'
+               :         }
+     94 30   33:       SEQUENCE {
+     96 02   16:         INTEGER
+               :           46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :           D5 9A 30 90
+    114 17   13:         UTCTime '990822070000Z'
+               :         }
+    129 30   33:       SEQUENCE {
+    131 02   16:         INTEGER
+               :           46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :           CD 5D 71 D0
+    149 17   13:         UTCTime '990824070000Z'
+               :         }
+               :       }
+               :     }
+    164 30   13:   SEQUENCE {
+    166 06    9:     OBJECT IDENTIFIER
+               :       md5withRSAEncryption (1 2 840 113549 1 1 4)
+               :       (PKCS #1)
+    177 05    0:     NULL
+               :     }
+    179 03  129:   BIT STRING 0 unused bits
+               :     BF B3 97 AA 53 F0 32 21 16 2B 77 92
+
+
+
+Hoffman, Ed.                 Informational                     [Page 36]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :     7A 6B BB 97 C8 DC EA F1 FA 66 16 30
+               :     0E B5 9E 5C F0 81 D4 5E B3 6E C1 88
+               :     6B 8C D4 5E C5 4D FB 47 5E 66 F3 5D
+               :     AB E5 B4 18 36 60 A8 4D 9C 3C 89 EC
+               :     6F 27 BF 35 50 71 81 C2 B9 44 5B 62
+               :     89 19 12 31 A9 7B 9A D3 CC 66 CB 11
+               :     D9 0B 10 47 77 AD 4F 22 D9 E5 7F 30
+               :     F2 5B FC 94 51 A5 58 76 3B 1F A8 46
+               :     A6 1F F6 A1 DE 55 A1 ED 31 88 69 97
+               :     0F 08 D3 D4 0C 60 5B 1E
+               :   }
+
+   CarlRSACRLForCarl =
+      0 30  236: SEQUENCE {
+      3 30   87:   SEQUENCE {
+      5 30   13:     SEQUENCE {
+      7 06    9:       OBJECT IDENTIFIER
+               :         md5withRSAEncryption (1 2 840 113549 1 1 4)
+               :         (PKCS #1)
+     18 05    0:       NULL
+               :       }
+     20 30   18:     SEQUENCE {
+     22 31   16:       SET {
+     24 30   14:         SEQUENCE {
+     26 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     31 13    7:           PrintableString 'CarlRSA'
+               :           }
+               :         }
+               :       }
+     40 17   13:     UTCTime '990825070000Z'
+     55 30   35:     SEQUENCE {
+     57 30   33:       SEQUENCE {
+     59 02   16:         INTEGER
+               :           46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :           9F F2 50 20
+     77 17   13:         UTCTime '990822070000Z'
+               :         }
+               :       }
+               :     }
+     92 30   13:   SEQUENCE {
+     94 06    9:     OBJECT IDENTIFIER
+               :       md5withRSAEncryption (1 2 840 113549 1 1 4)
+               :       (PKCS #1)
+    105 05    0:     NULL
+               :     }
+    107 03  129:   BIT STRING 0 unused bits
+               :     21 EF 21 D4 C1 1A 85 95 49 6B CA 45
+
+
+
+Hoffman, Ed.                 Informational                     [Page 37]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :     62 DC D7 09 FF A9 51 2E 8E D9 47 18
+               :     FA F8 E5 72 DD 4F ED 74 74 E3 F3 65
+               :     32 65 28 2C 9A 1D 57 E5 D5 26 06 EA
+               :     D5 E6 23 95 84 8D 0E 89 9E EE 9B 0C
+               :     2F CE 07 F7 A3 D1 6B 85 4C 0F FF E6
+               :     DD FC DC CD 73 2C 1E 7D DC B0 71 C5
+               :     4C FC 01 6E 52 57 69 1E 39 63 DF 12
+               :     22 30 C7 13 55 94 05 6E 2A 00 A9 5B
+               :     C4 2A 66 94 62 CE 36 33 C2 2B 63 47
+               :     25 9D F3 DE 70 EE 00 56
+               :   }
+
+   CarlRSACRLEmpty =
+      0 30  199: SEQUENCE {
+      3 30   50:   SEQUENCE {
+      5 30   13:     SEQUENCE {
+      7 06    9:       OBJECT IDENTIFIER
+               :         md5withRSAEncryption (1 2 840 113549 1 1 4)
+               :         (PKCS #1)
+     18 05    0:       NULL
+               :       }
+     20 30   18:     SEQUENCE {
+     22 31   16:       SET {
+     24 30   14:         SEQUENCE {
+     26 06    3:           OBJECT IDENTIFIER commonName (2 5 4 3)
+               :             (X.520 id-at (2 5 4))
+     31 13    7:           PrintableString 'CarlRSA'
+               :           }
+               :         }
+               :       }
+     40 17   13:     UTCTime '990820070000Z'
+               :     }
+     55 30   13:   SEQUENCE {
+     57 06    9:     OBJECT IDENTIFIER
+               :       md5withRSAEncryption (1 2 840 113549 1 1 4)
+               :       (PKCS #1)
+     68 05    0:     NULL
+               :     }
+     70 03  129:   BIT STRING 0 unused bits
+               :     A9 C5 21 B8 13 7C 74 F3 B5 11 EC 04
+               :     F3 20 45 86 1E 0B 6E 7F 83 6D 5F F4
+               :     34 76 06 59 25 0E 04 3D 88 09 88 81
+               :     37 C4 DC 20 98 FA 17 81 0B 37 94 AC
+               :     B4 8F 7B 51 89 14 A4 CB 72 73 14 07
+               :     BC 22 9C 40 A1 07 FC 44 7C 85 0F 0B
+               :     88 D1 EE E1 0E AF F6 16 74 AD A1 AF
+               :     C1 00 75 00 64 EA A5 9A F6 0B 08 A2
+               :     DB 95 19 5F A6 A7 B9 39 45 25 0A 0E
+
+
+
+Hoffman, Ed.                 Informational                     [Page 38]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :     F6 5E 84 E7 F8 B9 5A C9 18 C2 0E B8
+               :     A0 96 BE 81 3A 80 6D C9
+               :   }
+
+3.  Trivial Examples
+
+   This section covers examples of small CMS types.
+
+3.1.  ContentInfo with Data Type, BER
+
+   The object is a ContentInfo containing a Data object in BER format
+   that is ExContent.
+
+      0 30 NDEF: SEQUENCE {
+      2 06    9:   OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :     (PKCS #7)
+     13 A0 NDEF:   [0] {
+     15 24 NDEF:     OCTET STRING {
+     17 04    4:       OCTET STRING 'This'
+     23 04   24:       OCTET STRING ' is some sample content.'
+               :       }
+               :     }
+               :   }
+
+3.2.  ContentInfo with Data Type, DER
+
+   The object is a ContentInfo containing a Data object in DER format
+   that is ExContent.
+
+      0 30   43: SEQUENCE {
+      2 06    9:   OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :     (PKCS #7)
+     13 A0   30:   [0] {
+     15 04   28:     OCTET STRING 'This is some sample content.'
+               :     }
+               :   }
+
+4.  Signed-data
+
+4.1.  Basic Signed Content, DSS
+
+   A SignedData with no attribute certificates, signed by Alice using
+   DSS, just her certificate (not Carl's root cert), no CRL.  The
+   message is ExContent, and is included in the eContent.  There are no
+   signed or unsigned attributes.
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                     [Page 39]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+      0 30  919: SEQUENCE {
+      4 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+               :     (PKCS #7)
+     15 A0  904:   [0] {
+     19 30  900:     SEQUENCE {
+     23 02    1:       INTEGER 1
+     26 31    9:       SET {
+     28 30    7:         SEQUENCE {
+     30 06    5:           OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :             (OIW)
+               :           }
+               :         }
+     37 30   43:       SEQUENCE {
+     39 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     50 A0   30:         [0] {
+     52 04   28:           OCTET STRING 'This is some sample content.'
+               :           }
+               :         }
+     82 A0  736:       [0] {
+     86 30  732:         SEQUENCE {
+     90 30  667:           SEQUENCE {
+     94 A0    3:             [0] {
+     96 02    1:               INTEGER 2
+               :               }
+     99 02    2:             INTEGER 200
+    103 30    9:             SEQUENCE {
+    105 06    7:               OBJECT IDENTIFIER
+               :                 dsaWithSha1 (1 2 840 10040 4 3)
+               :                 (ANSI X9.57 algorithm)
+               :               }
+    114 30   18:             SEQUENCE {
+    116 31   16:               SET {
+    118 30   14:                 SEQUENCE {
+    120 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    125 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+    134 30   30:             SEQUENCE {
+    136 17   13:               UTCTime '990817011049Z'
+    151 17   13:               UTCTime '391231235959Z'
+               :               }
+    166 30   19:             SEQUENCE {
+    168 31   17:               SET {
+    170 30   15:                 SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 40]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    172 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    177 13    8:                   PrintableString 'AliceDSS'
+               :                   }
+               :                 }
+               :               }
+    187 30  438:             SEQUENCE {
+    191 30  299:               SEQUENCE {
+    195 06    7:                 OBJECT IDENTIFIER
+               :                   dsa (1 2 840 10040 4 1)
+               :                   (ANSI X9.57 algorithm)
+    204 30  286:                 SEQUENCE {
+    208 02  129:                   INTEGER
+               :                   00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+               :                   48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+               :                   53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+               :                   0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+               :                   2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+               :                   DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+               :                   9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+               :                   8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+               :                   C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+               :                   78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+               :                   B5 E4 09 96 5C F3 7E 5B DB
+    340 02   21:                   INTEGER
+               :                   00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+               :                   B8 37 21 2B 62 8B F7 93 CD
+    363 02  128:                   INTEGER
+               :                   26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+               :                   4B 59 6A 4C 76 23 39 04 02 35 5C F2
+               :                   CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+               :                   AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+               :                   7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+               :                   3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+               :                   E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+               :                   01 7C 6D 49 89 11 89 36 44 BD F8 C8
+               :                   95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+               :                   1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+               :                   D1 81 4A 60 39 BA 36 39
+               :                   }
+               :                 }
+    494 03  132:               BIT STRING 0 unused bits, encapsulates {
+    498 02  128:                   INTEGER
+               :                   5C E3 B9 5A 75 14 96 0B A9 7A DD E3
+               :                   3F A9 EC AC 5E DC BD B7 13 11 34 A6
+               :                   16 89 28 11 23 D9 34 86 67 75 75 13
+               :                   12 3D 43 5B 6F E5 51 BF FA 89 F2 A2
+
+
+
+Hoffman, Ed.                 Informational                     [Page 41]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   1B 3E 24 7D 3D 07 8D 5B 63 C8 BB 45
+               :                   A5 A0 4A E3 85 D6 CE 06 80 3F E8 23
+               :                   7E 1A F2 24 AB 53 1A B8 27 0D 1E EF
+               :                   08 BF 66 14 80 5C 62 AC 65 FA 15 8B
+               :                   F1 BB 34 D4 D2 96 37 F6 61 47 B2 C4
+               :                   32 84 F0 7E 41 40 FD 46 A7 63 4E 33
+               :                   F2 A5 E2 F4 F2 83 E5 B8
+               :                   }
+               :               }
+    629 A3  129:             [3] {
+    632 30  127:               SEQUENCE {
+    634 30   12:                 SEQUENCE {
+    636 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+    641 01    1:                   BOOLEAN TRUE
+    644 04    2:                   OCTET STRING, encapsulates {
+    646 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+    648 30   14:                 SEQUENCE {
+    650 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+    655 01    1:                   BOOLEAN TRUE
+    658 04    4:                   OCTET STRING, encapsulates {
+    660 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+    664 30   31:                 SEQUENCE {
+    666 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+               :                     (X.509 id-ce (2 5 29))
+    671 04   24:                   OCTET STRING, encapsulates {
+    673 30   22:                       SEQUENCE {
+    675 80   20:                         [0]
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+               :                         }
+               :                       }
+               :                   }
+    697 30   29:                 SEQUENCE {
+    699 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+    704 04   22:                   OCTET STRING, encapsulates {
+    706 04   20:                       OCTET STRING
+
+
+
+Hoffman, Ed.                 Informational                     [Page 42]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+               :                   13 01 E2 FD E3 97 FE CD
+               :                       }
+               :                   }
+    728 30   31:                 SEQUENCE {
+    730 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+    735 04   24:                   OCTET STRING, encapsulates {
+    737 30   22:                       SEQUENCE {
+    739 81   20:                         [1] 'AliceDSS@example.com'
+               :                         }
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+    761 30    9:           SEQUENCE {
+    763 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+    772 03   48:           BIT STRING 0 unused bits, encapsulates {
+    775 30   45:               SEQUENCE {
+    777 02   20:                 INTEGER
+               :                   55 0C A4 19 1F 42 2B 89 71 22 33 8D
+               :                   83 6A B5 3D 67 6B BF 45
+    799 02   21:                 INTEGER
+               :                   00 9F 61 53 52 54 0B 5C B2 DD DA E7
+               :                   76 1D E2 10 52 5B 43 5E BD
+               :                 }
+               :               }
+               :           }
+               :         }
+    822 31   99:       SET {
+    824 30   97:         SEQUENCE {
+    826 02    1:           INTEGER 1
+    829 30   24:           SEQUENCE {
+    831 30   18:             SEQUENCE {
+    833 31   16:               SET {
+    835 30   14:                 SEQUENCE {
+    837 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    842 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 43]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    851 02    2:             INTEGER 200
+               :             }
+    855 30    7:           SEQUENCE {
+    857 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :               (OIW)
+               :             }
+    864 30    9:           SEQUENCE {
+    866 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+    875 04   46:           OCTET STRING, encapsulates {
+    877 30   44:               SEQUENCE {
+    879 02   20:                 INTEGER
+               :                   09 91 FE EB D2 69 F5 18 B7 D7 CD 55
+               :                   F4 81 EA 2A 42 6A AD 03
+    901 02   20:                 INTEGER
+               :                   3A 07 CC C3 21 BE E1 1A 4B 7F 3E B5
+               :                   0D DB BA 1C EA BC CD 89
+               :                 }
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+               :   }
+
+4.2.  Basic Signed Content, RSA
+
+   Same as 4.1, except using RSA signatures.  A SignedData with no
+   attribute certificates, signed by Alice using RSA, just her
+   certificate (not Carl's root cert), no CRL.  The message is
+   ExContent, and is included in the eContent.  There are no signed or
+   unsigned attributes.
+
+      0 30  850: SEQUENCE {
+      4 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+               :     (PKCS #7)
+     15 A0  835:   [0] {
+     19 30  831:     SEQUENCE {
+     23 02    1:       INTEGER 1
+     26 31   11:       SET {
+     28 30    9:         SEQUENCE {
+     30 06    5:           OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :             (OIW)
+     37 05    0:           NULL
+               :           }
+               :         }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 44]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+     39 30   43:       SEQUENCE {
+     41 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     52 A0   30:         [0] {
+     54 04   28:           OCTET STRING 'This is some sample content.'
+               :           }
+               :         }
+     84 A0  560:       [0] {
+     88 30  556:         SEQUENCE {
+     92 30  405:           SEQUENCE {
+     96 A0    3:             [0] {
+     98 02    1:               INTEGER 2
+               :               }
+    101 02   16:             INTEGER
+               :               46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :               C4 10 B3 B0
+    119 30   13:             SEQUENCE {
+    121 06    9:               OBJECT IDENTIFIER
+               :                 sha1withRSAEncryption
+               :                     (1 2 840 113549 1 1 5)
+               :                 (PKCS #1)
+    132 05    0:               NULL
+               :               }
+    134 30   18:             SEQUENCE {
+    136 31   16:               SET {
+    138 30   14:                 SEQUENCE {
+    140 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    145 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+    154 30   30:             SEQUENCE {
+    156 17   13:               UTCTime '990919010847Z'
+    171 17   13:               UTCTime '391231235959Z'
+               :               }
+    186 30   19:             SEQUENCE {
+    188 31   17:               SET {
+    190 30   15:                 SEQUENCE {
+    192 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    197 13    8:                   PrintableString 'AliceRSA'
+               :                   }
+               :                 }
+               :               }
+    207 30  159:             SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 45]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    210 30   13:               SEQUENCE {
+    212 06    9:                 OBJECT IDENTIFIER
+               :                   rsaEncryption (1 2 840 113549 1 1 1)
+               :                   (PKCS #1)
+    223 05    0:                 NULL
+               :                 }
+    225 03  141:               BIT STRING 0 unused bits, encapsulates {
+    229 30  137:                   SEQUENCE {
+    232 02  129:                     INTEGER
+               :                   00 E0 89 73 39 8D D8 F5 F5 E8 87 76
+               :                   39 7F 4E B0 05 BB 53 83 DE 0F B7 AB
+               :                   DC 7D C7 75 29 0D 05 2E 6D 12 DF A6
+               :                   86 26 D4 D2 6F AA 58 29 FC 97 EC FA
+               :                   82 51 0F 30 80 BE B1 50 9E 46 44 F1
+               :                   2C BB D8 32 CF C6 68 6F 07 D9 B0 60
+               :                   AC BE EE 34 09 6A 13 F5 F7 05 05 93
+               :                   DF 5E BA 35 56 D9 61 FF 19 7F C9 81
+               :                   E6 F8 6C EA 87 40 70 EF AC 6D 2C 74
+               :                   9F 2D FA 55 3A B9 99 77 02 A6 48 52
+               :                   8C 4E F3 57 38 57 74 57 5F
+    364 02    3:                     INTEGER 65537
+               :                     }
+               :                   }
+               :               }
+    369 A3  129:             [3] {
+    372 30  127:               SEQUENCE {
+    374 30   12:                 SEQUENCE {
+    376 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+    381 01    1:                   BOOLEAN TRUE
+    384 04    2:                   OCTET STRING, encapsulates {
+    386 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+    388 30   14:                 SEQUENCE {
+    390 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+    395 01    1:                   BOOLEAN TRUE
+    398 04    4:                   OCTET STRING, encapsulates {
+    400 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+    404 30   31:                 SEQUENCE {
+    406 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+
+
+
+Hoffman, Ed.                 Informational                     [Page 46]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                     (X.509 id-ce (2 5 29))
+    411 04   24:                   OCTET STRING, encapsulates {
+    413 30   22:                       SEQUENCE {
+    415 80   20:                         [0]
+               :                   E9 E0 90 27 AC 78 20 7A 9A D3 4C F2
+               :                   42 37 4E 22 AE 9E 38 BB
+               :                         }
+               :                       }
+               :                   }
+    437 30   29:                 SEQUENCE {
+    439 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+    444 04   22:                   OCTET STRING, encapsulates {
+    446 04   20:                       OCTET STRING
+               :                   77 D2 B4 D1 B7 4C 8A 8A A3 CE 45 9D
+               :                   CE EC 3C A0 3A E3 FF 50
+               :                       }
+               :                   }
+    468 30   31:                 SEQUENCE {
+    470 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+    475 04   24:                   OCTET STRING, encapsulates {
+    477 30   22:                       SEQUENCE {
+    479 81   20:                         [1] 'AliceRSA@example.com'
+               :                         }
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+    501 30   13:           SEQUENCE {
+    503 06    9:             OBJECT IDENTIFIER
+               :               sha1withRSAEncryption
+               :                   (1 2 840 113549 1 1 5)
+               :               (PKCS #1)
+    514 05    0:             NULL
+               :             }
+    516 03  129:           BIT STRING 0 unused bits
+               :             3E 70 47 A8 48 CC 13 58 8F CA 51 71
+               :             6B 4E 36 18 5D 04 7E 80 B1 8D 4D CC
+               :             CA A3 8F CC 7D 56 C8 BC CF 6E B3 1C
+               :             59 A9 20 AA 05 81 A8 4E 25 AD A7 70
+               :             14 75 2F F5 C7 9B D1 0E E9 63 D2 64
+               :             B7 C6 66 6E 73 21 54 DF F4 BA 25 5D
+               :             7D 49 D3 94 6B 22 36 74 73 B8 4A EC
+               :             2F 64 ED D3 3D D2 A7 42 C5 E8 37 8A
+
+
+
+Hoffman, Ed.                 Informational                     [Page 47]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :             B4 DB 9F 67 E4 BD 9F F9 FE 74 EF EA
+               :             F9 EE 63 6A D8 3F 4B 25 09 B5 D8 1A
+               :             76 AE EB 9B DB 49 B0 22
+               :           }
+               :         }
+    648 31  203:       SET {
+    651 30  200:         SEQUENCE {
+    654 02    1:           INTEGER 1
+    657 30   38:           SEQUENCE {
+    659 30   18:             SEQUENCE {
+    661 31   16:               SET {
+    663 30   14:                 SEQUENCE {
+    665 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    670 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+    679 02   16:             INTEGER
+               :               46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :               C4 10 B3 B0
+               :             }
+    697 30    9:           SEQUENCE {
+    699 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :               (OIW)
+    706 05    0:             NULL
+               :             }
+    708 30   13:           SEQUENCE {
+    710 06    9:             OBJECT IDENTIFIER
+               :               rsaEncryption (1 2 840 113549 1 1 1)
+               :               (PKCS #1)
+    721 05    0:             NULL
+               :             }
+    723 04  128:           OCTET STRING
+               :             2F 23 82 D2 F3 09 5F B8 0C 58 EB 4E
+               :             9D BF 89 9A 81 E5 75 C4 91 3D D3 D0
+               :             D5 7B B6 D5 FE 94 A1 8A AC E3 C4 84
+               :             F5 CD 60 4E 27 95 F6 CF 00 86 76 75
+               :             3F 2B F0 E7 D4 02 67 A7 F5 C7 8D 16
+               :             04 A5 B3 B5 E7 D9 32 F0 24 EF E7 20
+               :             44 D5 9F 07 C5 53 24 FA CE 01 1D 0F
+               :             17 13 A7 2A 95 9D 2B E4 03 95 14 0B
+               :             E9 39 0D BA CE 6E 9C 9E 0C E8 98 E6
+               :             55 13 D4 68 6F D0 07 D7 A2 B1 62 4C
+               :             E3 8F AF FD E0 D5 5D C7
+               :           }
+               :         }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 48]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :       }
+               :     }
+               :   }
+
+4.3.  Basic Signed Content, Detached Content
+
+   Same as 4.1, except with no eContent.  A SignedData with no attribute
+   certificates, signed by Alice using DSS, just her certificate (not
+   Carl's root cert), no CRL.  The message is ExContent, but the
+   eContent is not included.  There are no signed or unsigned
+   attributes.
+
+      0 30  887: SEQUENCE {
+      4 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+               :     (PKCS #7)
+     15 A0  872:   [0] {
+     19 30  868:     SEQUENCE {
+     23 02    1:       INTEGER 1
+     26 31    9:       SET {
+     28 30    7:         SEQUENCE {
+     30 06    5:           OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :             (OIW)
+               :           }
+               :         }
+     37 30   11:       SEQUENCE {
+     39 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+               :         }
+     50 A0  736:       [0] {
+     54 30  732:         SEQUENCE {
+     58 30  667:           SEQUENCE {
+     62 A0    3:             [0] {
+     64 02    1:               INTEGER 2
+               :               }
+     67 02    2:             INTEGER 200
+     71 30    9:             SEQUENCE {
+     73 06    7:               OBJECT IDENTIFIER
+               :                 dsaWithSha1 (1 2 840 10040 4 3)
+               :                 (ANSI X9.57 algorithm)
+               :               }
+     82 30   18:             SEQUENCE {
+     84 31   16:               SET {
+     86 30   14:                 SEQUENCE {
+     88 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+     93 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 49]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                 }
+               :               }
+    102 30   30:             SEQUENCE {
+    104 17   13:               UTCTime '990817011049Z'
+    119 17   13:               UTCTime '391231235959Z'
+               :               }
+    134 30   19:             SEQUENCE {
+    136 31   17:               SET {
+    138 30   15:                 SEQUENCE {
+    140 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    145 13    8:                   PrintableString 'AliceDSS'
+               :                   }
+               :                 }
+               :               }
+    155 30  438:             SEQUENCE {
+    159 30  299:               SEQUENCE {
+    163 06    7:                 OBJECT IDENTIFIER
+               :                   dsa (1 2 840 10040 4 1)
+               :                   (ANSI X9.57 algorithm)
+    172 30  286:                 SEQUENCE {
+    176 02  129:                   INTEGER
+               :                   00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+               :                   48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+               :                   53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+               :                   0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+               :                   2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+               :                   DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+               :                   9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+               :                   8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+               :                   C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+               :                   78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+               :                   B5 E4 09 96 5C F3 7E 5B DB
+    308 02   21:                   INTEGER
+               :                   00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+               :                   B8 37 21 2B 62 8B F7 93 CD
+    331 02  128:                   INTEGER
+               :                   26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+               :                   4B 59 6A 4C 76 23 39 04 02 35 5C F2
+               :                   CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+               :                   AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+               :                   7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+               :                   3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+               :                   E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+               :                   01 7C 6D 49 89 11 89 36 44 BD F8 C8
+               :                   95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+               :                   1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+
+
+
+Hoffman, Ed.                 Informational                     [Page 50]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   D1 81 4A 60 39 BA 36 39
+               :                   }
+               :                 }
+    462 03  132:               BIT STRING 0 unused bits, encapsulates {
+    466 02  128:                   INTEGER
+               :                   5C E3 B9 5A 75 14 96 0B A9 7A DD E3
+               :                   3F A9 EC AC 5E DC BD B7 13 11 34 A6
+               :                   16 89 28 11 23 D9 34 86 67 75 75 13
+               :                   12 3D 43 5B 6F E5 51 BF FA 89 F2 A2
+               :                   1B 3E 24 7D 3D 07 8D 5B 63 C8 BB 45
+               :                   A5 A0 4A E3 85 D6 CE 06 80 3F E8 23
+               :                   7E 1A F2 24 AB 53 1A B8 27 0D 1E EF
+               :                   08 BF 66 14 80 5C 62 AC 65 FA 15 8B
+               :                   F1 BB 34 D4 D2 96 37 F6 61 47 B2 C4
+               :                   32 84 F0 7E 41 40 FD 46 A7 63 4E 33
+               :                   F2 A5 E2 F4 F2 83 E5 B8
+               :                   }
+               :               }
+    597 A3  129:             [3] {
+    600 30  127:               SEQUENCE {
+    602 30   12:                 SEQUENCE {
+    604 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+    609 01    1:                   BOOLEAN TRUE
+    612 04    2:                   OCTET STRING, encapsulates {
+    614 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+    616 30   14:                 SEQUENCE {
+    618 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+    623 01    1:                   BOOLEAN TRUE
+    626 04    4:                   OCTET STRING, encapsulates {
+    628 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+    632 30   31:                 SEQUENCE {
+    634 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+               :                     (X.509 id-ce (2 5 29))
+    639 04   24:                   OCTET STRING, encapsulates {
+    641 30   22:                       SEQUENCE {
+    643 80   20:                         [0]
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+
+
+
+Hoffman, Ed.                 Informational                     [Page 51]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                         }
+               :                       }
+               :                   }
+    665 30   29:                 SEQUENCE {
+    667 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+    672 04   22:                   OCTET STRING, encapsulates {
+    674 04   20:                       OCTET STRING
+               :                   BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+               :                   13 01 E2 FD E3 97 FE CD
+               :                       }
+               :                   }
+    696 30   31:                 SEQUENCE {
+    698 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+    703 04   24:                   OCTET STRING, encapsulates {
+    705 30   22:                       SEQUENCE {
+    707 81   20:                         [1] 'AliceDSS@example.com'
+               :                         }
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+    729 30    9:           SEQUENCE {
+    731 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+    740 03   48:           BIT STRING 0 unused bits, encapsulates {
+    743 30   45:               SEQUENCE {
+    745 02   20:                 INTEGER
+               :                   55 0C A4 19 1F 42 2B 89 71 22 33 8D
+               :                   83 6A B5 3D 67 6B BF 45
+    767 02   21:                 INTEGER
+               :                   00 9F 61 53 52 54 0B 5C B2 DD DA E7
+               :                   76 1D E2 10 52 5B 43 5E BD
+               :                 }
+               :               }
+               :           }
+               :         }
+    790 31   99:       SET {
+    792 30   97:         SEQUENCE {
+    794 02    1:           INTEGER 1
+    797 30   24:           SEQUENCE {
+    799 30   18:             SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 52]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    801 31   16:               SET {
+    803 30   14:                 SEQUENCE {
+    805 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    810 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+    819 02    2:             INTEGER 200
+               :             }
+    823 30    7:           SEQUENCE {
+    825 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :               (OIW)
+               :             }
+    832 30    9:           SEQUENCE {
+    834 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+    843 04   46:           OCTET STRING, encapsulates {
+    845 30   44:               SEQUENCE {
+    847 02   20:                 INTEGER
+               :                   06 FB C7 2A 24 D5 34 89 F7 8B B5 FD
+               :                   73 24 A5 86 C8 0F 5A 6C
+    869 02   20:                 INTEGER
+               :                   66 69 19 BC 68 58 D1 8D B1 9D 52 3F
+               :                   DA 14 88 0D FD C9 A1 B8
+               :                 }
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+               :   }
+
+4.4.  Fancier Signed Content
+
+   Same as 4.1, but includes Carl's root cert, Carl's CRL, some signed
+   and unsigned attributes (Countersignature by Diane).  A SignedData
+   with no attribute certificates, signed by Alice using DSS, her
+   certificate and Carl's root cert, Carl's DSS CRL.  The message is
+   ExContent, and is included in the eContent.  The signed attributes
+   are Content Type, Message Digest and Signing Time; the unsigned
+   attributes are content hint and counter signature.  The message
+   includes also Alice's RSA certificate.
+
+
+
+
+
+Hoffman, Ed.                 Informational                     [Page 53]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+      0 30 2829: SEQUENCE {
+      4 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+               :     (PKCS #7)
+     15 A0 2814:   [0] {
+     19 30 2810:     SEQUENCE {
+     23 02    1:       INTEGER 1
+     26 31    9:       SET {
+     28 30    7:         SEQUENCE {
+     30 06    5:           OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :             (OIW)
+               :           }
+               :         }
+     37 30   43:       SEQUENCE {
+     39 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     50 A0   30:         [0] {
+     52 04   28:           OCTET STRING 'This is some sample content.'
+               :           }
+               :         }
+     82 A0 1967:       [0] {
+     86 30  556:         SEQUENCE {
+     90 30  405:           SEQUENCE {
+     94 A0    3:             [0] {
+     96 02    1:               INTEGER 2
+               :               }
+     99 02   16:             INTEGER
+               :               46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :               C4 10 B3 B0
+    117 30   13:             SEQUENCE {
+    119 06    9:               OBJECT IDENTIFIER
+               :                 sha1withRSAEncryption
+               :                     (1 2 840 113549 1 1 5)
+               :                 (PKCS #1)
+    130 05    0:               NULL
+               :               }
+    132 30   18:             SEQUENCE {
+    134 31   16:               SET {
+    136 30   14:                 SEQUENCE {
+    138 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    143 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+    152 30   30:             SEQUENCE {
+    154 17   13:               UTCTime '990919010847Z'
+    169 17   13:               UTCTime '391231235959Z'
+
+
+
+Hoffman, Ed.                 Informational                     [Page 54]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :               }
+    184 30   19:             SEQUENCE {
+    186 31   17:               SET {
+    188 30   15:                 SEQUENCE {
+    190 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    195 13    8:                   PrintableString 'AliceRSA'
+               :                   }
+               :                 }
+               :               }
+    205 30  159:             SEQUENCE {
+    208 30   13:               SEQUENCE {
+    210 06    9:                 OBJECT IDENTIFIER
+               :                   rsaEncryption (1 2 840 113549 1 1 1)
+               :                   (PKCS #1)
+    221 05    0:                 NULL
+               :                 }
+    223 03  141:               BIT STRING 0 unused bits, encapsulates {
+    227 30  137:                   SEQUENCE {
+    230 02  129:                     INTEGER
+               :                   00 E0 89 73 39 8D D8 F5 F5 E8 87 76
+               :                   39 7F 4E B0 05 BB 53 83 DE 0F B7 AB
+               :                   DC 7D C7 75 29 0D 05 2E 6D 12 DF A6
+               :                   86 26 D4 D2 6F AA 58 29 FC 97 EC FA
+               :                   82 51 0F 30 80 BE B1 50 9E 46 44 F1
+               :                   2C BB D8 32 CF C6 68 6F 07 D9 B0 60
+               :                   AC BE EE 34 09 6A 13 F5 F7 05 05 93
+               :                   DF 5E BA 35 56 D9 61 FF 19 7F C9 81
+               :                   E6 F8 6C EA 87 40 70 EF AC 6D 2C 74
+               :                   9F 2D FA 55 3A B9 99 77 02 A6 48 52
+               :                   8C 4E F3 57 38 57 74 57 5F
+    362 02    3:                     INTEGER 65537
+               :                     }
+               :                   }
+               :               }
+    367 A3  129:             [3] {
+    370 30  127:               SEQUENCE {
+    372 30   12:                 SEQUENCE {
+    374 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+    379 01    1:                   BOOLEAN TRUE
+    382 04    2:                   OCTET STRING, encapsulates {
+    384 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+    386 30   14:                 SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 55]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    388 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+    393 01    1:                   BOOLEAN TRUE
+    396 04    4:                   OCTET STRING, encapsulates {
+    398 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+    402 30   31:                 SEQUENCE {
+    404 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+               :                     (X.509 id-ce (2 5 29))
+    409 04   24:                   OCTET STRING, encapsulates {
+    411 30   22:                       SEQUENCE {
+    413 80   20:                         [0]
+               :                   E9 E0 90 27 AC 78 20 7A 9A D3 4C F2
+               :                   42 37 4E 22 AE 9E 38 BB
+               :                         }
+               :                       }
+               :                   }
+    435 30   29:                 SEQUENCE {
+    437 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+    442 04   22:                   OCTET STRING, encapsulates {
+    444 04   20:                       OCTET STRING
+               :                   77 D2 B4 D1 B7 4C 8A 8A A3 CE 45 9D
+               :                   CE EC 3C A0 3A E3 FF 50
+               :                       }
+               :                   }
+    466 30   31:                 SEQUENCE {
+    468 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+    473 04   24:                   OCTET STRING, encapsulates {
+    475 30   22:                       SEQUENCE {
+    477 81   20:                         [1] 'AliceRSA@example.com'
+               :                         }
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+    499 30   13:           SEQUENCE {
+    501 06    9:             OBJECT IDENTIFIER
+               :               sha1withRSAEncryption
+               :                   (1 2 840 113549 1 1 5)
+
+
+
+Hoffman, Ed.                 Informational                     [Page 56]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :               (PKCS #1)
+    512 05    0:             NULL
+               :             }
+    514 03  129:           BIT STRING 0 unused bits
+               :             3E 70 47 A8 48 CC 13 58 8F CA 51 71
+               :             6B 4E 36 18 5D 04 7E 80 B1 8D 4D CC
+               :             CA A3 8F CC 7D 56 C8 BC CF 6E B3 1C
+               :             59 A9 20 AA 05 81 A8 4E 25 AD A7 70
+               :             14 75 2F F5 C7 9B D1 0E E9 63 D2 64
+               :             B7 C6 66 6E 73 21 54 DF F4 BA 25 5D
+               :             7D 49 D3 94 6B 22 36 74 73 B8 4A EC
+               :             2F 64 ED D3 3D D2 A7 42 C5 E8 37 8A
+               :             B4 DB 9F 67 E4 BD 9F F9 FE 74 EF EA
+               :             F9 EE 63 6A D8 3F 4B 25 09 B5 D8 1A
+               :             76 AE EB 9B DB 49 B0 22
+               :           }
+    646 30  667:         SEQUENCE {
+    650 30  602:           SEQUENCE {
+    654 A0    3:             [0] {
+    656 02    1:               INTEGER 2
+               :               }
+    659 02    1:             INTEGER 1
+    662 30    9:             SEQUENCE {
+    664 06    7:               OBJECT IDENTIFIER
+               :                 dsaWithSha1 (1 2 840 10040 4 3)
+               :                 (ANSI X9.57 algorithm)
+               :               }
+    673 30   18:             SEQUENCE {
+    675 31   16:               SET {
+    677 30   14:                 SEQUENCE {
+    679 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    684 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+    693 30   30:             SEQUENCE {
+    695 17   13:               UTCTime '990816225050Z'
+    710 17   13:               UTCTime '391231235959Z'
+               :               }
+    725 30   18:             SEQUENCE {
+    727 31   16:               SET {
+    729 30   14:                 SEQUENCE {
+    731 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    736 13    7:                   PrintableString 'CarlDSS'
+
+
+
+Hoffman, Ed.                 Informational                     [Page 57]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   }
+               :                 }
+               :               }
+    745 30  439:             SEQUENCE {
+    749 30  299:               SEQUENCE {
+    753 06    7:                 OBJECT IDENTIFIER
+               :                   dsa (1 2 840 10040 4 1)
+               :                   (ANSI X9.57 algorithm)
+    762 30  286:                 SEQUENCE {
+    766 02  129:                   INTEGER
+               :                   00 B6 49 18 3E 8A 44 C1 29 71 94 4C
+               :                   01 C4 12 C1 7A 79 CB 54 4D AB 1E 81
+               :                   FB C6 4C B3 0E 94 09 06 EB 01 D4 B1
+               :                   C8 71 4B C7 45 C0 50 25 5D 9C FC DA
+               :                   E4 6D D3 E2 86 48 84 82 7D BA 15 95
+               :                   4A 16 F6 46 ED DD F6 98 D2 BB 7E 8A
+               :                   0A 8A BA 16 7B B9 50 01 48 93 8B EB
+               :                   25 15 51 97 55 DC 8F 53 0E 10 A9 50
+               :                   FC 70 B7 CD 30 54 FD DA DE A8 AA 22
+               :                   B5 A1 AF 8B CC 02 88 E7 8B 70 5F B9
+               :                   AD E1 08 D4 6D 29 2D D6 E9
+    898 02   21:                   INTEGER
+               :                   00 DD C1 2F DF 53 CE 0B 34 60 77 3E
+               :                   02 A4 BF 8A 5D 98 B9 10 D5
+    921 02  128:                   INTEGER
+               :                   0C EE 57 9B 4B BD DA B6 07 6A 74 37
+               :                   4F 55 7F 9D ED BC 61 0D EB 46 59 3C
+               :                   56 0B 2B 5B 0C 91 CE A5 62 52 69 CA
+               :                   E1 6D 3E BD BF FE E1 B7 B9 2B 61 3C
+               :                   AD CB AE 45 E3 06 AC 8C 22 9D 9C 44
+               :                   87 0B C7 CD F0 1C D9 B5 4E 5D 73 DE
+               :                   AF 0E C9 1D 5A 51 F5 4F 44 79 35 5A
+               :                   73 AA 7F 46 51 1F A9 42 16 9C 48 EB
+               :                   8A 79 61 B4 D5 2F 53 22 44 63 1F 86
+               :                   B8 A3 58 06 25 F8 29 C0 EF BA E0 75
+               :                   F0 42 C4 63 65 52 9B 0A
+               :                   }
+               :                 }
+   1052 03  133:               BIT STRING 0 unused bits, encapsulates {
+   1056 02  129:                   INTEGER
+               :                   00 99 87 74 27 03 66 A0 B1 C0 AD DC
+               :                   2C 75 BB E1 6C 44 9C DA 21 6D 4D 47
+               :                   6D B1 62 09 E9 D8 AE 1E F2 3A B4 94
+               :                   B1 A3 8E 7A 9B 71 4E 00 94 C9 B4 25
+               :                   4E B9 60 96 19 24 01 F3 62 0C FE 75
+               :                   C0 FB CE D8 68 00 E3 FD D5 70 4F DF
+               :                   23 96 19 06 94 F4 B1 61 8F 3A 57 B1
+               :                   08 11 A4 0B 26 25 F0 52 76 81 EA 0B
+
+
+
+Hoffman, Ed.                 Informational                     [Page 58]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   62 0D 95 2A E6 86 BA 72 B2 A7 50 83
+               :                   0B AA 27 CD 1B A9 4D 89 9A D7 8D 18
+               :                   39 84 3F 8B C5 56 4D 80 7A
+               :                   }
+               :               }
+   1188 A3   66:             [3] {
+   1190 30   64:               SEQUENCE {
+   1192 30   15:                 SEQUENCE {
+   1194 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+   1199 01    1:                   BOOLEAN TRUE
+   1202 04    5:                   OCTET STRING, encapsulates {
+   1204 30    3:                       SEQUENCE {
+   1206 01    1:                         BOOLEAN TRUE
+               :                         }
+               :                       }
+               :                   }
+   1209 30   14:                 SEQUENCE {
+   1211 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+   1216 01    1:                   BOOLEAN TRUE
+   1219 04    4:                   OCTET STRING, encapsulates {
+   1221 03    2:                       BIT STRING 1 unused bits
+               :                         '1100001'B
+               :                       }
+               :                   }
+   1225 30   29:                 SEQUENCE {
+   1227 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+   1232 04   22:                   OCTET STRING, encapsulates {
+   1234 04   20:                       OCTET STRING
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+   1256 30    9:           SEQUENCE {
+   1258 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+   1267 03   48:           BIT STRING 0 unused bits, encapsulates {
+   1270 30   45:               SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 59]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+   1272 02   20:                 INTEGER
+               :                   6B A9 F0 4E 7A 5A 79 E3 F9 BE 3D 2B
+               :                   C9 06 37 E9 11 17 A1 13
+   1294 02   21:                 INTEGER
+               :                   00 8F 34 69 2A 8B B1 3C 03 79 94 32
+               :                   4D 12 1F CE 89 FB 46 B2 3B
+               :                 }
+               :               }
+               :           }
+   1317 30  732:         SEQUENCE {
+   1321 30  667:           SEQUENCE {
+   1325 A0    3:             [0] {
+   1327 02    1:               INTEGER 2
+               :               }
+   1330 02    2:             INTEGER 200
+   1334 30    9:             SEQUENCE {
+   1336 06    7:               OBJECT IDENTIFIER
+               :                 dsaWithSha1 (1 2 840 10040 4 3)
+               :                 (ANSI X9.57 algorithm)
+               :               }
+   1345 30   18:             SEQUENCE {
+   1347 31   16:               SET {
+   1349 30   14:                 SEQUENCE {
+   1351 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+   1356 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+   1365 30   30:             SEQUENCE {
+   1367 17   13:               UTCTime '990817011049Z'
+   1382 17   13:               UTCTime '391231235959Z'
+               :               }
+   1397 30   19:             SEQUENCE {
+   1399 31   17:               SET {
+   1401 30   15:                 SEQUENCE {
+   1403 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+   1408 13    8:                   PrintableString 'AliceDSS'
+               :                   }
+               :                 }
+               :               }
+   1418 30  438:             SEQUENCE {
+   1422 30  299:               SEQUENCE {
+   1426 06    7:                 OBJECT IDENTIFIER
+               :                   dsa (1 2 840 10040 4 1)
+
+
+
+Hoffman, Ed.                 Informational                     [Page 60]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   (ANSI X9.57 algorithm)
+   1435 30  286:                 SEQUENCE {
+   1439 02  129:                   INTEGER
+               :                   00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+               :                   48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+               :                   53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+               :                   0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+               :                   2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+               :                   DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+               :                   9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+               :                   8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+               :                   C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+               :                   78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+               :                   B5 E4 09 96 5C F3 7E 5B DB
+   1571 02   21:                   INTEGER
+               :                   00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+               :                   B8 37 21 2B 62 8B F7 93 CD
+   1594 02  128:                   INTEGER
+               :                   26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+               :                   4B 59 6A 4C 76 23 39 04 02 35 5C F2
+               :                   CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+               :                   AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+               :                   7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+               :                   3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+               :                   E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+               :                   01 7C 6D 49 89 11 89 36 44 BD F8 C8
+               :                   95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+               :                   1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+               :                   D1 81 4A 60 39 BA 36 39
+               :                   }
+               :                 }
+   1725 03  132:               BIT STRING 0 unused bits, encapsulates {
+   1729 02  128:                   INTEGER
+               :                   5C E3 B9 5A 75 14 96 0B A9 7A DD E3
+               :                   3F A9 EC AC 5E DC BD B7 13 11 34 A6
+               :                   16 89 28 11 23 D9 34 86 67 75 75 13
+               :                   12 3D 43 5B 6F E5 51 BF FA 89 F2 A2
+               :                   1B 3E 24 7D 3D 07 8D 5B 63 C8 BB 45
+               :                   A5 A0 4A E3 85 D6 CE 06 80 3F E8 23
+               :                   7E 1A F2 24 AB 53 1A B8 27 0D 1E EF
+               :                   08 BF 66 14 80 5C 62 AC 65 FA 15 8B
+               :                   F1 BB 34 D4 D2 96 37 F6 61 47 B2 C4
+               :                   32 84 F0 7E 41 40 FD 46 A7 63 4E 33
+               :                   F2 A5 E2 F4 F2 83 E5 B8
+               :                   }
+               :               }
+   1860 A3  129:             [3] {
+   1863 30  127:               SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 61]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+   1865 30   12:                 SEQUENCE {
+   1867 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+   1872 01    1:                   BOOLEAN TRUE
+   1875 04    2:                   OCTET STRING, encapsulates {
+   1877 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+   1879 30   14:                 SEQUENCE {
+   1881 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+   1886 01    1:                   BOOLEAN TRUE
+   1889 04    4:                   OCTET STRING, encapsulates {
+   1891 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+   1895 30   31:                 SEQUENCE {
+   1897 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+               :                     (X.509 id-ce (2 5 29))
+   1902 04   24:                   OCTET STRING, encapsulates {
+   1904 30   22:                       SEQUENCE {
+   1906 80   20:                         [0]
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+               :                         }
+               :                       }
+               :                   }
+   1928 30   29:                 SEQUENCE {
+   1930 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+   1935 04   22:                   OCTET STRING, encapsulates {
+   1937 04   20:                       OCTET STRING
+               :                   BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+               :                   13 01 E2 FD E3 97 FE CD
+               :                       }
+               :                   }
+   1959 30   31:                 SEQUENCE {
+   1961 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+   1966 04   24:                   OCTET STRING, encapsulates {
+   1968 30   22:                       SEQUENCE {
+   1970 81   20:                         [1] 'AliceDSS@example.com'
+
+
+
+Hoffman, Ed.                 Informational                     [Page 62]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                         }
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+   1992 30    9:           SEQUENCE {
+   1994 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+   2003 03   48:           BIT STRING 0 unused bits, encapsulates {
+   2006 30   45:               SEQUENCE {
+   2008 02   20:                 INTEGER
+               :                   55 0C A4 19 1F 42 2B 89 71 22 33 8D
+               :                   83 6A B5 3D 67 6B BF 45
+   2030 02   21:                 INTEGER
+               :                   00 9F 61 53 52 54 0B 5C B2 DD DA E7
+               :                   76 1D E2 10 52 5B 43 5E BD
+               :                 }
+               :               }
+               :           }
+               :         }
+   2053 A1  219:       [1] {
+   2056 30  216:         SEQUENCE {
+   2059 30  153:           SEQUENCE {
+   2062 30    9:             SEQUENCE {
+   2064 06    7:               OBJECT IDENTIFIER
+               :                 dsaWithSha1 (1 2 840 10040 4 3)
+               :                 (ANSI X9.57 algorithm)
+               :               }
+   2073 30   18:             SEQUENCE {
+   2075 31   16:               SET {
+   2077 30   14:                 SEQUENCE {
+   2079 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+   2084 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+   2093 17   13:             UTCTime '990827070000Z'
+   2108 30  105:             SEQUENCE {
+   2110 30   19:               SEQUENCE {
+   2112 02    2:                 INTEGER 200
+   2116 17   13:                 UTCTime '990822070000Z'
+               :                 }
+   2131 30   19:               SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 63]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+   2133 02    2:                 INTEGER 201
+   2137 17   13:                 UTCTime '990822070000Z'
+               :                 }
+   2152 30   19:               SEQUENCE {
+   2154 02    2:                 INTEGER 211
+   2158 17   13:                 UTCTime '990822070000Z'
+               :                 }
+   2173 30   19:               SEQUENCE {
+   2175 02    2:                 INTEGER 210
+   2179 17   13:                 UTCTime '990822070000Z'
+               :                 }
+   2194 30   19:               SEQUENCE {
+   2196 02    2:                 INTEGER 212
+   2200 17   13:                 UTCTime '990824070000Z'
+               :                 }
+               :               }
+               :             }
+   2215 30    9:           SEQUENCE {
+   2217 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+   2226 03   47:           BIT STRING 0 unused bits, encapsulates {
+   2229 30   44:               SEQUENCE {
+   2231 02   20:                 INTEGER
+               :                   7E 65 52 76 33 FE 34 73 17 D1 F7 96
+               :                   F9 A0 D4 D8 6D 5C 7D 3D
+   2253 02   20:                 INTEGER
+               :                   02 7A 5B B7 D5 5B 18 C1 CF 87 EF 7E
+               :                   DA 24 F3 2A 83 9C 35 A1
+               :                 }
+               :               }
+               :           }
+               :         }
+   2275 31  554:       SET {
+   2279 30  550:         SEQUENCE {
+   2283 02    1:           INTEGER 1
+   2286 30   24:           SEQUENCE {
+   2288 30   18:             SEQUENCE {
+   2290 31   16:               SET {
+   2292 30   14:                 SEQUENCE {
+   2294 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+   2299 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 64]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+   2308 02    2:             INTEGER 200
+               :             }
+   2312 30    7:           SEQUENCE {
+   2314 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :               (OIW)
+               :             }
+   2321 A0   93:           [0] {
+   2323 30   24:             SEQUENCE {
+   2325 06    9:               OBJECT IDENTIFIER
+               :                 contentType (1 2 840 113549 1 9 3)
+               :                 (PKCS #9 (1 2 840 113549 1 9))
+   2336 31   11:               SET {
+   2338 06    9:                 OBJECT IDENTIFIER
+               :                   data (1 2 840 113549 1 7 1)
+               :                   (PKCS #7)
+               :                 }
+               :               }
+   2349 30   28:             SEQUENCE {
+   2351 06    9:               OBJECT IDENTIFIER
+               :                 signingTime (1 2 840 113549 1 9 5)
+               :                 (PKCS #9 (1 2 840 113549 1 9))
+   2362 31   15:               SET {
+   2364 17   13:                 UTCTime '030514153900Z'
+               :                 }
+               :               }
+   2379 30   35:             SEQUENCE {
+   2381 06    9:               OBJECT IDENTIFIER
+               :                 messageDigest (1 2 840 113549 1 9 4)
+               :                 (PKCS #9 (1 2 840 113549 1 9))
+   2392 31   22:               SET {
+   2394 04   20:                 OCTET STRING
+               :                   40 6A EC 08 52 79 BA 6E 16 02 2D 9E
+               :                   06 29 C0 22 96 87 DD 48
+               :                 }
+               :               }
+               :             }
+   2416 30    9:           SEQUENCE {
+   2418 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+   2427 04   46:           OCTET STRING, encapsulates {
+   2429 30   44:               SEQUENCE {
+   2431 02   20:                 INTEGER
+               :                   3B A5 E0 4A DB 6D 58 E0 19 D1 00 1C
+               :                   4F 44 9A 57 7A 71 66 68
+   2453 02   20:                 INTEGER
+               :                   1A 11 98 D6 1F 1F AF 34 81 01 DE BE
+
+
+
+Hoffman, Ed.                 Informational                     [Page 65]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   8B DC B6 A8 6A 91 69 13
+               :                 }
+               :               }
+   2475 A1  354:           [1] {
+   2479 30   62:             SEQUENCE {
+   2481 06   11:               OBJECT IDENTIFIER
+               :                 id-aa-contentHint
+               :                     (1 2 840 113549 1 9 16 2 4)
+               :                 (S/MIME Authenticated Attributes
+               :                     (1 2 840 113549 1 9 16 2))
+   2494 31   47:               SET {
+   2496 30   45:                 SEQUENCE {
+   2498 0C   32:                   UTF8String
+               :                   'Content Hints Description Buffer'
+   2532 06    9:                   OBJECT IDENTIFIER
+               :                     data (1 2 840 113549 1 7 1)
+               :                     (PKCS #7)
+               :                   }
+               :                 }
+               :               }
+   2543 30  286:             SEQUENCE {
+   2547 06    9:               OBJECT IDENTIFIER
+               :                 countersignature (1 2 840 113549 1 9 6)
+               :                 (PKCS #9 (1 2 840 113549 1 9))
+   2558 31  271:               SET {
+   2562 30  267:                 SEQUENCE {
+   2566 02    1:                   INTEGER 1
+   2569 30   38:                   SEQUENCE {
+   2571 30   18:                     SEQUENCE {
+   2573 31   16:                       SET {
+   2575 30   14:                         SEQUENCE {
+   2577 06    3:                           OBJECT IDENTIFIER
+               :                             commonName (2 5 4 3)
+               :                             (X.520 id-at (2 5 4))
+   2582 13    7:                           PrintableString 'CarlRSA'
+               :                           }
+               :                         }
+               :                       }
+   2591 02   16:                     INTEGER
+               :                   46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :                   C4 10 B3 B0
+               :                     }
+   2609 30    7:                   SEQUENCE {
+   2611 06    5:                     OBJECT IDENTIFIER
+               :                       sha1 (1 3 14 3 2 26)
+               :                       (OIW)
+               :                     }
+   2618 A0   67:                   [0] {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 66]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+   2620 30   28:                     SEQUENCE {
+   2622 06    9:                       OBJECT IDENTIFIER
+               :                         signingTime
+               :                             (1 2 840 113549 1 9 5)
+               :                         (PKCS #9 (1 2 840 113549 1 9))
+   2633 31   15:                       SET {
+   2635 17   13:                         UTCTime '030514153900Z'
+               :                         }
+               :                       }
+   2650 30   35:                     SEQUENCE {
+   2652 06    9:                       OBJECT IDENTIFIER
+               :                         messageDigest
+               :                             (1 2 840 113549 1 9 4)
+               :                         (PKCS #9 (1 2 840 113549 1 9))
+   2663 31   22:                       SET {
+   2665 04   20:                         OCTET STRING
+               :                   02 5F 49 4E 39 98 50 85 B3 66 D3 8A
+               :                   1F 7B 9E 69 AA FB D8 33
+               :                         }
+               :                       }
+               :                     }
+   2687 30   13:                   SEQUENCE {
+   2689 06    9:                     OBJECT IDENTIFIER
+               :                       rsaEncryption
+               :                           (1 2 840 113549 1 1 1)
+               :                       (PKCS #1)
+   2700 05    0:                     NULL
+               :                     }
+   2702 04  128:                   OCTET STRING
+               :                   6D AA 20 24 ED 7A EE A5 5E 87 DD 75
+               :                   1F 2B 54 10 65 F4 CE 9B B1 2C 78 74
+               :                   BC 8B 1C 60 B5 DB 8B 03 9E 49 F2 2B
+               :                   7F 93 6E 3D 89 14 C9 E3 6B F4 F6 7D
+               :                   76 AE 3E 58 1F 9B BB BC 7C 30 19 4E
+               :                   10 F7 02 F1 8B 5B B4 DB 9A BB 93 B4
+               :                   18 D0 CC 2B C9 91 A9 AD D9 46 F8 65
+               :                   A9 E2 71 95 D0 D4 4E 1F CD 74 6F 82
+               :                   E8 37 6F 5A 3D CB C7 D4 5F C2 80 1B
+               :                   DA D3 84 40 68 5F 56 9A 62 F5 3B 0D
+               :                   6C 33 C3 ED 67 3F 43 BF
+               :                   }
+               :                 }
+               :               }
+               :             }
+               :           }
+               :         }
+               :       }
+               :     }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 67]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :   }
+
+4.5.  All RSA Signed Message
+
+   Same as 4.2, but includes Carl's RSA root cert (but no CRL).  A
+   SignedData with no attribute certificates, signed by Alice using RSA,
+   her certificate and Carl's root cert, no CRL.  The message is
+   ExContent, and is included in the eContent.  There are no signed or
+   unsigned attributes.
+
+      0 30 NDEF: SEQUENCE {
+      2 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+               :     (PKCS #7)
+     13 A0 NDEF:   [0] {
+     15 30 NDEF:     SEQUENCE {
+     17 02    1:       INTEGER 1
+     20 31   11:       SET {
+     22 30    9:         SEQUENCE {
+     24 06    5:           OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :             (OIW)
+     31 05    0:           NULL
+               :           }
+               :         }
+     33 30 NDEF:       SEQUENCE {
+     35 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     46 A0 NDEF:         [0] {
+     48 24 NDEF:           OCTET STRING {
+     50 04    4:             OCTET STRING 'This'
+     56 04   24:             OCTET STRING ' is some sample content.'
+               :             }
+               :           }
+               :         }
+     88 A0 NDEF:       [0] {
+     90 30  491:         SEQUENCE {
+     94 30  340:           SEQUENCE {
+     98 A0    3:             [0] {
+    100 02    1:               INTEGER 2
+               :               }
+    103 02   16:             INTEGER
+               :               46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :               9F F2 50 20
+    121 30   13:             SEQUENCE {
+    123 06    9:               OBJECT IDENTIFIER
+               :                 sha1withRSAEncryption
+               :                     (1 2 840 113549 1 1 5)
+               :                 (PKCS #1)
+    134 05    0:               NULL
+
+
+
+Hoffman, Ed.                 Informational                     [Page 68]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :               }
+    136 30   18:             SEQUENCE {
+    138 31   16:               SET {
+    140 30   14:                 SEQUENCE {
+    142 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    147 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+    156 30   30:             SEQUENCE {
+    158 17   13:               UTCTime '990818070000Z'
+    173 17   13:               UTCTime '391231235959Z'
+               :               }
+    188 30   18:             SEQUENCE {
+    190 31   16:               SET {
+    192 30   14:                 SEQUENCE {
+    194 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    199 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+    208 30  159:             SEQUENCE {
+    211 30   13:               SEQUENCE {
+    213 06    9:                 OBJECT IDENTIFIER
+               :                   rsaEncryption (1 2 840 113549 1 1 1)
+               :                   (PKCS #1)
+    224 05    0:                 NULL
+               :                 }
+    226 03  141:               BIT STRING 0 unused bits, encapsulates {
+    230 30  137:                   SEQUENCE {
+    233 02  129:                     INTEGER
+               :                   00 E4 4B FF 18 B8 24 57 F4 77 FF 6E
+               :                   73 7B 93 71 5C BC 33 1A 92 92 72 23
+               :                   D8 41 46 D0 CD 11 3A 04 B3 8E AF 82
+               :                   9D BD 51 1E 17 7A F2 76 2C 2B 86 39
+               :                   A7 BD D7 8D 1A 53 EC E4 00 D5 E8 EC
+               :                   A2 36 B1 ED E2 50 E2 32 09 8A 3F 9F
+               :                   99 25 8F B8 4E AB B9 7D D5 96 65 DA
+               :                   16 A0 C5 BE 0E AE 44 5B EF 5E F4 A7
+               :                   29 CB 82 DD AC 44 E9 AA 93 94 29 0E
+               :                   F8 18 D6 C8 57 5E F2 76 C4 F2 11 60
+               :                   38 B9 1B 3C 1D 97 C9 6A F1
+    365 02    3:                     INTEGER 65537
+               :                     }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 69]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   }
+               :               }
+    370 A3   66:             [3] {
+    372 30   64:               SEQUENCE {
+    374 30   15:                 SEQUENCE {
+    376 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+    381 01    1:                   BOOLEAN TRUE
+    384 04    5:                   OCTET STRING, encapsulates {
+    386 30    3:                       SEQUENCE {
+    388 01    1:                         BOOLEAN TRUE
+               :                         }
+               :                       }
+               :                   }
+    391 30   14:                 SEQUENCE {
+    393 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+    398 01    1:                   BOOLEAN TRUE
+    401 04    4:                   OCTET STRING, encapsulates {
+    403 03    2:                       BIT STRING 1 unused bits
+               :                         '1100001'B
+               :                       }
+               :                   }
+    407 30   29:                 SEQUENCE {
+    409 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+    414 04   22:                   OCTET STRING, encapsulates {
+    416 04   20:                       OCTET STRING
+               :                   E9 E0 90 27 AC 78 20 7A 9A D3 4C F2
+               :                   42 37 4E 22 AE 9E 38 BB
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+    438 30   13:           SEQUENCE {
+    440 06    9:             OBJECT IDENTIFIER
+               :               sha1withRSAEncryption
+               :                   (1 2 840 113549 1 1 5)
+               :               (PKCS #1)
+    451 05    0:             NULL
+               :             }
+    453 03  129:           BIT STRING 0 unused bits
+               :             B7 9E D4 04 D3 ED 29 E4 FF 89 89 15
+               :             2E 4C DB 0C F0 48 0F 32 61 EE C4 04
+
+
+
+Hoffman, Ed.                 Informational                     [Page 70]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :             EC 12 5D 2D FF 0F 64 59 7E 0A C3 ED
+               :             18 FD E3 56 40 37 A7 07 B5 F0 38 12
+               :             61 50 ED EF DD 3F E3 0B B8 61 A5 A4
+               :             9B 3C E6 9E 9C 54 9A B6 95 D6 DA 6C
+               :             3B B5 2D 45 35 9D 49 01 76 FA B9 B9
+               :             31 F9 F9 6B 12 53 A0 F5 14 60 9B 7D
+               :             CA 3E F2 53 6B B0 37 6F AD E6 74 D7
+               :             DB FA 5A EA 14 41 63 5D CD BE C8 0E
+               :             C1 DA 6A 8D 53 34 18 02
+               :           }
+    585 30  556:         SEQUENCE {
+    589 30  405:           SEQUENCE {
+    593 A0    3:             [0] {
+    595 02    1:               INTEGER 2
+               :               }
+    598 02   16:             INTEGER
+               :               46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :               C4 10 B3 B0
+    616 30   13:             SEQUENCE {
+    618 06    9:               OBJECT IDENTIFIER
+               :                 sha1withRSAEncryption
+               :                     (1 2 840 113549 1 1 5)
+               :                 (PKCS #1)
+    629 05    0:               NULL
+               :               }
+    631 30   18:             SEQUENCE {
+    633 31   16:               SET {
+    635 30   14:                 SEQUENCE {
+    637 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    642 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+    651 30   30:             SEQUENCE {
+    653 17   13:               UTCTime '990919010847Z'
+    668 17   13:               UTCTime '391231235959Z'
+               :               }
+    683 30   19:             SEQUENCE {
+    685 31   17:               SET {
+    687 30   15:                 SEQUENCE {
+    689 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    694 13    8:                   PrintableString 'AliceRSA'
+               :                   }
+               :                 }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 71]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :               }
+    704 30  159:             SEQUENCE {
+    707 30   13:               SEQUENCE {
+    709 06    9:                 OBJECT IDENTIFIER
+               :                   rsaEncryption (1 2 840 113549 1 1 1)
+               :                   (PKCS #1)
+    720 05    0:                 NULL
+               :                 }
+    722 03  141:               BIT STRING 0 unused bits, encapsulates {
+    726 30  137:                   SEQUENCE {
+    729 02  129:                     INTEGER
+               :                   00 E0 89 73 39 8D D8 F5 F5 E8 87 76
+               :                   39 7F 4E B0 05 BB 53 83 DE 0F B7 AB
+               :                   DC 7D C7 75 29 0D 05 2E 6D 12 DF A6
+               :                   86 26 D4 D2 6F AA 58 29 FC 97 EC FA
+               :                   82 51 0F 30 80 BE B1 50 9E 46 44 F1
+               :                   2C BB D8 32 CF C6 68 6F 07 D9 B0 60
+               :                   AC BE EE 34 09 6A 13 F5 F7 05 05 93
+               :                   DF 5E BA 35 56 D9 61 FF 19 7F C9 81
+               :                   E6 F8 6C EA 87 40 70 EF AC 6D 2C 74
+               :                   9F 2D FA 55 3A B9 99 77 02 A6 48 52
+               :                   8C 4E F3 57 38 57 74 57 5F
+    861 02    3:                     INTEGER 65537
+               :                     }
+               :                   }
+               :               }
+    866 A3  129:             [3] {
+    869 30  127:               SEQUENCE {
+    871 30   12:                 SEQUENCE {
+    873 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+    878 01    1:                   BOOLEAN TRUE
+    881 04    2:                   OCTET STRING, encapsulates {
+    883 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+    885 30   14:                 SEQUENCE {
+    887 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+    892 01    1:                   BOOLEAN TRUE
+    895 04    4:                   OCTET STRING, encapsulates {
+    897 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+    901 30   31:                 SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 72]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    903 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+               :                     (X.509 id-ce (2 5 29))
+    908 04   24:                   OCTET STRING, encapsulates {
+    910 30   22:                       SEQUENCE {
+    912 80   20:                         [0]
+               :                   E9 E0 90 27 AC 78 20 7A 9A D3 4C F2
+               :                   42 37 4E 22 AE 9E 38 BB
+               :                         }
+               :                       }
+               :                   }
+    934 30   29:                 SEQUENCE {
+    936 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+    941 04   22:                   OCTET STRING, encapsulates {
+    943 04   20:                       OCTET STRING
+               :                   77 D2 B4 D1 B7 4C 8A 8A A3 CE 45 9D
+               :                   CE EC 3C A0 3A E3 FF 50
+               :                       }
+               :                   }
+    965 30   31:                 SEQUENCE {
+    967 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+    972 04   24:                   OCTET STRING, encapsulates {
+    974 30   22:                       SEQUENCE {
+    976 81   20:                         [1] 'AliceRSA@example.com'
+               :                         }
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+    998 30   13:           SEQUENCE {
+   1000 06    9:             OBJECT IDENTIFIER
+               :               sha1withRSAEncryption
+               :                   (1 2 840 113549 1 1 5)
+               :               (PKCS #1)
+   1011 05    0:             NULL
+               :             }
+   1013 03  129:           BIT STRING 0 unused bits
+               :             3E 70 47 A8 48 CC 13 58 8F CA 51 71
+               :             6B 4E 36 18 5D 04 7E 80 B1 8D 4D CC
+               :             CA A3 8F CC 7D 56 C8 BC CF 6E B3 1C
+               :             59 A9 20 AA 05 81 A8 4E 25 AD A7 70
+               :             14 75 2F F5 C7 9B D1 0E E9 63 D2 64
+               :             B7 C6 66 6E 73 21 54 DF F4 BA 25 5D
+
+
+
+Hoffman, Ed.                 Informational                     [Page 73]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :             7D 49 D3 94 6B 22 36 74 73 B8 4A EC
+               :             2F 64 ED D3 3D D2 A7 42 C5 E8 37 8A
+               :             B4 DB 9F 67 E4 BD 9F F9 FE 74 EF EA
+               :             F9 EE 63 6A D8 3F 4B 25 09 B5 D8 1A
+               :             76 AE EB 9B DB 49 B0 22
+               :           }
+               :         }
+   1147 31  203:       SET {
+   1150 30  200:         SEQUENCE {
+   1153 02    1:           INTEGER 1
+   1156 30   38:           SEQUENCE {
+   1158 30   18:             SEQUENCE {
+   1160 31   16:               SET {
+   1162 30   14:                 SEQUENCE {
+   1164 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+   1169 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+   1178 02   16:             INTEGER
+               :               46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :               C4 10 B3 B0
+               :             }
+   1196 30    9:           SEQUENCE {
+   1198 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :               (OIW)
+   1205 05    0:             NULL
+               :             }
+   1207 30   13:           SEQUENCE {
+   1209 06    9:             OBJECT IDENTIFIER
+               :               rsaEncryption (1 2 840 113549 1 1 1)
+               :               (PKCS #1)
+   1220 05    0:             NULL
+               :             }
+   1222 04  128:           OCTET STRING
+               :             2F 23 82 D2 F3 09 5F B8 0C 58 EB 4E
+               :             9D BF 89 9A 81 E5 75 C4 91 3D D3 D0
+               :             D5 7B B6 D5 FE 94 A1 8A AC E3 C4 84
+               :             F5 CD 60 4E 27 95 F6 CF 00 86 76 75
+               :             3F 2B F0 E7 D4 02 67 A7 F5 C7 8D 16
+               :             04 A5 B3 B5 E7 D9 32 F0 24 EF E7 20
+               :             44 D5 9F 07 C5 53 24 FA CE 01 1D 0F
+               :             17 13 A7 2A 95 9D 2B E4 03 95 14 0B
+               :             E9 39 0D BA CE 6E 9C 9E 0C E8 98 E6
+               :             55 13 D4 68 6F D0 07 D7 A2 B1 62 4C
+               :             E3 8F AF FD E0 D5 5D C7
+
+
+
+Hoffman, Ed.                 Informational                     [Page 74]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           }
+               :         }
+               :       }
+               :     }
+               :   }
+
+4.6.  Multiple Signers
+
+   Similar to 4.1, but the message is also signed by Diane.  Two
+   signerInfos (one for Alice, one for Diane) with no attribute
+   certificates, each signed using DSS, Alice's and Diane's certificate
+   (not Carl's root cert), no CRL.  The message is ExContent, and is
+   included in the eContent.  There are no signed or unsigned
+   attributes.
+
+      0 30 1463: SEQUENCE {
+      4 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+               :     (PKCS #7)
+     15 A0 1448:   [0] {
+     19 30 1444:     SEQUENCE {
+     23 02    1:       INTEGER 1
+     26 31    9:       SET {
+     28 30    7:         SEQUENCE {
+     30 06    5:           OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :             (OIW)
+               :           }
+               :         }
+     37 30   43:       SEQUENCE {
+     39 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     50 A0   30:         [0] {
+     52 04   28:           OCTET STRING 'This is some sample content.'
+               :           }
+               :         }
+     82 A0 1180:       [0] {
+     86 30  440:         SEQUENCE {
+     90 30  375:           SEQUENCE {
+     94 A0    3:             [0] {
+     96 02    1:               INTEGER 2
+               :               }
+     99 02    2:             INTEGER 210
+    103 30    9:             SEQUENCE {
+    105 06    7:               OBJECT IDENTIFIER
+               :                 dsaWithSha1 (1 2 840 10040 4 3)
+               :                 (ANSI X9.57 algorithm)
+               :               }
+    114 30   18:             SEQUENCE {
+    116 31   16:               SET {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 75]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    118 30   14:                 SEQUENCE {
+    120 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    125 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+    134 30   30:             SEQUENCE {
+    136 17   13:               UTCTime '990817020810Z'
+    151 17   13:               UTCTime '391231235959Z'
+               :               }
+    166 30   19:             SEQUENCE {
+    168 31   17:               SET {
+    170 30   15:                 SEQUENCE {
+    172 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    177 13    8:                   PrintableString 'DianeDSS'
+               :                   }
+               :                 }
+               :               }
+    187 30  147:             SEQUENCE {
+    190 30    9:               SEQUENCE {
+    192 06    7:                 OBJECT IDENTIFIER
+               :                   dsa (1 2 840 10040 4 1)
+               :                   (ANSI X9.57 algorithm)
+               :                 }
+    201 03  133:               BIT STRING 0 unused bits, encapsulates {
+    205 02  129:                   INTEGER
+               :                   00 A0 00 17 78 2C EE 7E 81 53 2E 2E
+               :                   61 08 0F A1 9B 51 52 1A DA 59 A8 73
+               :                   2F 12 25 B6 08 CB CA EF 2A 44 76 8A
+               :                   52 09 EA BD 05 22 D5 0F F6 FD 46 D7
+               :                   AF 99 38 09 0E 13 CB 4F 2C DD 1C 34
+               :                   F7 1C BF 25 FF 23 D3 3B 59 E7 82 97
+               :                   37 BE 31 24 D8 18 C8 F3 49 39 5B B7
+               :                   E2 E5 27 7E FC 8C 45 72 5B 7E 3E 8F
+               :                   68 4D DD 46 7A 22 BE 8E FF CC DA 39
+               :                   29 A3 39 E5 9F 43 E9 55 C9 D7 5B A6
+               :                   81 67 CC C0 AA CD 2E C5 23
+               :                   }
+               :               }
+    337 A3  129:             [3] {
+    340 30  127:               SEQUENCE {
+    342 30   12:                 SEQUENCE {
+    344 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+
+
+
+Hoffman, Ed.                 Informational                     [Page 76]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                     (X.509 id-ce (2 5 29))
+    349 01    1:                   BOOLEAN TRUE
+    352 04    2:                   OCTET STRING, encapsulates {
+    354 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+    356 30   14:                 SEQUENCE {
+    358 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+    363 01    1:                   BOOLEAN TRUE
+    366 04    4:                   OCTET STRING, encapsulates {
+    368 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+    372 30   31:                 SEQUENCE {
+    374 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+               :                     (X.509 id-ce (2 5 29))
+    379 04   24:                   OCTET STRING, encapsulates {
+    381 30   22:                       SEQUENCE {
+    383 80   20:                         [0]
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+               :                         }
+               :                       }
+               :                   }
+    405 30   29:                 SEQUENCE {
+    407 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+    412 04   22:                   OCTET STRING, encapsulates {
+    414 04   20:                       OCTET STRING
+               :                   64 30 99 7D 5C DC 45 0B 99 3A 52 2F
+               :                   16 BF 58 50 DD CE 2B 18
+               :                       }
+               :                   }
+    436 30   31:                 SEQUENCE {
+    438 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+    443 04   24:                   OCTET STRING, encapsulates {
+    445 30   22:                       SEQUENCE {
+    447 81   20:                         [1] 'DianeDSS@example.com'
+               :                         }
+               :                       }
+               :                   }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 77]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                 }
+               :               }
+               :             }
+    469 30    9:           SEQUENCE {
+    471 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+    480 03   48:           BIT STRING 0 unused bits, encapsulates {
+    483 30   45:               SEQUENCE {
+    485 02   21:                 INTEGER
+               :                   00 A1 1A F8 17 0E 3E 5D A8 8C F4 B6
+               :                   55 33 1E 4B E3 2C AC B9 5F
+    508 02   20:                 INTEGER
+               :                   28 4B 10 45 58 D2 1C 9D 55 35 14 18
+               :                   91 B2 3F 39 DF B5 6E D3
+               :                 }
+               :               }
+               :           }
+    530 30  732:         SEQUENCE {
+    534 30  667:           SEQUENCE {
+    538 A0    3:             [0] {
+    540 02    1:               INTEGER 2
+               :               }
+    543 02    2:             INTEGER 200
+    547 30    9:             SEQUENCE {
+    549 06    7:               OBJECT IDENTIFIER
+               :                 dsaWithSha1 (1 2 840 10040 4 3)
+               :                 (ANSI X9.57 algorithm)
+               :               }
+    558 30   18:             SEQUENCE {
+    560 31   16:               SET {
+    562 30   14:                 SEQUENCE {
+    564 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    569 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+    578 30   30:             SEQUENCE {
+    580 17   13:               UTCTime '990817011049Z'
+    595 17   13:               UTCTime '391231235959Z'
+               :               }
+    610 30   19:             SEQUENCE {
+    612 31   17:               SET {
+    614 30   15:                 SEQUENCE {
+    616 06    3:                   OBJECT IDENTIFIER
+
+
+
+Hoffman, Ed.                 Informational                     [Page 78]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    621 13    8:                   PrintableString 'AliceDSS'
+               :                   }
+               :                 }
+               :               }
+    631 30  438:             SEQUENCE {
+    635 30  299:               SEQUENCE {
+    639 06    7:                 OBJECT IDENTIFIER
+               :                   dsa (1 2 840 10040 4 1)
+               :                   (ANSI X9.57 algorithm)
+    648 30  286:                 SEQUENCE {
+    652 02  129:                   INTEGER
+               :                   00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+               :                   48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+               :                   53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+               :                   0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+               :                   2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+               :                   DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+               :                   9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+               :                   8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+               :                   C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+               :                   78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+               :                   B5 E4 09 96 5C F3 7E 5B DB
+    784 02   21:                   INTEGER
+               :                   00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+               :                   B8 37 21 2B 62 8B F7 93 CD
+    807 02  128:                   INTEGER
+               :                   26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+               :                   4B 59 6A 4C 76 23 39 04 02 35 5C F2
+               :                   CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+               :                   AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+               :                   7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+               :                   3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+               :                   E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+               :                   01 7C 6D 49 89 11 89 36 44 BD F8 C8
+               :                   95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+               :                   1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+               :                   D1 81 4A 60 39 BA 36 39
+               :                   }
+               :                 }
+    938 03  132:               BIT STRING 0 unused bits, encapsulates {
+    942 02  128:                   INTEGER
+               :                   5C E3 B9 5A 75 14 96 0B A9 7A DD E3
+               :                   3F A9 EC AC 5E DC BD B7 13 11 34 A6
+               :                   16 89 28 11 23 D9 34 86 67 75 75 13
+               :                   12 3D 43 5B 6F E5 51 BF FA 89 F2 A2
+               :                   1B 3E 24 7D 3D 07 8D 5B 63 C8 BB 45
+
+
+
+Hoffman, Ed.                 Informational                     [Page 79]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   A5 A0 4A E3 85 D6 CE 06 80 3F E8 23
+               :                   7E 1A F2 24 AB 53 1A B8 27 0D 1E EF
+               :                   08 BF 66 14 80 5C 62 AC 65 FA 15 8B
+               :                   F1 BB 34 D4 D2 96 37 F6 61 47 B2 C4
+               :                   32 84 F0 7E 41 40 FD 46 A7 63 4E 33
+               :                   F2 A5 E2 F4 F2 83 E5 B8
+               :                   }
+               :               }
+   1073 A3  129:             [3] {
+   1076 30  127:               SEQUENCE {
+   1078 30   12:                 SEQUENCE {
+   1080 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+   1085 01    1:                   BOOLEAN TRUE
+   1088 04    2:                   OCTET STRING, encapsulates {
+   1090 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+   1092 30   14:                 SEQUENCE {
+   1094 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+   1099 01    1:                   BOOLEAN TRUE
+   1102 04    4:                   OCTET STRING, encapsulates {
+   1104 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+   1108 30   31:                 SEQUENCE {
+   1110 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+               :                     (X.509 id-ce (2 5 29))
+   1115 04   24:                   OCTET STRING, encapsulates {
+   1117 30   22:                       SEQUENCE {
+   1119 80   20:                         [0]
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+               :                         }
+               :                       }
+               :                   }
+   1141 30   29:                 SEQUENCE {
+   1143 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+   1148 04   22:                   OCTET STRING, encapsulates {
+   1150 04   20:                       OCTET STRING
+               :                   BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+
+
+
+Hoffman, Ed.                 Informational                     [Page 80]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   13 01 E2 FD E3 97 FE CD
+               :                       }
+               :                   }
+   1172 30   31:                 SEQUENCE {
+   1174 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+   1179 04   24:                   OCTET STRING, encapsulates {
+   1181 30   22:                       SEQUENCE {
+   1183 81   20:                         [1] 'AliceDSS@example.com'
+               :                         }
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+   1205 30    9:           SEQUENCE {
+   1207 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+   1216 03   48:           BIT STRING 0 unused bits, encapsulates {
+   1219 30   45:               SEQUENCE {
+   1221 02   20:                 INTEGER
+               :                   55 0C A4 19 1F 42 2B 89 71 22 33 8D
+               :                   83 6A B5 3D 67 6B BF 45
+   1243 02   21:                 INTEGER
+               :                   00 9F 61 53 52 54 0B 5C B2 DD DA E7
+               :                   76 1D E2 10 52 5B 43 5E BD
+               :                 }
+               :               }
+               :           }
+               :         }
+   1266 31  198:       SET {
+   1269 30   97:         SEQUENCE {
+   1271 02    1:           INTEGER 1
+   1274 30   24:           SEQUENCE {
+   1276 30   18:             SEQUENCE {
+   1278 31   16:               SET {
+   1280 30   14:                 SEQUENCE {
+   1282 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+   1287 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+   1296 02    2:             INTEGER 200
+
+
+
+Hoffman, Ed.                 Informational                     [Page 81]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :             }
+   1300 30    7:           SEQUENCE {
+   1302 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :               (OIW)
+               :             }
+   1309 30    9:           SEQUENCE {
+   1311 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+   1320 04   46:           OCTET STRING, encapsulates {
+   1322 30   44:               SEQUENCE {
+   1324 02   20:                 INTEGER
+               :                   48 24 DE 8B 85 F2 16 AF EC 82 61 A9
+               :                   54 D0 2D 04 A1 CC 5A 4F
+   1346 02   20:                 INTEGER
+               :                   17 ED D5 77 02 EE 75 13 D8 10 BD 3D
+               :                   97 17 20 88 BB FD 7B 81
+               :                 }
+               :               }
+               :           }
+   1368 30   97:         SEQUENCE {
+   1370 02    1:           INTEGER 1
+   1373 30   24:           SEQUENCE {
+   1375 30   18:             SEQUENCE {
+   1377 31   16:               SET {
+   1379 30   14:                 SEQUENCE {
+   1381 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+   1386 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+   1395 02    2:             INTEGER 210
+               :             }
+   1399 30    7:           SEQUENCE {
+   1401 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :               (OIW)
+               :             }
+   1408 30    9:           SEQUENCE {
+   1410 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+   1419 04   46:           OCTET STRING, encapsulates {
+   1421 30   44:               SEQUENCE {
+   1423 02   20:                 INTEGER
+
+
+
+Hoffman, Ed.                 Informational                     [Page 82]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   15 FF 81 4D 8C AD 80 4E 9B 35 58 04
+               :                   37 6E 63 6E E9 5B 83 FA
+   1445 02   20:                 INTEGER
+               :                   06 7E 58 4E 2B 31 84 41 ED 49 79 38
+               :                   3E 77 D2 A6 8C 75 08 21
+               :                 }
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+               :   }
+
+4.7.  Signing Using SKI
+
+   Same as 4.1, but the signature uses the SKI instead of the
+   issuer/serial number in the cert.  A SignedData with no attribute
+   certificates, signed by Alice using DSS, just her certificate (not
+   Carl's root cert), identified by the SKI, no CRL.  The message is
+   ExContent, and is included in the eContent.  There are no signed or
+   unsigned attributes.
+
+      0 30  915: SEQUENCE {
+      4 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+               :     (PKCS #7)
+     15 A0  900:   [0] {
+     19 30  896:     SEQUENCE {
+     23 02    1:       INTEGER 3
+     26 31    9:       SET {
+     28 30    7:         SEQUENCE {
+     30 06    5:           OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :             (OIW)
+               :           }
+               :         }
+     37 30   43:       SEQUENCE {
+     39 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     50 A0   30:         [0] {
+     52 04   28:           OCTET STRING 'This is some sample content.'
+               :           }
+               :         }
+     82 A0  736:       [0] {
+     86 30  732:         SEQUENCE {
+     90 30  667:           SEQUENCE {
+     94 A0    3:             [0] {
+     96 02    1:               INTEGER 2
+               :               }
+     99 02    2:             INTEGER 200
+
+
+
+Hoffman, Ed.                 Informational                     [Page 83]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    103 30    9:             SEQUENCE {
+    105 06    7:               OBJECT IDENTIFIER
+               :                 dsaWithSha1 (1 2 840 10040 4 3)
+               :                 (ANSI X9.57 algorithm)
+               :               }
+    114 30   18:             SEQUENCE {
+    116 31   16:               SET {
+    118 30   14:                 SEQUENCE {
+    120 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    125 13    7:                   PrintableString 'CarlDSS'
+               :                   }
+               :                 }
+               :               }
+    134 30   30:             SEQUENCE {
+    136 17   13:               UTCTime '990817011049Z'
+    151 17   13:               UTCTime '391231235959Z'
+               :               }
+    166 30   19:             SEQUENCE {
+    168 31   17:               SET {
+    170 30   15:                 SEQUENCE {
+    172 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+    177 13    8:                   PrintableString 'AliceDSS'
+               :                   }
+               :                 }
+               :               }
+    187 30  438:             SEQUENCE {
+    191 30  299:               SEQUENCE {
+    195 06    7:                 OBJECT IDENTIFIER
+               :                   dsa (1 2 840 10040 4 1)
+               :                   (ANSI X9.57 algorithm)
+    204 30  286:                 SEQUENCE {
+    208 02  129:                   INTEGER
+               :                   00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+               :                   48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+               :                   53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+               :                   0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+               :                   2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+               :                   DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+               :                   9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+               :                   8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+               :                   C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+               :                   78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+               :                   B5 E4 09 96 5C F3 7E 5B DB
+    340 02   21:                   INTEGER
+
+
+
+Hoffman, Ed.                 Informational                     [Page 84]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+               :                   B8 37 21 2B 62 8B F7 93 CD
+    363 02  128:                   INTEGER
+               :                   26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+               :                   4B 59 6A 4C 76 23 39 04 02 35 5C F2
+               :                   CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+               :                   AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+               :                   7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+               :                   3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+               :                   E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+               :                   01 7C 6D 49 89 11 89 36 44 BD F8 C8
+               :                   95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+               :                   1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+               :                   D1 81 4A 60 39 BA 36 39
+               :                   }
+               :                 }
+    494 03  132:               BIT STRING 0 unused bits, encapsulates {
+    498 02  128:                   INTEGER
+               :                   5C E3 B9 5A 75 14 96 0B A9 7A DD E3
+               :                   3F A9 EC AC 5E DC BD B7 13 11 34 A6
+               :                   16 89 28 11 23 D9 34 86 67 75 75 13
+               :                   12 3D 43 5B 6F E5 51 BF FA 89 F2 A2
+               :                   1B 3E 24 7D 3D 07 8D 5B 63 C8 BB 45
+               :                   A5 A0 4A E3 85 D6 CE 06 80 3F E8 23
+               :                   7E 1A F2 24 AB 53 1A B8 27 0D 1E EF
+               :                   08 BF 66 14 80 5C 62 AC 65 FA 15 8B
+               :                   F1 BB 34 D4 D2 96 37 F6 61 47 B2 C4
+               :                   32 84 F0 7E 41 40 FD 46 A7 63 4E 33
+               :                   F2 A5 E2 F4 F2 83 E5 B8
+               :                   }
+               :               }
+    629 A3  129:             [3] {
+    632 30  127:               SEQUENCE {
+    634 30   12:                 SEQUENCE {
+    636 06    3:                   OBJECT IDENTIFIER
+               :                     basicConstraints (2 5 29 19)
+               :                     (X.509 id-ce (2 5 29))
+    641 01    1:                   BOOLEAN TRUE
+    644 04    2:                   OCTET STRING, encapsulates {
+    646 30    0:                       SEQUENCE {}
+               :                       }
+               :                   }
+    648 30   14:                 SEQUENCE {
+    650 06    3:                   OBJECT IDENTIFIER
+               :                     keyUsage (2 5 29 15)
+               :                     (X.509 id-ce (2 5 29))
+    655 01    1:                   BOOLEAN TRUE
+    658 04    4:                   OCTET STRING, encapsulates {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 85]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    660 03    2:                       BIT STRING 6 unused bits
+               :                         '11'B
+               :                       }
+               :                   }
+    664 30   31:                 SEQUENCE {
+    666 06    3:                   OBJECT IDENTIFIER
+               :                     authorityKeyIdentifier (2 5 29 35)
+               :                     (X.509 id-ce (2 5 29))
+    671 04   24:                   OCTET STRING, encapsulates {
+    673 30   22:                       SEQUENCE {
+    675 80   20:                         [0]
+               :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+               :                   3D 20 BC 43 2B 93 F1 1F
+               :                         }
+               :                       }
+               :                   }
+    697 30   29:                 SEQUENCE {
+    699 06    3:                   OBJECT IDENTIFIER
+               :                     subjectKeyIdentifier (2 5 29 14)
+               :                     (X.509 id-ce (2 5 29))
+    704 04   22:                   OCTET STRING, encapsulates {
+    706 04   20:                       OCTET STRING
+               :                   BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+               :                   13 01 E2 FD E3 97 FE CD
+               :                       }
+               :                   }
+    728 30   31:                 SEQUENCE {
+    730 06    3:                   OBJECT IDENTIFIER
+               :                     subjectAltName (2 5 29 17)
+               :                     (X.509 id-ce (2 5 29))
+    735 04   24:                   OCTET STRING, encapsulates {
+    737 30   22:                       SEQUENCE {
+    739 81   20:                         [1] 'AliceDSS@example.com'
+               :                         }
+               :                       }
+               :                   }
+               :                 }
+               :               }
+               :             }
+    761 30    9:           SEQUENCE {
+    763 06    7:             OBJECT IDENTIFIER
+               :               dsaWithSha1 (1 2 840 10040 4 3)
+               :               (ANSI X9.57 algorithm)
+               :             }
+    772 03   48:           BIT STRING 0 unused bits, encapsulates {
+    775 30   45:               SEQUENCE {
+    777 02   20:                 INTEGER
+               :                   55 0C A4 19 1F 42 2B 89 71 22 33 8D
+
+
+
+Hoffman, Ed.                 Informational                     [Page 86]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :                   83 6A B5 3D 67 6B BF 45
+    799 02   21:                 INTEGER
+               :                   00 9F 61 53 52 54 0B 5C B2 DD DA E7
+               :                   76 1D E2 10 52 5B 43 5E BD
+               :                 }
+               :               }
+               :           }
+               :         }
+    822 31   95:       SET {
+    824 30   93:         SEQUENCE {
+    826 02    1:           INTEGER 3
+    829 80   20:           [0]
+               :             BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+               :             13 01 E2 FD E3 97 FE CD
+    851 30    7:           SEQUENCE {
+    853 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :               (OIW)
+               :             }
+    860 30    9:           SEQUENCE {
+    862 06    7:             OBJECT IDENTIFIER dsa (1 2 840 10040 4 1)
+               :               (ANSI X9.57 algorithm)
+               :             }
+    871 04   46:           OCTET STRING, encapsulates {
+    873 30   44:               SEQUENCE {
+    875 02   20:                 INTEGER
+               :                   6D 8E 5A CD 28 A0 1F D9 86 AD 7A E9
+               :                   DF AC D7 BE EC BE 3F F8
+    897 02   20:                 INTEGER
+               :                   7C 8A 06 1E FC A4 41 35 7E F7 24 14
+               :                   FD 3D C0 56 B7 05 27 D5
+               :                 }
+               :               }
+               :           }
+               :         }
+               :       }
+               :     }
+               :   }
+
+4.8.  S/MIME multipart/signed Message
+
+   A full S/MIME message, including MIME, that includes the body part
+   from 4.3 and the body containing the content of the message.
+
+MIME-Version: 1.0
+To: User2@examples.com
+From: aliceDss@examples.com
+Subject: Example 4.8
+Message-Id: <020906002550300.249@examples.com>
+
+
+
+Hoffman, Ed.                 Informational                     [Page 87]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+Date: Fri, 06 Sep 2002 00:25:21 -0300
+Content-Type: multipart/signed;
+    micalg=SHA1;
+    boundary="----=_NextBoundry____Fri,_06_Sep_2002_00:25:21";
+    protocol="application/pkcs7-signature"
+
+This is a multi-part message in MIME format.
+
+------=_NextBoundry____Fri,_06_Sep_2002_00:25:21
+
+This is some sample content.
+------=_NextBoundry____Fri,_06_Sep_2002_00:25:21
+Content-Type: application/pkcs7-signature; name=smime.p7s
+Content-Transfer-Encoding: base64
+Content-Disposition: attachment; filename=smime.p7s
+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+
+------=_NextBoundry____Fri,_06_Sep_2002_00:25:21--
+
+4.9.  S/MIME application/pkcs7-mime Signed Message
+
+   A full S/MIME message, including the MIME parts.
+
+MIME-Version: 1.0
+To: User2@examples.com
+From: aliceDss@examples.com
+Subject: Example 4.9
+Message-Id: <021031164540300.304@examples.com>
+Date: Thu, 31 Oct 2002 16:45:14 -0300
+Content-Type: application/pkcs7-mime; smime-type=signed-data;
+    name=smime.p7m
+
+
+
+Hoffman, Ed.                 Informational                     [Page 88]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+Content-Transfer-Encoding: base64
+Content-Disposition: attachment; filename=smime.p7m
+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+
+4.10.  SignedData with Attributes
+
+   A SignedData message with the following list of signedAttributes:
+
+   -unknown OID
+   -contentHints
+   -smimeCapablilties
+   -securityLabel
+   -ContentReference
+   -smimeEncryptKeyPreference
+   -mlExpansionHistory
+   -EquivalentLabel
+
+   0 30 2047: SEQUENCE {
+   4 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+            :     (PKCS #7)
+  15 A0 2032:   [0] {
+  19 30 2028:     SEQUENCE {
+  23 02    1:       INTEGER 1
+  26 31    9:       SET {
+  28 30    7:         SEQUENCE {
+  30 06    5:           OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+            :             (OIW)
+            :           }
+            :         }
+  37 30   43:       SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 89]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+  39 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+            :           (PKCS #7)
+  50 A0   30:         [0] {
+  52 04   28:           OCTET STRING 'This is some sample content.'
+            :           }
+            :         }
+  82 A0  736:       [0] {
+  86 30  732:         SEQUENCE {
+  90 30  667:           SEQUENCE {
+  94 A0    3:             [0] {
+  96 02    1:               INTEGER 2
+            :               }
+  99 02    2:             INTEGER 200
+ 103 30    9:             SEQUENCE {
+ 105 06    7:               OBJECT IDENTIFIER
+            :                 dsaWithSha1 (1 2 840 10040 4 3)
+            :                 (ANSI X9.57 algorithm)
+            :               }
+ 114 30   18:             SEQUENCE {
+ 116 31   16:               SET {
+ 118 30   14:                 SEQUENCE {
+ 120 06    3:                   OBJECT IDENTIFIER
+            :                     commonName (2 5 4 3)
+            :                     (X.520 id-at (2 5 4))
+ 125 13    7:                   PrintableString 'CarlDSS'
+            :                   }
+            :                 }
+            :               }
+ 134 30   30:             SEQUENCE {
+ 136 17   13:               UTCTime '990817011049Z'
+ 151 17   13:               UTCTime '391231235959Z'
+            :               }
+ 166 30   19:             SEQUENCE {
+ 168 31   17:               SET {
+ 170 30   15:                 SEQUENCE {
+ 172 06    3:                   OBJECT IDENTIFIER
+            :                     commonName (2 5 4 3)
+            :                     (X.520 id-at (2 5 4))
+ 177 13    8:                   PrintableString 'AliceDSS'
+            :                   }
+            :                 }
+            :               }
+ 187 30  438:             SEQUENCE {
+ 191 30  299:               SEQUENCE {
+ 195 06    7:                 OBJECT IDENTIFIER
+            :                   dsa (1 2 840 10040 4 1)
+            :                   (ANSI X9.57 algorithm)
+ 204 30  286:                 SEQUENCE {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 90]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+ 208 02  129:                   INTEGER
+            :                   00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+            :                   48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+            :                   53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+            :                   0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+            :                   2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+            :                   DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+            :                   9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+            :                   8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+            :                   C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+            :                   78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+            :                   B5 E4 09 96 5C F3 7E 5B DB
+ 340 02   21:                   INTEGER
+            :                   00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+            :                   B8 37 21 2B 62 8B F7 93 CD
+ 363 02  128:                   INTEGER
+            :                   26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+            :                   4B 59 6A 4C 76 23 39 04 02 35 5C F2
+            :                   CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+            :                   AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+            :                   7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+            :                   3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+            :                   E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+            :                   01 7C 6D 49 89 11 89 36 44 BD F8 C8
+            :                   95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+            :                   1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+            :                   D1 81 4A 60 39 BA 36 39
+            :                   }
+            :                 }
+ 494 03  132:               BIT STRING 0 unused bits, encapsulates {
+ 498 02  128:                   INTEGER
+            :                   5C E3 B9 5A 75 14 96 0B A9 7A DD E3
+            :                   3F A9 EC AC 5E DC BD B7 13 11 34 A6
+            :                   16 89 28 11 23 D9 34 86 67 75 75 13
+            :                   12 3D 43 5B 6F E5 51 BF FA 89 F2 A2
+            :                   1B 3E 24 7D 3D 07 8D 5B 63 C8 BB 45
+            :                   A5 A0 4A E3 85 D6 CE 06 80 3F E8 23
+            :                   7E 1A F2 24 AB 53 1A B8 27 0D 1E EF
+            :                   08 BF 66 14 80 5C 62 AC 65 FA 15 8B
+            :                   F1 BB 34 D4 D2 96 37 F6 61 47 B2 C4
+            :                   32 84 F0 7E 41 40 FD 46 A7 63 4E 33
+            :                   F2 A5 E2 F4 F2 83 E5 B8
+            :                   }
+            :               }
+ 629 A3  129:             [3] {
+ 632 30  127:               SEQUENCE {
+ 634 30   12:                 SEQUENCE {
+ 636 06    3:                   OBJECT IDENTIFIER
+
+
+
+Hoffman, Ed.                 Informational                     [Page 91]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                     basicConstraints (2 5 29 19)
+            :                     (X.509 id-ce (2 5 29))
+ 641 01    1:                   BOOLEAN TRUE
+ 644 04    2:                   OCTET STRING, encapsulates {
+ 646 30    0:                       SEQUENCE {}
+            :                       }
+            :                   }
+ 648 30   14:                 SEQUENCE {
+ 650 06    3:                   OBJECT IDENTIFIER
+            :                     keyUsage (2 5 29 15)
+            :                     (X.509 id-ce (2 5 29))
+ 655 01    1:                   BOOLEAN TRUE
+ 658 04    4:                   OCTET STRING, encapsulates {
+ 660 03    2:                       BIT STRING 6 unused bits
+            :                         '11'B
+            :                       }
+            :                   }
+ 664 30   31:                 SEQUENCE {
+ 666 06    3:                   OBJECT IDENTIFIER
+            :                     authorityKeyIdentifier (2 5 29 35)
+            :                     (X.509 id-ce (2 5 29))
+ 671 04   24:                   OCTET STRING, encapsulates {
+ 673 30   22:                       SEQUENCE {
+ 675 80   20:                         [0]
+            :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+            :                   3D 20 BC 43 2B 93 F1 1F
+            :                         }
+            :                       }
+            :                   }
+ 697 30   29:                 SEQUENCE {
+ 699 06    3:                   OBJECT IDENTIFIER
+            :                     subjectKeyIdentifier (2 5 29 14)
+            :                     (X.509 id-ce (2 5 29))
+ 704 04   22:                   OCTET STRING, encapsulates {
+ 706 04   20:                       OCTET STRING
+            :                   BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+            :                   13 01 E2 FD E3 97 FE CD
+            :                       }
+            :                   }
+ 728 30   31:                 SEQUENCE {
+ 730 06    3:                   OBJECT IDENTIFIER
+            :                     subjectAltName (2 5 29 17)
+            :                     (X.509 id-ce (2 5 29))
+ 735 04   24:                   OCTET STRING, encapsulates {
+ 737 30   22:                       SEQUENCE {
+ 739 81   20:                         [1] 'AliceDSS@example.com'
+            :                         }
+            :                       }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 92]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                   }
+            :                 }
+            :               }
+            :             }
+ 761 30    9:           SEQUENCE {
+ 763 06    7:             OBJECT IDENTIFIER
+            :               dsaWithSha1 (1 2 840 10040 4 3)
+            :               (ANSI X9.57 algorithm)
+            :             }
+ 772 03   48:           BIT STRING 0 unused bits, encapsulates {
+ 775 30   45:               SEQUENCE {
+ 777 02   20:                 INTEGER
+            :                   55 0C A4 19 1F 42 2B 89 71 22 33 8D
+            :                   83 6A B5 3D 67 6B BF 45
+ 799 02   21:                 INTEGER
+            :                   00 9F 61 53 52 54 0B 5C B2 DD DA E7
+            :                   76 1D E2 10 52 5B 43 5E BD
+            :                 }
+            :               }
+            :           }
+            :         }
+ 822 31 1225:       SET {
+ 826 30 1221:         SEQUENCE {
+ 830 02    1:           INTEGER 1
+ 833 30   24:           SEQUENCE {
+ 835 30   18:             SEQUENCE {
+ 837 31   16:               SET {
+ 839 30   14:                 SEQUENCE {
+ 841 06    3:                   OBJECT IDENTIFIER
+            :                     commonName (2 5 4 3)
+            :                     (X.520 id-at (2 5 4))
+ 846 13    7:                   PrintableString 'CarlDSS'
+            :                   }
+            :                 }
+            :               }
+ 855 02    2:             INTEGER 200
+            :             }
+ 859 30    7:           SEQUENCE {
+ 861 06    5:             OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+            :               (OIW)
+            :             }
+ 868 A0 1119:           [0] {
+ 872 30   24:             SEQUENCE {
+ 874 06    9:               OBJECT IDENTIFIER
+            :                 contentType (1 2 840 113549 1 9 3)
+            :                 (PKCS #9 (1 2 840 113549 1 9))
+ 885 31   11:               SET {
+ 887 06    9:                 OBJECT IDENTIFIER
+
+
+
+Hoffman, Ed.                 Informational                     [Page 93]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                   data (1 2 840 113549 1 7 1)
+            :                   (PKCS #7)
+            :                 }
+            :               }
+ 898 30   35:             SEQUENCE {
+ 900 06    9:               OBJECT IDENTIFIER
+            :                 messageDigest (1 2 840 113549 1 9 4)
+            :                 (PKCS #9 (1 2 840 113549 1 9))
+ 911 31   22:               SET {
+ 913 04   20:                 OCTET STRING
+            :                   40 6A EC 08 52 79 BA 6E 16 02 2D 9E
+            :                   06 29 C0 22 96 87 DD 48
+            :                 }
+            :               }
+ 935 30   56:             SEQUENCE {
+ 937 06    3:               OBJECT IDENTIFIER '1 2 5555'
+ 942 31   49:               SET {
+ 944 04   47:                 OCTET STRING
+            :                   'This is a test General ASN Attribut'
+            :                   'e, number 1.'
+            :                 }
+            :               }
+ 993 30   62:             SEQUENCE {
+ 995 06   11:               OBJECT IDENTIFIER
+            :                 id-aa-contentHint
+            :                     (1 2 840 113549 1 9 16 2 4)
+            :                 (S/MIME Authenticated Attributes
+            :                     (1 2 840 113549 1 9 16 2))
+1008 31   47:               SET {
+1010 30   45:                 SEQUENCE {
+1012 0C   32:                   UTF8String
+            :                   'Content Hints Description Buffer'
+1046 06    9:                   OBJECT IDENTIFIER
+            :                     data (1 2 840 113549 1 7 1)
+            :                     (PKCS #7)
+            :                   }
+            :                 }
+            :               }
+1057 30   74:             SEQUENCE {
+1059 06    9:               OBJECT IDENTIFIER
+            :                 sMIMECapabilities
+            :                     (1 2 840 113549 1 9 15)
+            :                 (PKCS #9
+            :                     (1 2 840 113549 1 9))
+1070 31   61:               SET {
+1072 30   59:                 SEQUENCE {
+1074 30    7:                   SEQUENCE {
+1076 06    5:                     OBJECT IDENTIFIER '1 2 3 4 5 6'
+
+
+
+Hoffman, Ed.                 Informational                     [Page 94]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                     }
+1083 30   48:                   SEQUENCE {
+1085 06    6:                     OBJECT IDENTIFIER '1 2 3 4 5 6 77'
+1093 04   38:                     OCTET STRING
+            :                   'Smime Capabilities parameters buffe'
+            :                   'r 2'
+            :                     }
+            :                   }
+            :                 }
+            :               }
+1133 30  109:             SEQUENCE {
+1135 06   11:               OBJECT IDENTIFIER
+            :                 id-aa-securityLabel
+            :                     (1 2 840 113549 1 9 16 2 2)
+            :                 (S/MIME Authenticated Attributes
+            :                     (1 2 840 113549 1 9 16 2))
+1148 31   94:               SET {
+1150 31   92:                 SET {
+1152 02    1:                   INTEGER 1
+1155 06    7:                   OBJECT IDENTIFIER '1 2 3 4 5 6 7 8'
+1164 13   27:                   PrintableString
+            :                   'THIS IS A PRIVACY MARK TEST'
+1193 31   49:                   SET {
+1195 30   47:                     SEQUENCE {
+1197 80    8:                       [0]
+            :                   2A 03 04 05 06 07 86 78
+1207 A1   35:                       [1] {
+1209 13   33:                         PrintableString
+            :                         'THIS IS A TEST SECURITY-'
+            :                         'CATEGORY.'
+            :                         }
+            :                       }
+            :                     }
+            :                   }
+            :                 }
+            :               }
+1244 30  111:             SEQUENCE {
+1246 06   11:               OBJECT IDENTIFIER
+            :                 id-aa-contentReference
+            :                     (1 2 840 113549 1 9 16 2 10)
+            :                 (S/MIME Authenticated Attributes
+            :                     (1 2 840 113549 1 9 16 2))
+1259 31   96:               SET {
+1261 30   94:                 SEQUENCE {
+1263 06    5:                   OBJECT IDENTIFIER '1 2 3 4 5 6'
+1270 04   43:                   OCTET STRING
+            :                   'Content Reference Content Identifie'
+            :                   'r Buffer'
+
+
+
+Hoffman, Ed.                 Informational                     [Page 95]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+1315 04   40:                   OCTET STRING
+            :                   'Content Reference Signature Value B'
+            :                   'uffer'
+            :                   }
+            :                 }
+            :               }
+1357 30  115:             SEQUENCE {
+1359 06   11:               OBJECT IDENTIFIER
+            :                 id-aa-encrypKeyPref
+            :                     (1 2 840 113549 1 9 16 2 11)
+            :                 (S/MIME Authenticated Attributes
+            :                     (1 2 840 113549 1 9 16 2))
+1372 31  100:               SET {
+1374 A0   98:                 [0] {
+1376 30   90:                   SEQUENCE {
+1378 31   11:                     SET {
+1380 30    9:                       SEQUENCE {
+1382 06    3:                         OBJECT IDENTIFIER
+            :                           countryName (2 5 4 6)
+            :                           (X.520 id-at (2 5 4))
+1387 13    2:                         PrintableString 'US'
+            :                         }
+            :                       }
+1391 31   22:                     SET {
+1393 30   20:                       SEQUENCE {
+1395 06    3:                         OBJECT IDENTIFIER
+            :                           organizationName (2 5 4 10)
+            :                           (X.520 id-at (2 5 4))
+1400 13   13:                         PrintableString 'US Government'
+            :                         }
+            :                       }
+1415 31   17:                     SET {
+1417 30   15:                       SEQUENCE {
+1419 06    3:                         OBJECT IDENTIFIER
+            :                           organizationalUnitName
+            :                               (2 5 4 11)
+            :                           (X.520 id-at (2 5 4))
+1424 13    8:                         PrintableString 'VDA Site'
+            :                         }
+            :                       }
+1434 31   12:                     SET {
+1436 30   10:                       SEQUENCE {
+1438 06    3:                         OBJECT IDENTIFIER
+            :                           organizationalUnitName
+            :                               (2 5 4 11)
+            :                           (X.520 id-at (2 5 4))
+1443 13    3:                         PrintableString 'VDA'
+            :                         }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 96]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                       }
+1448 31   18:                     SET {
+1450 30   16:                       SEQUENCE {
+1452 06    3:                         OBJECT IDENTIFIER
+            :                           commonName (2 5 4 3)
+            :                           (X.520 id-at (2 5 4))
+1457 13    9:                         PrintableString 'Daisy RSA'
+            :                         }
+            :                       }
+            :                     }
+1468 02    4:                   INTEGER 173360179
+            :                   }
+            :                 }
+            :               }
+1474 30  252:             SEQUENCE {
+1477 06   11:               OBJECT IDENTIFIER
+            :                 id-aa-mlExpandHistory
+            :                     (1 2 840 113549 1 9 16 2 3)
+            :                 (S/MIME Authenticated Attributes
+            :                     (1 2 840 113549 1 9 16 2))
+1490 31  236:               SET {
+1493 30  233:                 SEQUENCE {
+1496 30  230:                   SEQUENCE {
+1499 04    7:                     OCTET STRING '5738299'
+1508 18   15:                     GeneralizedTime '19990311104433Z'
+1525 A1  201:                     [1] {
+1528 30  198:                       SEQUENCE {
+1531 A4   97:                         [4] {
+1533 30   95:                           SEQUENCE {
+1535 31   11:                             SET {
+1537 30    9:                               SEQUENCE {
+1539 06    3:                                 OBJECT IDENTIFIER
+            :                                   countryName (2 5 4 6)
+            :                                   (X.520 id-at (2 5 4))
+1544 13    2:                                 PrintableString 'US'
+            :                                 }
+            :                               }
+1548 31   22:                             SET {
+1550 30   20:                               SEQUENCE {
+1552 06    3:                                 OBJECT IDENTIFIER
+            :                                   organizationName
+            :                                       (2 5 4 10)
+            :                                   (X.520 id-at (2 5 4))
+1557 13   13:                                 PrintableString
+            :                                 'US Government'
+            :                                 }
+            :                               }
+1572 31   17:                             SET {
+
+
+
+Hoffman, Ed.                 Informational                     [Page 97]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+1574 30   15:                               SEQUENCE {
+1576 06    3:                                 OBJECT IDENTIFIER
+            :                                   organizationalUnitName
+            :                                       (2 5 4 11)
+            :                                   (X.520 id-at (2 5 4))
+1581 13    8:                                 PrintableString
+            :                                 'VDA Site'
+            :                                 }
+            :                               }
+1591 31   12:                             SET {
+1593 30   10:                               SEQUENCE {
+1595 06    3:                                 OBJECT IDENTIFIER
+            :                                   organizationalUnitName
+            :                                       (2 5 4 11)
+            :                                   (X.520 id-at (2 5 4))
+1600 13    3:                                 PrintableString 'VDA'
+            :                                 }
+            :                               }
+1605 31   23:                             SET {
+1607 30   21:                               SEQUENCE {
+1609 06    3:                                 OBJECT IDENTIFIER
+            :                                   commonName (2 5 4 3)
+            :                                   (X.520 id-at (2 5 4))
+1614 13   14:                                 PrintableString
+            :                                 'Bugs Bunny DSA'
+            :                                 }
+            :                               }
+            :                             }
+            :                           }
+1630 A4   97:                         [4] {
+1632 30   95:                           SEQUENCE {
+1634 31   11:                             SET {
+1636 30    9:                               SEQUENCE {
+1638 06    3:                                 OBJECT IDENTIFIER
+            :                                   countryName (2 5 4 6)
+            :                                   (X.520 id-at (2 5 4))
+1643 13    2:                                 PrintableString 'US'
+            :                                 }
+            :                               }
+1647 31   22:                             SET {
+1649 30   20:                               SEQUENCE {
+1651 06    3:                                 OBJECT IDENTIFIER
+            :                                   organizationName
+            :                                       (2 5 4 10)
+            :                                   (X.520 id-at (2 5 4))
+1656 13   13:                                 PrintableString
+            :                                 'US Government'
+            :                                 }
+
+
+
+Hoffman, Ed.                 Informational                     [Page 98]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                               }
+1671 31   17:                             SET {
+1673 30   15:                               SEQUENCE {
+1675 06    3:                                 OBJECT IDENTIFIER
+            :                                   organizationalUnitName
+            :                                       (2 5 4 11)
+            :                                   (X.520 id-at (2 5 4))
+1680 13    8:                                 PrintableString
+            :                                 'VDA Site'
+            :                                 }
+            :                               }
+1690 31   12:                             SET {
+1692 30   10:                               SEQUENCE {
+1694 06    3:                                 OBJECT IDENTIFIER
+            :                                   organizationalUnitName
+            :                                       (2 5 4 11)
+            :                                   (X.520 id-at (2 5 4))
+1699 13    3:                                 PrintableString 'VDA'
+            :                                 }
+            :                               }
+1704 31   23:                             SET {
+1706 30   21:                               SEQUENCE {
+1708 06    3:                                 OBJECT IDENTIFIER
+            :                                   commonName (2 5 4 3)
+            :                                   (X.520 id-at (2 5 4))
+1713 13   14:                                 PrintableString
+            :                                 'Elmer Fudd DSA'
+            :                                 }
+            :                               }
+            :                             }
+            :                           }
+            :                         }
+            :                       }
+            :                     }
+            :                   }
+            :                 }
+            :               }
+1729 30  258:             SEQUENCE {
+1733 06   11:               OBJECT IDENTIFIER
+            :                 id-aa-equivalentLabels
+            :                     (1 2 840 113549 1 9 16 2 9)
+            :                 (S/MIME Authenticated Attributes
+            :                     (1 2 840 113549 1 9 16 2))
+1746 31  242:               SET {
+1749 30  239:                 SEQUENCE {
+1752 31  114:                   SET {
+1754 02    1:                     INTEGER 1
+1757 06    7:                     OBJECT IDENTIFIER '1 2 3 4 5 6 7 9'
+
+
+
+Hoffman, Ed.                 Informational                     [Page 99]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+1766 13   38:                     PrintableString
+            :                   'EQUIVALENT THIS IS A PRIVACY MARK T'
+            :                   'EST'
+1806 31   60:                     SET {
+1808 30   58:                       SEQUENCE {
+1810 80    8:                         [0]
+            :                   2A 03 04 05 06 07 86 78
+1820 A1   46:                         [1] {
+1822 13   44:                           PrintableString
+            :                   'EQUIVALENT THIS IS A TEST SECURITY-'
+            :                   'CATEGORY.'
+            :                           }
+            :                         }
+            :                       }
+            :                     }
+1868 31  121:                   SET {
+1870 02    1:                     INTEGER 1
+1873 06    7:                     OBJECT IDENTIFIER
+            :                     '1 2 3 4 5 6 7 10'
+1882 13   45:                     PrintableString
+            :                   'EQUIVALENT THIS IS A SECOND PRIVACY'
+            :                   ' MARK TEST'
+1929 31   60:                     SET {
+1931 30   58:                       SEQUENCE {
+1933 80    8:                         [0]
+            :                   2A 03 04 05 06 07 86 78
+1943 A1   46:                         [1] {
+1945 13   44:                           PrintableString
+            :                   'EQUIVALENT THIS IS A TEST SECURITY-'
+            :                   'CATEGORY.'
+            :                           }
+            :                         }
+            :                       }
+            :                     }
+            :                   }
+            :                 }
+            :               }
+            :             }
+1991 30    9:           SEQUENCE {
+1993 06    7:             OBJECT IDENTIFIER
+            :               dsaWithSha1 (1 2 840 10040 4 3)
+            :               (ANSI X9.57 algorithm)
+            :             }
+2002 04   47:           OCTET STRING, encapsulates {
+2004 30   45:               SEQUENCE {
+2006 02   21:                 INTEGER
+            :                   00 BC 33 37 65 C4 F7 70 5C 17 49 13
+            :                   AA 4C 85 CA BB 52 91 48 59
+
+
+
+Hoffman, Ed.                 Informational                    [Page 100]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+2029 02   20:                 INTEGER
+            :                   63 96 A2 14 8B CF 57 DE B0 48 5F 6C
+            :                   64 DD 84 04 49 5F 1C CA
+            :                 }
+            :               }
+            :           }
+            :         }
+            :       }
+            :     }
+            :   }
+
+4.11.  SignedData with Certificates Only
+
+   CA SignedData message with no content or signature, containing only
+   Alices's and Carl's certificates.
+
+   0 30 1672: SEQUENCE {
+   4 06    9:   OBJECT IDENTIFIER signedData (1 2 840 113549 1 7 2)
+            :     (PKCS #7)
+  15 A0 1657:   [0] {
+  19 30 1653:     SEQUENCE {
+  23 02    1:       INTEGER 1
+  26 31    0:       SET {}
+  28 30   11:       SEQUENCE {
+  30 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+            :           (PKCS #7)
+            :         }
+  41 A0 1407:       [0] {
+  45 30  667:         SEQUENCE {
+  49 30  602:           SEQUENCE {
+  53 A0    3:             [0] {
+  55 02    1:               INTEGER 2
+            :               }
+  58 02    1:             INTEGER 1
+  61 30    9:             SEQUENCE {
+  63 06    7:               OBJECT IDENTIFIER
+            :                 dsaWithSha1 (1 2 840 10040 4 3)
+            :                 (ANSI X9.57 algorithm)
+            :               }
+  72 30   18:             SEQUENCE {
+  74 31   16:               SET {
+  76 30   14:                 SEQUENCE {
+  78 06    3:                   OBJECT IDENTIFIER
+            :                     commonName (2 5 4 3)
+            :                     (X.520 id-at (2 5 4))
+  83 13    7:                   PrintableString 'CarlDSS'
+            :                   }
+            :                 }
+
+
+
+Hoffman, Ed.                 Informational                    [Page 101]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :               }
+  92 30   30:             SEQUENCE {
+  94 17   13:               UTCTime '990816225050Z'
+ 109 17   13:               UTCTime '391231235959Z'
+            :               }
+ 124 30   18:             SEQUENCE {
+ 126 31   16:               SET {
+ 128 30   14:                 SEQUENCE {
+ 130 06    3:                   OBJECT IDENTIFIER
+            :                     commonName (2 5 4 3)
+            :                     (X.520 id-at (2 5 4))
+ 135 13    7:                   PrintableString 'CarlDSS'
+            :                   }
+            :                 }
+            :               }
+ 144 30  439:             SEQUENCE {
+ 148 30  299:               SEQUENCE {
+ 152 06    7:                 OBJECT IDENTIFIER
+            :                   dsa (1 2 840 10040 4 1)
+            :                   (ANSI X9.57 algorithm)
+ 161 30  286:                 SEQUENCE {
+ 165 02  129:                   INTEGER
+            :                   00 B6 49 18 3E 8A 44 C1 29 71 94 4C
+            :                   01 C4 12 C1 7A 79 CB 54 4D AB 1E 81
+            :                   FB C6 4C B3 0E 94 09 06 EB 01 D4 B1
+            :                   C8 71 4B C7 45 C0 50 25 5D 9C FC DA
+            :                   E4 6D D3 E2 86 48 84 82 7D BA 15 95
+            :                   4A 16 F6 46 ED DD F6 98 D2 BB 7E 8A
+            :                   0A 8A BA 16 7B B9 50 01 48 93 8B EB
+            :                   25 15 51 97 55 DC 8F 53 0E 10 A9 50
+            :                   FC 70 B7 CD 30 54 FD DA DE A8 AA 22
+            :                   B5 A1 AF 8B CC 02 88 E7 8B 70 5F B9
+            :                   AD E1 08 D4 6D 29 2D D6 E9
+ 297 02   21:                   INTEGER
+            :                   00 DD C1 2F DF 53 CE 0B 34 60 77 3E
+            :                   02 A4 BF 8A 5D 98 B9 10 D5
+ 320 02  128:                   INTEGER
+            :                   0C EE 57 9B 4B BD DA B6 07 6A 74 37
+            :                   4F 55 7F 9D ED BC 61 0D EB 46 59 3C
+            :                   56 0B 2B 5B 0C 91 CE A5 62 52 69 CA
+            :                   E1 6D 3E BD BF FE E1 B7 B9 2B 61 3C
+            :                   AD CB AE 45 E3 06 AC 8C 22 9D 9C 44
+            :                   87 0B C7 CD F0 1C D9 B5 4E 5D 73 DE
+            :                   AF 0E C9 1D 5A 51 F5 4F 44 79 35 5A
+            :                   73 AA 7F 46 51 1F A9 42 16 9C 48 EB
+            :                   8A 79 61 B4 D5 2F 53 22 44 63 1F 86
+            :                   B8 A3 58 06 25 F8 29 C0 EF BA E0 75
+            :                   F0 42 C4 63 65 52 9B 0A
+
+
+
+Hoffman, Ed.                 Informational                    [Page 102]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                   }
+            :                 }
+ 451 03  133:               BIT STRING 0 unused bits, encapsulates {
+ 455 02  129:                   INTEGER
+            :                   00 99 87 74 27 03 66 A0 B1 C0 AD DC
+            :                   2C 75 BB E1 6C 44 9C DA 21 6D 4D 47
+            :                   6D B1 62 09 E9 D8 AE 1E F2 3A B4 94
+            :                   B1 A3 8E 7A 9B 71 4E 00 94 C9 B4 25
+            :                   4E B9 60 96 19 24 01 F3 62 0C FE 75
+            :                   C0 FB CE D8 68 00 E3 FD D5 70 4F DF
+            :                   23 96 19 06 94 F4 B1 61 8F 3A 57 B1
+            :                   08 11 A4 0B 26 25 F0 52 76 81 EA 0B
+            :                   62 0D 95 2A E6 86 BA 72 B2 A7 50 83
+            :                   0B AA 27 CD 1B A9 4D 89 9A D7 8D 18
+            :                   39 84 3F 8B C5 56 4D 80 7A
+            :                   }
+            :               }
+ 587 A3   66:             [3] {
+ 589 30   64:               SEQUENCE {
+ 591 30   15:                 SEQUENCE {
+ 593 06    3:                   OBJECT IDENTIFIER
+            :                     basicConstraints (2 5 29 19)
+            :                     (X.509 id-ce (2 5 29))
+ 598 01    1:                   BOOLEAN TRUE
+ 601 04    5:                   OCTET STRING, encapsulates {
+ 603 30    3:                       SEQUENCE {
+ 605 01    1:                         BOOLEAN TRUE
+            :                         }
+            :                       }
+            :                   }
+ 608 30   14:                 SEQUENCE {
+ 610 06    3:                   OBJECT IDENTIFIER
+            :                     keyUsage (2 5 29 15)
+            :                     (X.509 id-ce (2 5 29))
+ 615 01    1:                   BOOLEAN TRUE
+ 618 04    4:                   OCTET STRING, encapsulates {
+ 620 03    2:                       BIT STRING 1 unused bits
+            :                         '1100001'B
+            :                       }
+            :                   }
+ 624 30   29:                 SEQUENCE {
+ 626 06    3:                   OBJECT IDENTIFIER
+            :                     subjectKeyIdentifier (2 5 29 14)
+            :                     (X.509 id-ce (2 5 29))
+ 631 04   22:                   OCTET STRING, encapsulates {
+ 633 04   20:                       OCTET STRING
+            :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+            :                   3D 20 BC 43 2B 93 F1 1F
+
+
+
+Hoffman, Ed.                 Informational                    [Page 103]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                       }
+            :                   }
+            :                 }
+            :               }
+            :             }
+ 655 30    9:           SEQUENCE {
+ 657 06    7:             OBJECT IDENTIFIER
+            :               dsaWithSha1 (1 2 840 10040 4 3)
+            :               (ANSI X9.57 algorithm)
+            :             }
+ 666 03   48:           BIT STRING 0 unused bits, encapsulates {
+ 669 30   45:               SEQUENCE {
+ 671 02   20:                 INTEGER
+            :                   6B A9 F0 4E 7A 5A 79 E3 F9 BE 3D 2B
+            :                   C9 06 37 E9 11 17 A1 13
+ 693 02   21:                 INTEGER
+            :                   00 8F 34 69 2A 8B B1 3C 03 79 94 32
+            :                   4D 12 1F CE 89 FB 46 B2 3B
+            :                 }
+            :               }
+            :           }
+ 716 30  732:         SEQUENCE {
+ 720 30  667:           SEQUENCE {
+ 724 A0    3:             [0] {
+ 726 02    1:               INTEGER 2
+            :               }
+ 729 02    2:             INTEGER 200
+ 733 30    9:             SEQUENCE {
+ 735 06    7:               OBJECT IDENTIFIER
+            :                 dsaWithSha1 (1 2 840 10040 4 3)
+            :                 (ANSI X9.57 algorithm)
+            :               }
+ 744 30   18:             SEQUENCE {
+ 746 31   16:               SET {
+ 748 30   14:                 SEQUENCE {
+ 750 06    3:                   OBJECT IDENTIFIER
+            :                     commonName (2 5 4 3)
+            :                     (X.520 id-at (2 5 4))
+ 755 13    7:                   PrintableString 'CarlDSS'
+            :                   }
+            :                 }
+            :               }
+ 764 30   30:             SEQUENCE {
+ 766 17   13:               UTCTime '990817011049Z'
+ 781 17   13:               UTCTime '391231235959Z'
+            :               }
+ 796 30   19:             SEQUENCE {
+ 798 31   17:               SET {
+
+
+
+Hoffman, Ed.                 Informational                    [Page 104]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+ 800 30   15:                 SEQUENCE {
+ 802 06    3:                   OBJECT IDENTIFIER
+            :                     commonName (2 5 4 3)
+            :                     (X.520 id-at (2 5 4))
+ 807 13    8:                   PrintableString 'AliceDSS'
+            :                   }
+            :                 }
+            :               }
+ 817 30  438:             SEQUENCE {
+ 821 30  299:               SEQUENCE {
+ 825 06    7:                 OBJECT IDENTIFIER
+            :                   dsa (1 2 840 10040 4 1)
+            :                   (ANSI X9.57 algorithm)
+ 834 30  286:                 SEQUENCE {
+ 838 02  129:                   INTEGER
+            :                   00 81 8D CD ED 83 EA 0A 9E 39 3E C2
+            :                   48 28 A3 E4 47 93 DD 0E D7 A8 0E EC
+            :                   53 C5 AB 84 08 4F FF 94 E1 73 48 7E
+            :                   0C D6 F3 44 48 D1 FE 9F AF A4 A1 89
+            :                   2F E1 D9 30 C8 36 DE 3F 9B BF B7 4C
+            :                   DC 5F 69 8A E4 75 D0 37 0C 91 08 95
+            :                   9B DE A7 5E F9 FC F4 9F 2F DD 43 A8
+            :                   8B 54 F1 3F B0 07 08 47 4D 5D 88 C3
+            :                   C3 B5 B3 E3 55 08 75 D5 39 76 10 C4
+            :                   78 BD FF 9D B0 84 97 37 F2 E4 51 1B
+            :                   B5 E4 09 96 5C F3 7E 5B DB
+ 970 02   21:                   INTEGER
+            :                   00 E2 47 A6 1A 45 66 B8 13 C6 DA 8F
+            :                   B8 37 21 2B 62 8B F7 93 CD
+ 993 02  128:                   INTEGER
+            :                   26 38 D0 14 89 32 AA 39 FB 3E 6D D9
+            :                   4B 59 6A 4C 76 23 39 04 02 35 5C F2
+            :                   CB 1A 30 C3 1E 50 5D DD 9B 59 E2 CD
+            :                   AA 05 3D 58 C0 7B A2 36 B8 6E 07 AF
+            :                   7D 8A 42 25 A7 F4 75 CF 4A 08 5E 4B
+            :                   3E 90 F8 6D EA 9C C9 21 8A 3B 76 14
+            :                   E9 CE 2E 5D A3 07 CD 23 85 B8 2F 30
+            :                   01 7C 6D 49 89 11 89 36 44 BD F8 C8
+            :                   95 4A 53 56 B5 E2 F9 73 EC 1A 61 36
+            :                   1F 11 7F C2 BD ED D1 50 FF 98 74 C2
+            :                   D1 81 4A 60 39 BA 36 39
+            :                   }
+            :                 }
+1124 03  132:               BIT STRING 0 unused bits, encapsulates {
+1128 02  128:                   INTEGER
+            :                   5C E3 B9 5A 75 14 96 0B A9 7A DD E3
+            :                   3F A9 EC AC 5E DC BD B7 13 11 34 A6
+            :                   16 89 28 11 23 D9 34 86 67 75 75 13
+
+
+
+Hoffman, Ed.                 Informational                    [Page 105]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                   12 3D 43 5B 6F E5 51 BF FA 89 F2 A2
+            :                   1B 3E 24 7D 3D 07 8D 5B 63 C8 BB 45
+            :                   A5 A0 4A E3 85 D6 CE 06 80 3F E8 23
+            :                   7E 1A F2 24 AB 53 1A B8 27 0D 1E EF
+            :                   08 BF 66 14 80 5C 62 AC 65 FA 15 8B
+            :                   F1 BB 34 D4 D2 96 37 F6 61 47 B2 C4
+            :                   32 84 F0 7E 41 40 FD 46 A7 63 4E 33
+            :                   F2 A5 E2 F4 F2 83 E5 B8
+            :                   }
+            :               }
+1259 A3  129:             [3] {
+1262 30  127:               SEQUENCE {
+1264 30   12:                 SEQUENCE {
+1266 06    3:                   OBJECT IDENTIFIER
+            :                     basicConstraints (2 5 29 19)
+            :                     (X.509 id-ce (2 5 29))
+1271 01    1:                   BOOLEAN TRUE
+1274 04    2:                   OCTET STRING, encapsulates {
+1276 30    0:                       SEQUENCE {}
+            :                       }
+            :                   }
+1278 30   14:                 SEQUENCE {
+1280 06    3:                   OBJECT IDENTIFIER
+            :                     keyUsage (2 5 29 15)
+            :                     (X.509 id-ce (2 5 29))
+1285 01    1:                   BOOLEAN TRUE
+1288 04    4:                   OCTET STRING, encapsulates {
+1290 03    2:                       BIT STRING 6 unused bits
+            :                         '11'B
+            :                       }
+            :                   }
+1294 30   31:                 SEQUENCE {
+1296 06    3:                   OBJECT IDENTIFIER
+            :                     authorityKeyIdentifier (2 5 29 35)
+            :                     (X.509 id-ce (2 5 29))
+1301 04   24:                   OCTET STRING, encapsulates {
+1303 30   22:                       SEQUENCE {
+1305 80   20:                         [0]
+            :                   70 44 3E 82 2E 6F 87 DE 4A D3 75 E3
+            :                   3D 20 BC 43 2B 93 F1 1F
+            :                         }
+            :                       }
+            :                   }
+1327 30   29:                 SEQUENCE {
+1329 06    3:                   OBJECT IDENTIFIER
+            :                     subjectKeyIdentifier (2 5 29 14)
+            :                     (X.509 id-ce (2 5 29))
+1334 04   22:                   OCTET STRING, encapsulates {
+
+
+
+Hoffman, Ed.                 Informational                    [Page 106]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+1336 04   20:                       OCTET STRING
+            :                   BE 6C A1 B3 E3 C1 F7 ED 43 70 A4 CE
+            :                   13 01 E2 FD E3 97 FE CD
+            :                       }
+            :                   }
+1358 30   31:                 SEQUENCE {
+1360 06    3:                   OBJECT IDENTIFIER
+            :                     subjectAltName (2 5 29 17)
+            :                     (X.509 id-ce (2 5 29))
+1365 04   24:                   OCTET STRING, encapsulates {
+1367 30   22:                       SEQUENCE {
+1369 81   20:                         [1] 'AliceDSS@example.com'
+            :                         }
+            :                       }
+            :                   }
+            :                 }
+            :               }
+            :             }
+1391 30    9:           SEQUENCE {
+1393 06    7:             OBJECT IDENTIFIER
+            :               dsaWithSha1 (1 2 840 10040 4 3)
+            :               (ANSI X9.57 algorithm)
+            :             }
+1402 03   48:           BIT STRING 0 unused bits, encapsulates {
+1405 30   45:               SEQUENCE {
+1407 02   20:                 INTEGER
+            :                   55 0C A4 19 1F 42 2B 89 71 22 33 8D
+            :                   83 6A B5 3D 67 6B BF 45
+1429 02   21:                 INTEGER
+            :                   00 9F 61 53 52 54 0B 5C B2 DD DA E7
+            :                   76 1D E2 10 52 5B 43 5E BD
+            :                 }
+            :               }
+            :           }
+            :         }
+1452 A1  219:       [1] {
+1455 30  216:         SEQUENCE {
+1458 30  153:           SEQUENCE {
+1461 30    9:             SEQUENCE {
+1463 06    7:               OBJECT IDENTIFIER
+            :                 dsaWithSha1 (1 2 840 10040 4 3)
+            :                 (ANSI X9.57 algorithm)
+            :               }
+1472 30   18:             SEQUENCE {
+1474 31   16:               SET {
+1476 30   14:                 SEQUENCE {
+1478 06    3:                   OBJECT IDENTIFIER
+            :                     commonName (2 5 4 3)
+
+
+
+Hoffman, Ed.                 Informational                    [Page 107]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :                     (X.520 id-at (2 5 4))
+1483 13    7:                   PrintableString 'CarlDSS'
+            :                   }
+            :                 }
+            :               }
+1492 17   13:             UTCTime '990827070000Z'
+1507 30  105:             SEQUENCE {
+1509 30   19:               SEQUENCE {
+1511 02    2:                 INTEGER 200
+1515 17   13:                 UTCTime '990822070000Z'
+            :                 }
+1530 30   19:               SEQUENCE {
+1532 02    2:                 INTEGER 201
+1536 17   13:                 UTCTime '990822070000Z'
+            :                 }
+1551 30   19:               SEQUENCE {
+1553 02    2:                 INTEGER 211
+1557 17   13:                 UTCTime '990822070000Z'
+            :                 }
+1572 30   19:               SEQUENCE {
+1574 02    2:                 INTEGER 210
+1578 17   13:                 UTCTime '990822070000Z'
+            :                 }
+1593 30   19:               SEQUENCE {
+1595 02    2:                 INTEGER 212
+1599 17   13:                 UTCTime '990824070000Z'
+            :                 }
+            :               }
+            :             }
+1614 30    9:           SEQUENCE {
+1616 06    7:             OBJECT IDENTIFIER
+            :               dsaWithSha1 (1 2 840 10040 4 3)
+            :               (ANSI X9.57 algorithm)
+            :             }
+1625 03   47:           BIT STRING 0 unused bits, encapsulates {
+1628 30   44:               SEQUENCE {
+1630 02   20:                 INTEGER
+            :                   7E 65 52 76 33 FE 34 73 17 D1 F7 96
+            :                   F9 A0 D4 D8 6D 5C 7D 3D
+1652 02   20:                 INTEGER
+            :                   02 7A 5B B7 D5 5B 18 C1 CF 87 EF 7E
+            :                   DA 24 F3 2A 83 9C 35 A1
+            :                 }
+            :               }
+            :           }
+            :         }
+1674 31    0:       SET {}
+            :       }
+
+
+
+Hoffman, Ed.                 Informational                    [Page 108]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+            :     }
+            :   }
+
+5.  Enveloped-data
+
+5.1.  Basic Encrypted Content, TripleDES and RSA
+
+   An EnvelopedData from Alice to Bob of ExContent using TripleDES for
+   encrypting and RSA for key management.  Does not have an
+   OriginatorInfo.
+
+      0 30  286: SEQUENCE {
+      4 06    9:   OBJECT IDENTIFIER
+               :     envelopedData (1 2 840 113549 1 7 3)
+               :     (PKCS #7)
+     15 A0  271:   [0] {
+     19 30  267:     SEQUENCE {
+     23 02    1:       INTEGER 0
+     26 31  192:       SET {
+     29 30  189:         SEQUENCE {
+     32 02    1:           INTEGER 0
+     35 30   38:           SEQUENCE {
+     37 30   18:             SEQUENCE {
+     39 31   16:               SET {
+     41 30   14:                 SEQUENCE {
+     43 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+     48 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+     57 02   16:             INTEGER
+               :               46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :               CD 5D 71 D0
+               :             }
+     75 30   13:           SEQUENCE {
+     77 06    9:             OBJECT IDENTIFIER
+               :               rsaEncryption (1 2 840 113549 1 1 1)
+               :               (PKCS #1)
+     88 05    0:             NULL
+               :             }
+     90 04  128:           OCTET STRING
+               :             0B 71 0D E6 71 88 88 98 B6 96 C1 8F
+               :             70 FD A2 27 DE DA E1 EF 24 6C A4 33
+               :             DF AC E0 E9 9D A2 D3 2C 7A CD 80 B8
+               :             99 9E E6 5F B1 41 B3 72 16 83 E7 FA
+               :             2A 00 8B C7 73 35 78 26 D6 C7 CF 8C
+
+
+
+Hoffman, Ed.                 Informational                    [Page 109]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :             0C 56 DB A5 76 9D 08 38 0E F3 F9 D4
+               :             91 43 58 78 DC 49 B6 EC EE 6C 68 33
+               :             A3 21 1D F0 28 78 1F F7 5D F6 07 73
+               :             4D DF AD 69 31 20 4B 48 A9 75 22 6E
+               :             36 79 15 63 8F CC EB 9D A3 28 A1 D1
+               :             2C 57 F4 DA 1A 2C 75 1F
+               :           }
+               :         }
+    221 30   67:       SEQUENCE {
+    223 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+    234 30   20:         SEQUENCE {
+    236 06    8:           OBJECT IDENTIFIER
+               :             des-EDE3-CBC (1 2 840 113549 3 7)
+               :             (RSADSI encryptionAlgorithm
+               :                 (1 2 840 113549 3))
+    246 04    8:           OCTET STRING
+               :             2D 68 C5 E9 47 06 51 35
+               :           }
+    256 80   32:         [0]
+               :           0E C8 92 7F C6 7D 3F 8D CB AD 8E 0E
+               :           C5 49 3A EB 47 2E D6 55 DE 09 21 4E
+               :           48 EA 4E 27 B1 6E 57 25
+               :         }
+               :       }
+               :     }
+               :   }
+
+5.2.  Basic Encrypted Content, RC2/128 and RSA
+
+   Same as 5.1, except using RC2/128 for encryption and RSA for key
+   management.  An EnvelopedData from Alice to Bob of ExContent using
+   RC2/40 for encrypting and RSA for key management.  Does not have an
+   OriginatorInfo or any attributes.
+
+      0 30  291: SEQUENCE {
+      4 06    9:   OBJECT IDENTIFIER
+               :     envelopedData (1 2 840 113549 1 7 3)
+               :     (PKCS #7)
+     15 A0  276:   [0] {
+     19 30  272:     SEQUENCE {
+     23 02    1:       INTEGER 0
+     26 31  192:       SET {
+     29 30  189:         SEQUENCE {
+     32 02    1:           INTEGER 0
+     35 30   38:           SEQUENCE {
+     37 30   18:             SEQUENCE {
+     39 31   16:               SET {
+
+
+
+Hoffman, Ed.                 Informational                    [Page 110]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+     41 30   14:                 SEQUENCE {
+     43 06    3:                   OBJECT IDENTIFIER
+               :                     commonName (2 5 4 3)
+               :                     (X.520 id-at (2 5 4))
+     48 13    7:                   PrintableString 'CarlRSA'
+               :                   }
+               :                 }
+               :               }
+     57 02   16:             INTEGER
+               :               46 34 6B C7 80 00 56 BC 11 D3 6E 2E
+               :               CD 5D 71 D0
+               :             }
+     75 30   13:           SEQUENCE {
+     77 06    9:             OBJECT IDENTIFIER
+               :               rsaEncryption (1 2 840 113549 1 1 1)
+               :               (PKCS #1)
+     88 05    0:             NULL
+               :             }
+     90 04  128:           OCTET STRING
+               :             85 42 BE E3 0B 2E E5 0F 09 AA 24 CA
+               :             DE DA C1 D3 09 B8 27 2B 25 CB D5 71
+               :             FB C9 9C DB F0 B2 6E A0 8A 5F 1C 9D
+               :             4A ED 98 9D 15 39 26 01 1A 2E 6B F0
+               :             44 39 89 37 3C 6F C7 4A 61 0B 0B 27
+               :             77 AA F9 D4 97 A4 D2 21 3F C2 3F 20
+               :             D4 DC 10 E9 D6 3F 00 DB 9C 82 47 D6
+               :             7E 96 FF 12 6E 87 84 A0 BA ED 81 0F
+               :             56 6D A6 1D EB AB C3 B7 A1 B9 F8 5F
+               :             8B CC 1B 4A E5 14 36 06 61 D0 C7 64
+               :             5F 69 67 91 A9 50 EE D8
+               :           }
+               :         }
+    221 30   72:       SEQUENCE {
+    223 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+    234 30   25:         SEQUENCE {
+    236 06    8:           OBJECT IDENTIFIER rc2CBC (1 2 840 113549 3 2)
+               :             (RSADSI encryptionAlgorithm
+               :                 (1 2 840 113549 3))
+    246 30   13:           SEQUENCE {
+    248 02    1:             INTEGER 58
+    251 04    8:             OCTET STRING
+               :               E8 70 81 E2 EF C5 15 57
+               :             }
+               :           }
+    261 80   32:         [0]
+               :           06 53 0A 7B 8D 5C 16 0D CC D5 76 D6
+               :           8B 59 D6 45 8C 1A 1A 0C E6 1E F3 DE
+
+
+
+Hoffman, Ed.                 Informational                    [Page 111]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+               :           43 56 00 9B 40 8C 38 5D
+               :         }
+               :       }
+               :     }
+               :   }
+
+5.3.  S/MIME application/pkcs7-mime Encrypted Message
+
+   A full S/MIME message, including MIME, that includes the body part
+   from 5.1.
+
+MIME-Version: 1.0
+Message-Id: <00103112005203.00349@amyemily.ig.com>
+Date: Tue, 31 Oct 2000 12:00:52 -0600 (Central Standard Time)
+From: User1
+To: User2
+Subject: Example 5.3
+Content-Type: application/pkcs7-mime;
+        name=smime.p7m;
+        smime-type=enveloped-data
+Content-Transfer-Encoding: base64
+Content-Disposition: attachment; filename=smime.p7m
+
+MIIBHgYJKoZIhvcNAQcDoIIBDzCCAQsCAQAxgcAwgb0CAQAwJjASMRAwDgYDVQQDEwdDYXJ
+sUlNBAhBGNGvHgABWvBHTbi7NXXHQMA0GCSqGSIb3DQEBAQUABIGAC3EN5nGIiJi2lsGPcP
+2iJ97a4e8kbKQz36zg6Z2i0yx6zYC4mZ7mX7FBs3IWg+f6KgCLx3M1eCbWx8+MDFbbpXadC
+DgO8/nUkUNYeNxJtuzubGgzoyEd8Ch4H/dd9gdzTd+taTEgS0ipdSJuNnkVY4/M652jKKHR
+LFf02hosdR8wQwYJKoZIhvcNAQcBMBQGCCqGSIb3DQMHBAgtaMXpRwZRNYAgDsiSf8Z9P43
+LrY4OxUk660cu1lXeCSFOSOpOJ7FuVyU=
+
+6.  Digested-data
+
+   A DigestedData from Alice to Bob of ExContent using SHA-1.
+
+      0 30   94: SEQUENCE {
+      2 06    9:   OBJECT IDENTIFIER digestedData (1 2 840 113549 1 7 5)
+               :     (PKCS #7)
+     13 A0   81:   [0] {
+     15 30   79:     SEQUENCE {
+     17 02    1:       INTEGER 0
+     20 30    7:       SEQUENCE {
+     22 06    5:         OBJECT IDENTIFIER sha1 (1 3 14 3 2 26)
+               :           (OIW)
+               :         }
+     29 30   43:       SEQUENCE {
+     31 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     42 A0   30:         [0] {
+
+
+
+Hoffman, Ed.                 Informational                    [Page 112]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+     44 04   28:           OCTET STRING 'This is some sample content.'
+               :           }
+               :         }
+     74 04   20:       OCTET STRING
+               :         40 6A EC 08 52 79 BA 6E 16 02 2D 9E
+               :         06 29 C0 22 96 87 DD 48
+               :       }
+               :     }
+               :   }
+
+7.  Encrypted-data
+
+7.1.  Simple EncryptedData
+
+   An EncryptedData from Alice to Bob of ExContent with no attributes.
+
+      0 30   87: SEQUENCE {
+      2 06    9:   OBJECT IDENTIFIER
+               :     encryptedData (1 2 840 113549 1 7 6)
+               :     (PKCS #7)
+     13 A0   74:   [0] {
+     15 30   72:     SEQUENCE {
+     17 02    1:       INTEGER 0
+     20 30   67:       SEQUENCE {
+     22 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     33 30   20:         SEQUENCE {
+     35 06    8:           OBJECT IDENTIFIER
+               :             des-EDE3-CBC (1 2 840 113549 3 7)
+               :             (RSADSI encryptionAlgorithm
+               :                 (1 2 840 113549 3))
+     45 04    8:           OCTET STRING
+               :             B3 6B 6B FB 62 31 08 4E
+               :           }
+     55 80   32:         [0]
+               :           FA FC ED DB 3F 18 17 1D 38 89 11 EA
+               :           34 D6 20 DB F4 C3 D9 58 15 EF 93 3B
+               :           9A F5 D7 04 F6 B5 70 E2
+               :         }
+               :       }
+               :     }
+               :   }
+
+   The TripleDES key is:
+
+       73 7c 79 1f 25 ea d0 e0 46 29 25 43 52 f7 dc 62
+       91 e5 cb 26 91 7a da 32
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 113]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+7.2.  EncryptedData with Unprotected Attributes
+
+   An EncryptedData from Alice to Bob of ExContent with unprotected
+   attributes.
+
+      0 30  149: SEQUENCE {
+      3 06    9:   OBJECT IDENTIFIER
+               :     encryptedData (1 2 840 113549 1 7 6)
+               :     (PKCS #7)
+     14 A0  135:   [0] {
+     17 30  132:     SEQUENCE {
+     20 02    1:       INTEGER 2
+     23 30   67:       SEQUENCE {
+     25 06    9:         OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
+               :           (PKCS #7)
+     36 30   20:         SEQUENCE {
+     38 06    8:           OBJECT IDENTIFIER
+               :             des-EDE3-CBC (1 2 840 113549 3 7)
+               :             (RSADSI encryptionAlgorithm
+               :                 (1 2 840 113549 3))
+     48 04    8:           OCTET STRING
+               :             07 27 20 85 90 9E B0 7E
+               :           }
+     58 80   32:         [0]
+               :           D2 20 8F 67 48 8A CB 41 E4 22 68 5D
+               :           BE 77 05 52 26 ED E3 01 BD 00 91 58
+               :           A7 35 6E BC 4B A2 07 33
+               :         }
+     92 A1   58:       [1] {
+     94 30   56:         SEQUENCE {
+     96 06    3:           OBJECT IDENTIFIER '1 2 5555'
+    101 31   49:           SET {
+    103 04   47:             OCTET STRING
+               :               'This is a test General ASN Attribut'
+               :               'e, number 1.'
+               :             }
+               :           }
+               :         }
+               :       }
+               :     }
+               :   }
+
+
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 114]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+8.  Security Considerations
+
+   Because this document shows examples of S/MIME and CMS messages, this
+   document also inherits all of the security considerations from
+   [SMIME-MSG] and [CMS].
+
+   The Perl script in Appendix A writes to the user's local hard drive.
+   A malicious attacker could modify the Perl script in this document.
+   Be sure to read the Perl code carefully before executing it.
+
+9.  References
+
+9.1.  Normative References
+
+   [CMS]       Housley, R., "Cryptographic Message Syntax (CMS)", RFC
+               3852, July 2004.
+
+   [PKIX]      Housley, R., Polk, W., Ford, W., and D. Solo, "Internet
+               X.509 Public Key Infrastructure Certificate and
+               Certificate Revocation List (CRL) Profile", RFC 3280,
+               April 2002.
+
+   [SMIME-MSG] Ramsdell, B., "Secure/Multipurpose Internet Mail
+               Extensions (S/MIME) Version 3.1 Message Specification",
+               RFC 3851, July 2004.
+
+9.2.  Informative References
+
+   [DVCS]      Adams, C., Sylvester, P., Zolotarev, M., and R.
+               Zuccherato, "Internet X.509 Public Key Infrastructure
+               Data Validation and Certification Server Protocols", RFC
+               3029, February 2001.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 115]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+A.  Binaries of the Examples
+
+   This section contains the binaries of the examples shown in the rest
+   of the document.  The binaries are stored in a modified Base64
+   format.  There is a Perl program that, when run over the contents of
+   this document, will extract the following binaries and write them out
+   to disk.  The program requires Perl.
+
+A.1.  How the Binaries and Extractor Works
+
+   The program in the next section looks for lines that begin with a '|'
+   character (or some whitespace followed by a '|'), ignoring all other
+   lines.  If the line begins with '|', the second character tells what
+   kind of line it is:
+
+      A line that begins with |* is a comment
+      A line that begins with |> gives the name of a new file to start
+      A line that begins with |< tells to end the file (and checks the
+            file name for sanity)
+      A line that begins with |anythingelse is a Base64 line
+
+   The program writes out a series of files, so you should run this in
+   an empty directory.  The program will overwrite files (if it can),
+   but won't delete other files already in the directory.
+
+   Run this program with this document as the standard input, such as:
+
+      ./extractsample.pl <draft-ietf-smime-examples
+
+   If you want to extract without the program, copy all the lines
+   between the "|>" and "|<" markers, remove any page breaks, and remove
+   the "|" in the first column of each line.  The result is a valid
+   Base64 blob that can be processed by any Base64 decoder.
+
+A.2.  Example Extraction Program
+
+#!/usr/bin/perl
+
+# CMS Samples extraction program. v 1.1
+
+# Get all the input as an array of lines
+@AllIn = (); while (<STDIN>) { push(@AllIn, $_) }
+
+$Base64Chars = 'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqr' .
+    'stuvwxyz0123456789+/=';
+$LineCount = 0; $CurrFile = '';
+
+foreach $Line (@AllIn) {
+
+
+
+Hoffman, Ed.                 Informational                    [Page 116]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+    $LineCount++;  # Keep the line counter for error messages
+    $Line =~ s/^\s*//;  # Get rid of leading whitespace
+    chomp($Line);  # Get rid of CR or CRLF at the end of the line
+    if(substr($Line, 0, 1) ne '|') { next }  # Not a special line
+    elsif(substr($Line, 1, 1) eq '*') { next }  # It is a comment
+    elsif(substr($Line, 1, 1) eq '>')
+      { &StartNewFile(substr($Line, 2)) }  # Start a new file
+    elsif(substr($Line, 1, 1) eq '<')
+      { &EndCurrFile(substr($Line, 2)) }  # End the current file
+    else { &DoBase64(substr($Line, 1)) }  # It is a line of Base64
+}
+
+sub StartNewFile {
+    $TheNewFile = shift(@_);
+    if($CurrFile ne '') { die "Was about to start a new file at " .
+      "line $LineCount, but the old file, $CurrFile, was open\n" }
+    open(OUT, ">$TheNewFile") or
+      die "Could not open $TheNewFile for writing: $!\n";
+    binmode(OUT);  # This is needed for Windows, is a noop on Unix
+    $CurrFile = $TheNewFile;
+    $LeftOver = 0;  # Amount left from previous Base64 character
+    $NextPos = 0;  # Bit position to start the next Base64 character
+                   #     (bits are numbered 01234567)
+    $OutString = '';  # Holds the text going out to the file
+}
+
+sub EndCurrFile {
+    $FileToEnd = shift(@_);
+    if($CurrFile ne $FileToEnd) { die "Was about to close " .
+      "$FileToEnd at line $LineCount, but that name didn't match " .
+      "the name of the currently open file, $CurrFile\n" }
+    print OUT $OutString;
+    close(OUT);
+    $CurrFile = '';
+}
+
+sub DoBase64 {
+    $TheIn = shift(@_);
+    if($CurrFile eq '') { die "Got some Base64 at line $LineCount, " .
+      "but appear to not be writing to any particular file.\n" }
+    @Chars = split(//, $TheIn);  # Make an array of the characters
+    foreach $ThisChar (@Chars) {
+    # $ThisVal is the position in the string and the Base64 value
+      $ThisVal = index($Base64Chars, $ThisChar);
+      if($ThisVal == -1) { die "At line $LineCount, found the " .
+          "character $ThisChar, which is not a Base64 character\n" }
+      if($ThisVal == 64) { last }  # It is a "=", so we're done
+      if ($NextPos == 0 ) {
+
+
+
+Hoffman, Ed.                 Informational                    [Page 117]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+          # Don't output anything, just fill the left of $LeftOver
+          $LeftOver = $ThisVal * 4;
+          $NextPos = 6;
+      } elsif ($NextPos == 2) {
+        # Add $ThisVal to $LeftOver, output, and reset
+          $OutString .= chr($LeftOver + $ThisVal);
+          $LeftOver = 0;
+          $NextPos = 0;
+      } elsif ($NextPos == 4) {
+          # Add upper 4 bits of $ThisVal to $LeftOver and output
+          $Upper4 = ($ThisVal & 60);
+          $OutString .= chr($LeftOver + ($Upper4/4));
+          $LeftOver = (($ThisVal - $Upper4) * 64);
+          $NextPos = 2;
+      } elsif ($NextPos == 6) {
+          # Add upper 2 bits of $ThisVal to $LeftOver and output
+          $Upper2 = ($ThisVal & 48);
+          $OutString .= chr($LeftOver + ($Upper2/16));
+          $LeftOver = (($ThisVal - $Upper2) * 16);
+          $NextPos = 4;
+      } else { die "\$NextPos has an illegal value: $NextPos." }
+    }
+}
+
+B.  Examples in Order of Appearance
+
+From Section 2.1
+
+***ExContent.bin***
+
+|* Section 2.1
+|>ExContent.bin
+|VGhpcyBpcyBzb21lIHNhbXBsZSBjb250ZW50Lg==
+|<ExContent.bin
+
+From Section 2.2
+
+***AlicePrivDSSSign.pri***
+
+|* Example AlicePrivDSSSign.pri
+|>AlicePrivDSSSign.pri
+|MIIBSwIBADCCASsGByqGSM44BAEwggEeAoGBAIGNze2D6gqeOT7CSCij5EeT3Q7XqA7sU8
+|WrhAhP/5Thc0h+DNbzREjR/p+vpKGJL+HZMMg23j+bv7dM3F9piuR10DcMkQiVm96nXvn8
+|9J8v3UOoi1TxP7AHCEdNXYjDw7Wz41UIddU5dhDEeL3/nbCElzfy5FEbteQJllzzflvbAh
+|UA4kemGkVmuBPG2o+4NyErYov3k80CgYAmONAUiTKqOfs+bdlLWWpMdiM5BAI1XPLLGjDD
+|HlBd3ZtZ4s2qBT1YwHuiNrhuB699ikIlp/R1z0oIXks+kPht6pzJIYo7dhTpzi5dowfNI4
+|W4LzABfG1JiRGJNkS9+MiVSlNWteL5c+waYTYfEX/Cve3RUP+YdMLRgUpgObo2OQQXAhUA
+|u0RG0aXJRgcu0P561pIH8JqFiT8=
+
+
+
+Hoffman, Ed.                 Informational                    [Page 118]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|<AlicePrivDSSSign.pri
+
+***AlicePrivRSASign.pri***
+
+|* Example AlicePrivRSASign.pri
+|>AlicePrivRSASign.pri
+|MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAOCJczmN2PX16Id2OX9OsA
+|W7U4PeD7er3H3HdSkNBS5tEt+mhibU0m+qWCn8l+z6glEPMIC+sVCeRkTxLLvYMs/GaG8H
+|2bBgrL7uNAlqE/X3BQWT3166NVbZYf8Zf8mB5vhs6odAcO+sbSx0ny36VTq5mXcCpkhSjE
+|7zVzhXdFdfAgMBAAECgYAApAPDJ0d2NDRspoa1eUkBSy6K0shissfXSAlqi5H3NvJ11ujN
+|FZBgJzFHNWRNlc1nY860n1asLzduHO4Ovygt9DmQbzTYbghb1WVq2EHzE9ctOV7+M8v/Ke
+|QDCz0Foo+38Y6idjeweVfTLyvehwYifQRmXskbr4saw+yRRKt/IQJBAPbW4CIhTF8KcP8n
+|/OWzUGqd5Q+1hZbGQPqoCrSbmwxVwgEd+TeCihTI8pMOks2lZiG5PNIGv7RVMcncrcqYLd
+|ECQQDo3rARJQnSAlEB3oromFD1d3dhpEWTawhVlnNd9MhbEpMic4t/03B/9aSqu3T9PCJq
+|2jiRKoZbbBTorkye+o4vAkEAl0zwh5sXf+4bgxsUtgtqkF+GJ1Hht6B/9eSI41m5+R6b0y
+|l3OCJI1yKxJZi6PVlTt/oeILLIURYjdZNR56vN8QJALPAkW/qgzYUi6tBuT/pszSHTyOTx
+|hERIZHPXKY9+RozsFd7kUbOU5yyZLVVleyTqo2IfPmxNZ0ERO+G+6YMCgwJAWIjZoVA4hG
+|qrA7y730v0nG+4tCol+/bkBS9u4oiJIW9LJZ7Qq1CTyr9AcewhJcV/+wLpIZa4M83ixpXu
+|b41fKA==
+|<AlicePrivRSASign.pri
+
+***BobPrivRSAEncrypt.pri***
+
+|* Example BobPrivRSAEncrypt.pri
+|>BobPrivRSAEncrypt.pri
+|MIIChQIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAKnhZ5g/OdVf8qCTQV6meY
+|mFyDVdmpFb+x0B2hlwJhcPvaUi0DWFbXqYZhRBXM+3twg7CcmRuBlpN235ZR572akzJKN/
+|O7uvRgGGNjQyywcDWVL8hYsxBLjMGAgUSOZPHPtdYMTgXB9T039T2GkB8QX4enDRvoPGXz
+|jPHCyqaqfrAgMBAAECgYBnzUhMmg2PmMIbZf8ig5xt8KYGHbztpwOIlPIcaw+LNd4Ogngw
+|y+e6alatd8brUXlweQqg9P5F4Kmy9Bnah5jWMIR05PxZbMHGd9ypkdB8MKCixQheIXFD/A
+|0HPfD6bRSeTmPwF1h5HEuYHD09sBvf+iU7o8AsmAX2EAnYh9sDGQJBANDDIsbeopkYdo+N
+|vKZ11mY/1I1FUox29XLE6/BGmvE+XKpVC5va3Wtt+Pw7PAhDk7Vb/s7q/WiEI2Kv8zHCue
+|UCQQDQUfweIrdb7bWOAcjXq/JY1PeClPNTqBlFy2bKKBlf4hAr84/sajB0+E0R9KfEILVH
+|IdxJAfkKICnwJAiEYH2PAkA0umTJSChXdNdVUN5qSO8bKlocSHseIVnDYDubl6nA7xhmqU
+|5iUjiEzuUJiEiUacUgFJlaV/4jbOSnI3vQgLeFAkEAni+zN5r7CwZdV+EJBqRd2ZCWBgVf
+|JAZAcpw6iIWchw+dYhKIFmioNRobQ+g4wJhprwMKSDIETukPj3d9NDAlBwJAVxhn1grSta
+|vCunrnVNqcBU+B1O8BiR4yPWnLMcRSyFRVJQA7HCp8JlDV6abXd8vPFfXuC9WN7rOvTKF8
+|Y0ZB9qANMAsGA1UdDzEEAwIAEA==
+|<BobPrivRSAEncrypt.pri
+
+***CarlPrivDSSSign.pri***
+
+|* Example CarlPrivDSSSign.pri
+|>CarlPrivDSSSign.pri
+|MIIBSgIBADCCASsGByqGSM44BAEwggEeAoGBALZJGD6KRMEpcZRMAcQSwXp5y1RNqx6B+8
+|ZMsw6UCQbrAdSxyHFLx0XAUCVdnPza5G3T4oZIhIJ9uhWVShb2Ru3d9pjSu36KCoq6Fnu5
+|UAFIk4vrJRVRl1Xcj1MOEKlQ/HC3zTBU/dreqKoitaGvi8wCiOeLcF+5reEI1G0pLdbpAh
+|UA3cEv31POCzRgdz4CpL+KXZi5ENUCgYAM7lebS73atgdqdDdPVX+d7bxhDetGWTxWCytb
+
+
+
+Hoffman, Ed.                 Informational                    [Page 119]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|DJHOpWJSacrhbT69v/7ht7krYTyty65F4wasjCKdnESHC8fN8BzZtU5dc96vDskdWlH1T0
+|R5NVpzqn9GUR+pQhacSOuKeWG01S9TIkRjH4a4o1gGJfgpwO+64HXwQsRjZVKbCgQWAhQZ
+|szilIWIxUOV/uT4IRnjRPrXlcg==
+|<CarlPrivDSSSign.pri
+
+***CarlPrivRSASign.pri***
+
+|* Example CarlPrivRSASign.pri
+|>CarlPrivRSASign.pri
+|MIICdgIBADANBgkqhkiG9w0BAQEFAASCAmAwggJcAgEAAoGBAORL/xi4JFf0d/9uc3uTcV
+|y8MxqSknIj2EFG0M0ROgSzjq+Cnb1RHhd68nYsK4Y5p73XjRpT7OQA1ejsojax7eJQ4jIJ
+|ij+fmSWPuE6ruX3VlmXaFqDFvg6uRFvvXvSnKcuC3axE6aqTlCkO+BjWyFde8nbE8hFgOL
+|kbPB2XyWrxAgMBAAECgYEArnPkW19bZlrJ18bvOF9TISovYv7eKZp6hmc2531ieHU9c6C8
+|KQ7zj73Dycm2+LrWE5vDl3rKavC4hWVOD72nqPdUBkG969wgd5DfYZuab3Te6jvUnIdg7X
+|aE8WowN9XgkBb4gEfDGWvtdXe6Su05tl0CRztfG8gcq8vo9SY/pIECQQD/3wmgVgtCUp7E
+|TZOzsEm73ueBfSiZ0LFIugs54Rx7IhgztkD2v9yuHdChrQRxWmEKbjvOMNo2n2UlKbunDn
+|8LAkEA5GloGF/5V9B8ZokPumMdcssgpIF2ZInNfdHCJ6kurHpWmoUH2TADowOrf4iSUCQB
+|qhsHHyBMt8l7Vve2wn6rcwJAVzZsj4wEdmy21O4kRAD4gOKvQgGpDxSE+OcA4I+MJ6QtX6
+|LlbbVjwK1E6XaRpxlJLkb4d4VLO4cE8K/S2FQmlQJAZKEPrFV0G70NYXsXA82w5qcZHYCv
+|8UFI2Bq2iBSgLHrFdtQPDh96KrJuNwSrOUVzukaoD42CXyIUBc+io/N8gwJAJh4dHKGYK+
+|TbOOhXbmtzGYhhOvp0SjaLR2hdUOsm4+p9m05lqa97q0sudlE9qNARq6PWqMAnNh1UC6qn
+|0W2N+g==
+|<CarlPrivRSASign.pri
+
+***DianePrivDSSSign.pri***
+
+|* Example DianePrivDSSSign.pri
+|>DianePrivDSSSign.pri
+|MIIBSwIBADCCASsGByqGSM44BAEwggEeAoGBALZJGD6KRMEpcZRMAcQSwXp5y1RNqx6B+8
+|ZMsw6UCQbrAdSxyHFLx0XAUCVdnPza5G3T4oZIhIJ9uhWVShb2Ru3d9pjSu36KCoq6Fnu5
+|UAFIk4vrJRVRl1Xcj1MOEKlQ/HC3zTBU/dreqKoitaGvi8wCiOeLcF+5reEI1G0pLdbpAh
+|UA3cEv31POCzRgdz4CpL+KXZi5ENUCgYAM7lebS73atgdqdDdPVX+d7bxhDetGWTxWCytb
+|DJHOpWJSacrhbT69v/7ht7krYTyty65F4wasjCKdnESHC8fN8BzZtU5dc96vDskdWlH1T0
+|R5NVpzqn9GUR+pQhacSOuKeWG01S9TIkRjH4a4o1gGJfgpwO+64HXwQsRjZVKbCgQXAhUA
+|lpX54MHgQS0yD4tCUpMq5h4OISk=
+|<DianePrivDSSSign.pri
+
+***DianePrivRSASignEncrypt.pri***
+
+|* Example DianePrivRSASignEncrypt.pri
+|>DianePrivRSASignEncrypt.pri
+|MIICdwIBADANBgkqhkiG9w0BAQEFAASCAmEwggJdAgEAAoGBANb9uMBwxkwl7OrP6ny7om
+|L68OYyOlP/sZJaF/Qg4ZkkggrQ9nz7RMqLJwbxfiYDqXadz+ygLHCW8oNC9tS3KAq7+L9K
+|TBk/B9ugwWAet35n996xw2BJrEXX+MbvCDchk0fu8HM1crACxPMRw15H5Qq3g/HbdGlki0
+|QdlV3NKMCFAgMBAAECgYA9vc3CDmEUW0vnv2AjBCvFazWllkUj/Gl9kzwP0yWWumJSQuKW
+|z/5YgI/rsYy91A1l0Dp3RSSeDOuGgMOsIRFxROOyqKkurBfSo4QlY7W8Lx7d9iH/FSAkW/
+|GAL9VBDjIk99RKMp65SdgZjj85jWK9gPwMJJKT5MPXBZFTu5a2QQJBAPO4P0rRlLCRYBNB
+|kg2NRD93Hf+WI0QI1AtwyRqv6ZCU8rDVX08ZhVChkJGuvQV2UrMi2Kh8jlR/AHJPNnVoc7
+
+
+
+Hoffman, Ed.                 Informational                    [Page 120]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|UCQQDh0ucRVwaucpUiFqoCtFrtTp2CEU+WPIbJEI1WezF1eWnndWg4AEsu0iYy3bHi4CxU
+|gAp1utFmlhuwDqB+0ruRAkEAr7a82yJzQ0HstLVnqaGZ/O/Sjv0d++Upi/4K39TIXlclCl
+|0r1AmgVlvFsWL8IL4ILeMHtaHns//EwKVfrBJcqQJBALmYQfwIUB9zYIoBonxSiiBa6iyJ
+|2aUZ3ZTGG8MlwIJR5O4rmhncc+3pHSfU+GwD3asdCHu1rH/pgpvxiYpx22ECQAEHIZdfem
+|Co/VpcB9+o3vfisTR9/OuRvbBzdMjEvj9YRTAGkLOsacyz9z98rMe4G2WhFjk5sON0fc/N
+|xaxsv+U=
+|<DianePrivRSASignEncrypt.pri
+
+From Section 2.3
+
+***AliceDSSSignByCarlNoInherit.cer***
+
+|* Example AliceDSSSignByCarlNoInherit.cer
+|>AliceDSSSignByCarlNoInherit.cer
+|MIIC3DCCApugAwIBAgICAMgwCQYHKoZIzjgEAzASMRAwDgYDVQQDEwdDYXJsRFNTMB4XDT
+|k5MDgxNzAxMTA0OVoXDTM5MTIzMTIzNTk1OVowEzERMA8GA1UEAxMIQWxpY2VEU1MwggG2
+|MIIBKwYHKoZIzjgEATCCAR4CgYEAgY3N7YPqCp45PsJIKKPkR5PdDteoDuxTxauECE//lO
+|FzSH4M1vNESNH+n6+koYkv4dkwyDbeP5u/t0zcX2mK5HXQNwyRCJWb3qde+fz0ny/dQ6iL
+|VPE/sAcIR01diMPDtbPjVQh11Tl2EMR4vf+dsISXN/LkURu15AmWXPN+W9sCFQDiR6YaRW
+|a4E8baj7g3IStii/eTzQKBgCY40BSJMqo5+z5t2UtZakx2IzkEAjVc8ssaMMMeUF3dm1ni
+|zaoFPVjAe6I2uG4Hr32KQiWn9HXPSgheSz6Q+G3qnMkhijt2FOnOLl2jB80jhbgvMAF8bU
+|mJEYk2RL34yJVKU1a14vlz7BphNh8Rf8K97dFQ/5h0wtGBSmA5ujY5A4GEAAKBgFzjuVp1
+|FJYLqXrd4z+p7Kxe3L23ExE0phaJKBEj2TSGZ3V1ExI9Q1tv5VG/+onyohs+JH09B41bY8
+|i7RaWgSuOF1s4GgD/oI34a8iSrUxq4Jw0e7wi/ZhSAXGKsZfoVi/G7NNTSljf2YUeyxDKE
+|8H5BQP1Gp2NOM/Kl4vTyg+W4o4GBMH8wDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBs
+|AwHwYDVR0jBBgwFoAUcEQ+gi5vh95K03XjPSC8QyuT8R8wHQYDVR0OBBYEFL5sobPjwfft
+|Q3CkzhMB4v3jl/7NMB8GA1UdEQQYMBaBFEFsaWNlRFNTQGV4YW1wbGUuY29tMAkGByqGSM
+|44BAMDMAAwLQIUVQykGR9CK4lxIjONg2q1PWdrv0UCFQCfYVNSVAtcst3a53Yd4hBSW0Ne
+|vQ==
+|<AliceDSSSignByCarlNoInherit.cer
+
+***AliceRSASignByCarl.cer***
+
+|* Example AliceRSASignByCarl.cer
+|>AliceRSASignByCarl.cer
+|MIICLDCCAZWgAwIBAgIQRjRrx4AAVrwR024uxBCzsDANBgkqhkiG9w0BAQUFADASMRAwDg
+|YDVQQDEwdDYXJsUlNBMB4XDTk5MDkxOTAxMDg0N1oXDTM5MTIzMTIzNTk1OVowEzERMA8G
+|A1UEAxMIQWxpY2VSU0EwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOCJczmN2PX16I
+|d2OX9OsAW7U4PeD7er3H3HdSkNBS5tEt+mhibU0m+qWCn8l+z6glEPMIC+sVCeRkTxLLvY
+|Ms/GaG8H2bBgrL7uNAlqE/X3BQWT3166NVbZYf8Zf8mB5vhs6odAcO+sbSx0ny36VTq5mX
+|cCpkhSjE7zVzhXdFdfAgMBAAGjgYEwfzAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/wQEAwIG
+|wDAfBgNVHSMEGDAWgBTp4JAnrHggeprTTPJCN04irp44uzAdBgNVHQ4EFgQUd9K00bdMio
+|qjzkWdzuw8oDrj/1AwHwYDVR0RBBgwFoEUQWxpY2VSU0FAZXhhbXBsZS5jb20wDQYJKoZI
+|hvcNAQEFBQADgYEAPnBHqEjME1iPylFxa042GF0EfoCxjU3MyqOPzH1WyLzPbrMcWakgqg
+|WBqE4lradwFHUv9ceb0Q7pY9Jkt8ZmbnMhVN/0uiVdfUnTlGsiNnRzuErsL2Tt0z3Sp0LF
+|6DeKtNufZ+S9n/n+dO/q+e5jatg/SyUJtdgadq7rm9tJsCI=
+|<AliceRSASignByCarl.cer
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 121]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+***BobRSASignByCarl.cer***
+
+|* Example BobRSASignByCarl.cer
+|>BobRSASignByCarl.cer
+|MIICJzCCAZCgAwIBAgIQRjRrx4AAVrwR024uzV1x0DANBgkqhkiG9w0BAQUFADASMRAwDg
+|YDVQQDEwdDYXJsUlNBMB4XDTk5MDkxOTAxMDkwMloXDTM5MTIzMTIzNTk1OVowETEPMA0G
+|A1UEAxMGQm9iUlNBMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCp4WeYPznVX/Kgk0
+|FepnmJhcg1XZqRW/sdAdoZcCYXD72lItA1hW16mGYUQVzPt7cIOwnJkbgZaTdt+WUee9mp
+|MySjfzu7r0YBhjY0MssHA1lS/IWLMQS4zBgIFEjmTxz7XWDE4FwfU9N/U9hpAfEF+Hpw0b
+|6Dxl84zxwsqmqn6wIDAQABo38wfTAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/wQEAwIFIDAf
+|BgNVHSMEGDAWgBTp4JAnrHggeprTTPJCN04irp44uzAdBgNVHQ4EFgQU6PS4Z9izlqQq8x
+|GqKdOVWoYWtCQwHQYDVR0RBBYwFIESQm9iUlNBQGV4YW1wbGUuY29tMA0GCSqGSIb3DQEB
+|BQUAA4GBAHuOZsXxED8QIEyIcat7QGshM/pKld6dDltrlCEFwPLhfirNnJOIh/uLt359QW
+|Hh5NZt+eIEVWFFvGQnRMChvVl52R1kPCHWRbBdaDOS6qzxV+WBfZjmNZGjOd539OgcOync
+|f1EHl/M28FAK3Zvetl44ESv7V+qJba3JiNiPzyvT
+|<BobRSASignByCarl.cer
+
+***CarlDSSSelf.cer***
+
+|* Example CarlDSSSelf.cer
+|>CarlDSSSelf.cer
+|MIICmzCCAlqgAwIBAgIBATAJBgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MwHhcNOT
+|kwODE2MjI1MDUwWhcNMzkxMjMxMjM1OTU5WjASMRAwDgYDVQQDEwdDYXJsRFNTMIIBtzCC
+|ASsGByqGSM44BAEwggEeAoGBALZJGD6KRMEpcZRMAcQSwXp5y1RNqx6B+8ZMsw6UCQbrAd
+|SxyHFLx0XAUCVdnPza5G3T4oZIhIJ9uhWVShb2Ru3d9pjSu36KCoq6Fnu5UAFIk4vrJRVR
+|l1Xcj1MOEKlQ/HC3zTBU/dreqKoitaGvi8wCiOeLcF+5reEI1G0pLdbpAhUA3cEv31POCz
+|Rgdz4CpL+KXZi5ENUCgYAM7lebS73atgdqdDdPVX+d7bxhDetGWTxWCytbDJHOpWJSacrh
+|bT69v/7ht7krYTyty65F4wasjCKdnESHC8fN8BzZtU5dc96vDskdWlH1T0R5NVpzqn9GUR
+|+pQhacSOuKeWG01S9TIkRjH4a4o1gGJfgpwO+64HXwQsRjZVKbCgOBhQACgYEAmYd0JwNm
+|oLHArdwsdbvhbESc2iFtTUdtsWIJ6diuHvI6tJSxo456m3FOAJTJtCVOuWCWGSQB82IM/n
+|XA+87YaADj/dVwT98jlhkGlPSxYY86V7EIEaQLJiXwUnaB6gtiDZUq5oa6crKnUIMLqifN
+|G6lNiZrXjRg5hD+LxVZNgHqjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAg
+|GGMB0GA1UdDgQWBBRwRD6CLm+H3krTdeM9ILxDK5PxHzAJBgcqhkjOOAQDAzAAMC0CFGup
+|8E56Wnnj+b49K8kGN+kRF6ETAhUAjzRpKouxPAN5lDJNEh/OiftGsjs=
+|<CarlDSSSelf.cer
+
+***CarlRSASelf.cer***
+
+|* Example CarlRSASelf.cer
+|>CarlRSASelf.cer
+|MIIB6zCCAVSgAwIBAgIQRjRrx4AAVrwR024un/JQIDANBgkqhkiG9w0BAQUFADASMRAwDg
+|YDVQQDEwdDYXJsUlNBMB4XDTk5MDgxODA3MDAwMFoXDTM5MTIzMTIzNTk1OVowEjEQMA4G
+|A1UEAxMHQ2FybFJTQTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA5Ev/GLgkV/R3/2
+|5ze5NxXLwzGpKSciPYQUbQzRE6BLOOr4KdvVEeF3rydiwrhjmnvdeNGlPs5ADV6OyiNrHt
+|4lDiMgmKP5+ZJY+4Tqu5fdWWZdoWoMW+Dq5EW+9e9Kcpy4LdrETpqpOUKQ74GNbIV17yds
+|TyEWA4uRs8HZfJavECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC
+|AYYwHQYDVR0OBBYEFOngkCeseCB6mtNM8kI3TiKunji7MA0GCSqGSIb3DQEBBQUAA4GBAL
+|ee1ATT7Snk/4mJFS5M2wzwSA8yYe7EBOwSXS3/D2RZfgrD7Rj941ZAN6cHtfA4EmFQ7e/d
+
+
+
+Hoffman, Ed.                 Informational                    [Page 122]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|P+MLuGGlpJs85p6cVJq2ldbabDu1LUU1nUkBdvq5uTH5+WsSU6D1FGCbfco+8lNrsDdvre
+|Z019v6WuoUQWNdzb7IDsHaao1TNBgC
+|<CarlRSASelf.cer
+
+***DianeDSSSignByCarlInherit.cer***
+
+|* Example DianeDSSSignByCarlInherit.cer
+|>DianeDSSSignByCarlInherit.cer
+|MIIBuDCCAXegAwIBAgICANIwCQYHKoZIzjgEAzASMRAwDgYDVQQDEwdDYXJsRFNTMB4XDT
+|k5MDgxNzAyMDgxMFoXDTM5MTIzMTIzNTk1OVowEzERMA8GA1UEAxMIRGlhbmVEU1MwgZMw
+|CQYHKoZIzjgEAQOBhQACgYEAoAAXeCzufoFTLi5hCA+hm1FSGtpZqHMvEiW2CMvK7ypEdo
+|pSCeq9BSLVD/b9RtevmTgJDhPLTyzdHDT3HL8l/yPTO1nngpc3vjEk2BjI80k5W7fi5Sd+
+|/IxFclt+Po9oTd1GeiK+jv/M2jkpoznln0PpVcnXW6aBZ8zAqs0uxSOjgYEwfzAMBgNVHR
+|MBAf8EAjAAMA4GA1UdDwEB/wQEAwIGwDAfBgNVHSMEGDAWgBRwRD6CLm+H3krTdeM9ILxD
+|K5PxHzAdBgNVHQ4EFgQUZDCZfVzcRQuZOlIvFr9YUN3OKxgwHwYDVR0RBBgwFoEURGlhbm
+|VEU1NAZXhhbXBsZS5jb20wCQYHKoZIzjgEAwMwADAtAhUAoRr4Fw4+XaiM9LZVMx5L4yys
+|uV8CFChLEEVY0hydVTUUGJGyPznftW7T
+|<DianeDSSSignByCarlInherit.cer
+
+***DianeRSASignByCarl.cer***
+
+|* Example DianeRSASignByCarl.cer
+|>DianeRSASignByCarl.cer
+|MIICLDCCAZWgAwIBAgIQRjRrx4AAVrwR024u1ZowkDANBgkqhkiG9w0BAQUFADASMRAwDg
+|YDVQQDEwdDYXJsUlNBMB4XDTk5MDgxOTA3MDAwMFoXDTM5MTIzMTIzNTk1OVowEzERMA8G
+|A1UEAxMIRGlhbmVSU0EwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBANb9uMBwxkwl7O
+|rP6ny7omL68OYyOlP/sZJaF/Qg4ZkkggrQ9nz7RMqLJwbxfiYDqXadz+ygLHCW8oNC9tS3
+|KAq7+L9KTBk/B9ugwWAet35n996xw2BJrEXX+MbvCDchk0fu8HM1crACxPMRw15H5Qq3g/
+|HbdGlki0QdlV3NKMCFAgMBAAGjgYEwfzAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/wQEAwIF
+|4DAfBgNVHSMEGDAWgBTp4JAnrHggeprTTPJCN04irp44uzAdBgNVHQ4EFgQUjPPLdQ6NMf
+|bUKdpEknW4/u1POQwwHwYDVR0RBBgwFoEURGlhbmVSU0FAZXhhbXBsZS5jb20wDQYJKoZI
+|hvcNAQEFBQADgYEAfaYstXhC1nnzMf72QsoPEweSCRvgb7CRGPa/SvvMY3n7gb/dl8eQa8
+|sKNytBagOYxRs+MshFK4YBnBziNu8WwRqSuL5i+1M+SUcLxLnkK1imBoPwsqe7hX7VxtrO
+|nHsxctei6kGrasDdH7kURBjPhFdm6MXmuNwtsx8bKEM2dXo=
+|<DianeRSASignByCarl.cer
+
+From Section 2.4
+
+***CarlDSSCRLForAll.crl***
+
+|* Example CarlDSSCRLForAll.crl
+|>CarlDSSCRLForAll.crl
+|MIHYMIGZMAkGByqGSM44BAMwEjEQMA4GA1UEAxMHQ2FybERTUxcNOTkwODI3MDcwMDAwWj
+|BpMBMCAgDIFw05OTA4MjIwNzAwMDBaMBMCAgDJFw05OTA4MjIwNzAwMDBaMBMCAgDTFw05
+|OTA4MjIwNzAwMDBaMBMCAgDSFw05OTA4MjIwNzAwMDBaMBMCAgDUFw05OTA4MjQwNzAwMD
+|BaMAkGByqGSM44BAMDLwAwLAIUfmVSdjP+NHMX0feW+aDU2G1cfT0CFAJ6W7fVWxjBz4fv
+|ftok8yqDnDWh
+|<CarlDSSCRLForAll.crl
+
+
+
+Hoffman, Ed.                 Informational                    [Page 123]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+***CarlDSSCRLForCarl.crl***
+
+|* Example CarlDSSCRLForCarl.crl
+|>CarlDSSCRLForCarl.crl
+|MIGDMEQwCQYHKoZIzjgEAzASMRAwDgYDVQQDEwdDYXJsRFNTFw05OTA4MjUwNzAwMDBaMB
+|QwEgIBARcNOTkwODIyMDcwMDAwWjAJBgcqhkjOOAQDAzAAMC0CFQCzH8VPej3sdtVg+d55
+|IuxPsJD+lwIUWovDhLxmhxu/eYJbCl0H9rqpBSk=
+|<CarlDSSCRLForCarl.crl
+
+***CarlDSSCRLEmpty.crl***
+
+|* Example CarlDSSCRLEmpty.crl
+|>CarlDSSCRLEmpty.crl
+|MG0wLjAJBgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MXDTk5MDgyMDA3MDAwMFowCQ
+|YHKoZIzjgEAwMwADAtAhRiPzYXMVguZ1B59QlLjK3Ua/RknwIVALU7TqFMe/0Pw42btv7D
+|XW/eZSh9
+|<CarlDSSCRLEmpty.crl
+
+***CarlRSACRLForAll.crl***
+
+|* Example CarlRSACRLForAll.crl
+|>CarlRSACRLForAll.crl
+|MIIBMzCBnTANBgkqhkiG9w0BAQQFADASMRAwDgYDVQQDEwdDYXJsUlNBFw05OTA4MjcwNz
+|AwMDBaMGkwIQIQRjRrx4AAVrwR024uxBCzsBcNOTkwODIyMDcwMDAwWjAhAhBGNGvHgABW
+|vBHTbi7VmjCQFw05OTA4MjIwNzAwMDBaMCECEEY0a8eAAFa8EdNuLs1dcdAXDTk5MDgyND
+|A3MDAwMFowDQYJKoZIhvcNAQEEBQADgYEAv7OXqlPwMiEWK3eSemu7l8jc6vH6ZhYwDrWe
+|XPCB1F6zbsGIa4zUXsVN+0deZvNdq+W0GDZgqE2cPInsbye/NVBxgcK5RFtiiRkSMal7mt
+|PMZssR2QsQR3etTyLZ5X8w8lv8lFGlWHY7H6hGph/2od5Voe0xiGmXDwjT1AxgWx4=
+|<CarlRSACRLForAll.crl
+
+***CarlRSACRLForCarl.crl***
+
+|* Example CarlRSACRLForCarl.crl
+|>CarlRSACRLForCarl.crl
+|MIHsMFcwDQYJKoZIhvcNAQEEBQAwEjEQMA4GA1UEAxMHQ2FybFJTQRcNOTkwODI1MDcwMD
+|AwWjAjMCECEEY0a8eAAFa8EdNuLp/yUCAXDTk5MDgyMjA3MDAwMFowDQYJKoZIhvcNAQEE
+|BQADgYEAIe8h1MEahZVJa8pFYtzXCf+pUS6O2UcY+vjlct1P7XR04/NlMmUoLJodV+XVJg
+|bq1eYjlYSNDome7psML84H96PRa4VMD//m3fzczXMsHn3csHHFTPwBblJXaR45Y98SIjDH
+|E1WUBW4qAKlbxCpmlGLONjPCK2NHJZ3z3nDuAFY=
+|<CarlRSACRLForCarl.crl
+
+***CarlRSACRLEmpty.crl***
+
+|* Example CarlRSACRLEmpty.crl
+|>CarlRSACRLEmpty.crl
+|MIHHMDIwDQYJKoZIhvcNAQEEBQAwEjEQMA4GA1UEAxMHQ2FybFJTQRcNOTkwODIwMDcwMD
+|AwWjANBgkqhkiG9w0BAQQFAAOBgQCpxSG4E3x087UR7ATzIEWGHgtuf4NtX/Q0dgZZJQ4E
+|PYgJiIE3xNwgmPoXgQs3lKy0j3tRiRSky3JzFAe8IpxAoQf8RHyFDwuI0e7hDq/2FnStoa
+
+
+
+Hoffman, Ed.                 Informational                    [Page 124]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|/BAHUAZOqlmvYLCKLblRlfpqe5OUUlCg72XoTn+LlayRjCDriglr6BOoBtyQ==
+|<CarlRSACRLEmpty.crl
+
+Rest of the sections
+
+***3.1.bin***
+
+|* Example 3.1.bin
+|>3.1.bin
+|MIAGCSqGSIb3DQEHAaCAJIAEBFRoaXMEGCBpcyBzb21lIHNhbXBsZSBjb250ZW50LgAAAA
+|AAAA==
+|<3.1.bin
+
+***3.2.bin***
+
+|* Example 3.2.bin
+|>3.2.bin
+|MCsGCSqGSIb3DQEHAaAeBBxUaGlzIGlzIHNvbWUgc2FtcGxlIGNvbnRlbnQu
+|<3.2.bin
+
+***4.1.bin***
+
+|* Example 4.1.bin
+|>4.1.bin
+|MIIDlwYJKoZIhvcNAQcCoIIDiDCCA4QCAQExCTAHBgUrDgMCGjArBgkqhkiG9w0BBwGgHg
+|QcVGhpcyBpcyBzb21lIHNhbXBsZSBjb250ZW50LqCCAuAwggLcMIICm6ADAgECAgIAyDAJ
+|BgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MwHhcNOTkwODE3MDExMDQ5WhcNMzkxMj
+|MxMjM1OTU5WjATMREwDwYDVQQDEwhBbGljZURTUzCCAbYwggErBgcqhkjOOAQBMIIBHgKB
+|gQCBjc3tg+oKnjk+wkgoo+RHk90O16gO7FPFq4QIT/+U4XNIfgzW80RI0f6fr6ShiS/h2T
+|DINt4/m7+3TNxfaYrkddA3DJEIlZvep175/PSfL91DqItU8T+wBwhHTV2Iw8O1s+NVCHXV
+|OXYQxHi9/52whJc38uRRG7XkCZZc835b2wIVAOJHphpFZrgTxtqPuDchK2KL95PNAoGAJj
+|jQFIkyqjn7Pm3ZS1lqTHYjOQQCNVzyyxowwx5QXd2bWeLNqgU9WMB7oja4bgevfYpCJaf0
+|dc9KCF5LPpD4beqcySGKO3YU6c4uXaMHzSOFuC8wAXxtSYkRiTZEvfjIlUpTVrXi+XPsGm
+|E2HxF/wr3t0VD/mHTC0YFKYDm6NjkDgYQAAoGAXOO5WnUUlgupet3jP6nsrF7cvbcTETSm
+|FokoESPZNIZndXUTEj1DW2/lUb/6ifKiGz4kfT0HjVtjyLtFpaBK44XWzgaAP+gjfhryJK
+|tTGrgnDR7vCL9mFIBcYqxl+hWL8bs01NKWN/ZhR7LEMoTwfkFA/UanY04z8qXi9PKD5bij
+|gYEwfzAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/wQEAwIGwDAfBgNVHSMEGDAWgBRwRD6CLm
+|+H3krTdeM9ILxDK5PxHzAdBgNVHQ4EFgQUvmyhs+PB9+1DcKTOEwHi/eOX/s0wHwYDVR0R
+|BBgwFoEUQWxpY2VEU1NAZXhhbXBsZS5jb20wCQYHKoZIzjgEAwMwADAtAhRVDKQZH0IriX
+|EiM42DarU9Z2u/RQIVAJ9hU1JUC1yy3drndh3iEFJbQ169MWMwYQIBATAYMBIxEDAOBgNV
+|BAMTB0NhcmxEU1MCAgDIMAcGBSsOAwIaMAkGByqGSM44BAMELjAsAhQJkf7r0mn1GLfXzV
+|X0geoqQmqtAwIUOgfMwyG+4RpLfz61Ddu6HOq8zYk=
+|<4.1.bin
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 125]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+***4.2.bin***
+
+|* Example 4.2.bin
+|>4.2.bin
+|MIIDUgYJKoZIhvcNAQcCoIIDQzCCAz8CAQExCzAJBgUrDgMCGgUAMCsGCSqGSIb3DQEHAa
+|AeBBxUaGlzIGlzIHNvbWUgc2FtcGxlIGNvbnRlbnQuoIICMDCCAiwwggGVoAMCAQICEEY0
+|a8eAAFa8EdNuLsQQs7AwDQYJKoZIhvcNAQEFBQAwEjEQMA4GA1UEAxMHQ2FybFJTQTAeFw
+|05OTA5MTkwMTA4NDdaFw0zOTEyMzEyMzU5NTlaMBMxETAPBgNVBAMTCEFsaWNlUlNBMIGf
+|MA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDgiXM5jdj19eiHdjl/TrAFu1OD3g+3q9x9x3
+|UpDQUubRLfpoYm1NJvqlgp/Jfs+oJRDzCAvrFQnkZE8Sy72DLPxmhvB9mwYKy+7jQJahP1
+|9wUFk99eujVW2WH/GX/Jgeb4bOqHQHDvrG0sdJ8t+lU6uZl3AqZIUoxO81c4V3RXXwIDAQ
+|ABo4GBMH8wDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBsAwHwYDVR0jBBgwFoAU6eCQ
+|J6x4IHqa00zyQjdOIq6eOLswHQYDVR0OBBYEFHfStNG3TIqKo85Fnc7sPKA64/9QMB8GA1
+|UdEQQYMBaBFEFsaWNlUlNBQGV4YW1wbGUuY29tMA0GCSqGSIb3DQEBBQUAA4GBAD5wR6hI
+|zBNYj8pRcWtONhhdBH6AsY1NzMqjj8x9Vsi8z26zHFmpIKoFgahOJa2ncBR1L/XHm9EO6W
+|PSZLfGZm5zIVTf9LolXX1J05RrIjZ0c7hK7C9k7dM90qdCxeg3irTbn2fkvZ/5/nTv6vnu
+|Y2rYP0slCbXYGnau65vbSbAiMYHLMIHIAgEBMCYwEjEQMA4GA1UEAxMHQ2FybFJTQQIQRj
+|Rrx4AAVrwR024uxBCzsDAJBgUrDgMCGgUAMA0GCSqGSIb3DQEBAQUABIGALyOC0vMJX7gM
+|WOtOnb+JmoHldcSRPdPQ1Xu21f6UoYqs48SE9c1gTieV9s8AhnZ1Pyvw59QCZ6f1x40WBK
+|WztefZMvAk7+cgRNWfB8VTJPrOAR0PFxOnKpWdK+QDlRQL6TkNus5unJ4M6JjmVRPUaG/Q
+|B9eisWJM44+v/eDVXcc=
+|<4.2.bin
+
+***4.3.bin***
+
+|* Example 4.3.bin
+|>4.3.bin
+|MIIDdwYJKoZIhvcNAQcCoIIDaDCCA2QCAQExCTAHBgUrDgMCGjALBgkqhkiG9w0BBwGggg
+|LgMIIC3DCCApugAwIBAgICAMgwCQYHKoZIzjgEAzASMRAwDgYDVQQDEwdDYXJsRFNTMB4X
+|DTk5MDgxNzAxMTA0OVoXDTM5MTIzMTIzNTk1OVowEzERMA8GA1UEAxMIQWxpY2VEU1Mwgg
+|G2MIIBKwYHKoZIzjgEATCCAR4CgYEAgY3N7YPqCp45PsJIKKPkR5PdDteoDuxTxauECE//
+|lOFzSH4M1vNESNH+n6+koYkv4dkwyDbeP5u/t0zcX2mK5HXQNwyRCJWb3qde+fz0ny/dQ6
+|iLVPE/sAcIR01diMPDtbPjVQh11Tl2EMR4vf+dsISXN/LkURu15AmWXPN+W9sCFQDiR6Ya
+|RWa4E8baj7g3IStii/eTzQKBgCY40BSJMqo5+z5t2UtZakx2IzkEAjVc8ssaMMMeUF3dm1
+|nizaoFPVjAe6I2uG4Hr32KQiWn9HXPSgheSz6Q+G3qnMkhijt2FOnOLl2jB80jhbgvMAF8
+|bUmJEYk2RL34yJVKU1a14vlz7BphNh8Rf8K97dFQ/5h0wtGBSmA5ujY5A4GEAAKBgFzjuV
+|p1FJYLqXrd4z+p7Kxe3L23ExE0phaJKBEj2TSGZ3V1ExI9Q1tv5VG/+onyohs+JH09B41b
+|Y8i7RaWgSuOF1s4GgD/oI34a8iSrUxq4Jw0e7wi/ZhSAXGKsZfoVi/G7NNTSljf2YUeyxD
+|KE8H5BQP1Gp2NOM/Kl4vTyg+W4o4GBMH8wDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMC
+|BsAwHwYDVR0jBBgwFoAUcEQ+gi5vh95K03XjPSC8QyuT8R8wHQYDVR0OBBYEFL5sobPjwf
+|ftQ3CkzhMB4v3jl/7NMB8GA1UdEQQYMBaBFEFsaWNlRFNTQGV4YW1wbGUuY29tMAkGByqG
+|SM44BAMDMAAwLQIUVQykGR9CK4lxIjONg2q1PWdrv0UCFQCfYVNSVAtcst3a53Yd4hBSW0
+|NevTFjMGECAQEwGDASMRAwDgYDVQQDEwdDYXJsRFNTAgIAyDAHBgUrDgMCGjAJBgcqhkjO
+|OAQDBC4wLAIUBvvHKiTVNIn3i7X9cySlhsgPWmwCFGZpGbxoWNGNsZ1SP9oUiA39yaG4
+|<4.3.bin
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 126]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+***4.4.bin***
+
+|* Example 4.4.bin
+|>4.4.bin
+|MIILDQYJKoZIhvcNAQcCoIIK/jCCCvoCAQExCTAHBgUrDgMCGjArBgkqhkiG9w0BBwGgHg
+|QcVGhpcyBpcyBzb21lIHNhbXBsZSBjb250ZW50LqCCB68wggIsMIIBlaADAgECAhBGNGvH
+|gABWvBHTbi7EELOwMA0GCSqGSIb3DQEBBQUAMBIxEDAOBgNVBAMTB0NhcmxSU0EwHhcNOT
+|kwOTE5MDEwODQ3WhcNMzkxMjMxMjM1OTU5WjATMREwDwYDVQQDEwhBbGljZVJTQTCBnzAN
+|BgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA4IlzOY3Y9fXoh3Y5f06wBbtTg94Pt6vcfcd1KQ
+|0FLm0S36aGJtTSb6pYKfyX7PqCUQ8wgL6xUJ5GRPEsu9gyz8ZobwfZsGCsvu40CWoT9fcF
+|BZPfXro1Vtlh/xl/yYHm+Gzqh0Bw76xtLHSfLfpVOrmZdwKmSFKMTvNXOFd0V18CAwEAAa
+|OBgTB/MAwGA1UdEwEB/wQCMAAwDgYDVR0PAQH/BAQDAgbAMB8GA1UdIwQYMBaAFOngkCes
+|eCB6mtNM8kI3TiKunji7MB0GA1UdDgQWBBR30rTRt0yKiqPORZ3O7DygOuP/UDAfBgNVHR
+|EEGDAWgRRBbGljZVJTQUBleGFtcGxlLmNvbTANBgkqhkiG9w0BAQUFAAOBgQA+cEeoSMwT
+|WI/KUXFrTjYYXQR+gLGNTczKo4/MfVbIvM9usxxZqSCqBYGoTiWtp3AUdS/1x5vRDulj0m
+|S3xmZucyFU3/S6JV19SdOUayI2dHO4SuwvZO3TPdKnQsXoN4q0259n5L2f+f507+r57mNq
+|2D9LJQm12Bp2ruub20mwIjCCApswggJaoAMCAQICAQEwCQYHKoZIzjgEAzASMRAwDgYDVQ
+|QDEwdDYXJsRFNTMB4XDTk5MDgxNjIyNTA1MFoXDTM5MTIzMTIzNTk1OVowEjEQMA4GA1UE
+|AxMHQ2FybERTUzCCAbcwggErBgcqhkjOOAQBMIIBHgKBgQC2SRg+ikTBKXGUTAHEEsF6ec
+|tUTasegfvGTLMOlAkG6wHUschxS8dFwFAlXZz82uRt0+KGSISCfboVlUoW9kbt3faY0rt+
+|igqKuhZ7uVABSJOL6yUVUZdV3I9TDhCpUPxwt80wVP3a3qiqIrWhr4vMAojni3Bfua3hCN
+|RtKS3W6QIVAN3BL99Tzgs0YHc+AqS/il2YuRDVAoGADO5Xm0u92rYHanQ3T1V/ne28YQ3r
+|Rlk8VgsrWwyRzqViUmnK4W0+vb/+4be5K2E8rcuuReMGrIwinZxEhwvHzfAc2bVOXXPerw
+|7JHVpR9U9EeTVac6p/RlEfqUIWnEjrinlhtNUvUyJEYx+GuKNYBiX4KcDvuuB18ELEY2VS
+|mwoDgYUAAoGBAJmHdCcDZqCxwK3cLHW74WxEnNohbU1HbbFiCenYrh7yOrSUsaOOeptxTg
+|CUybQlTrlglhkkAfNiDP51wPvO2GgA4/3VcE/fI5YZBpT0sWGPOlexCBGkCyYl8FJ2geoL
+|Yg2VKuaGunKyp1CDC6onzRupTYma140YOYQ/i8VWTYB6o0IwQDAPBgNVHRMBAf8EBTADAQ
+|H/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUcEQ+gi5vh95K03XjPSC8QyuT8R8wCQYH
+|KoZIzjgEAwMwADAtAhRrqfBOelp54/m+PSvJBjfpERehEwIVAI80aSqLsTwDeZQyTRIfzo
+|n7RrI7MIIC3DCCApugAwIBAgICAMgwCQYHKoZIzjgEAzASMRAwDgYDVQQDEwdDYXJsRFNT
+|MB4XDTk5MDgxNzAxMTA0OVoXDTM5MTIzMTIzNTk1OVowEzERMA8GA1UEAxMIQWxpY2VEU1
+|MwggG2MIIBKwYHKoZIzjgEATCCAR4CgYEAgY3N7YPqCp45PsJIKKPkR5PdDteoDuxTxauE
+|CE//lOFzSH4M1vNESNH+n6+koYkv4dkwyDbeP5u/t0zcX2mK5HXQNwyRCJWb3qde+fz0ny
+|/dQ6iLVPE/sAcIR01diMPDtbPjVQh11Tl2EMR4vf+dsISXN/LkURu15AmWXPN+W9sCFQDi
+|R6YaRWa4E8baj7g3IStii/eTzQKBgCY40BSJMqo5+z5t2UtZakx2IzkEAjVc8ssaMMMeUF
+|3dm1nizaoFPVjAe6I2uG4Hr32KQiWn9HXPSgheSz6Q+G3qnMkhijt2FOnOLl2jB80jhbgv
+|MAF8bUmJEYk2RL34yJVKU1a14vlz7BphNh8Rf8K97dFQ/5h0wtGBSmA5ujY5A4GEAAKBgF
+|zjuVp1FJYLqXrd4z+p7Kxe3L23ExE0phaJKBEj2TSGZ3V1ExI9Q1tv5VG/+onyohs+JH09
+|B41bY8i7RaWgSuOF1s4GgD/oI34a8iSrUxq4Jw0e7wi/ZhSAXGKsZfoVi/G7NNTSljf2YU
+|eyxDKE8H5BQP1Gp2NOM/Kl4vTyg+W4o4GBMH8wDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8E
+|BAMCBsAwHwYDVR0jBBgwFoAUcEQ+gi5vh95K03XjPSC8QyuT8R8wHQYDVR0OBBYEFL5sob
+|PjwfftQ3CkzhMB4v3jl/7NMB8GA1UdEQQYMBaBFEFsaWNlRFNTQGV4YW1wbGUuY29tMAkG
+|ByqGSM44BAMDMAAwLQIUVQykGR9CK4lxIjONg2q1PWdrv0UCFQCfYVNSVAtcst3a53Yd4h
+|BSW0NevaGB2zCB2DCBmTAJBgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MXDTk5MDgy
+|NzA3MDAwMFowaTATAgIAyBcNOTkwODIyMDcwMDAwWjATAgIAyRcNOTkwODIyMDcwMDAwWj
+|ATAgIA0xcNOTkwODIyMDcwMDAwWjATAgIA0hcNOTkwODIyMDcwMDAwWjATAgIA1BcNOTkw
+|ODI0MDcwMDAwWjAJBgcqhkjOOAQDAy8AMCwCFH5lUnYz/jRzF9H3lvmg1NhtXH09AhQCel
+|u31VsYwc+H737aJPMqg5w1oTGCAiowggImAgEBMBgwEjEQMA4GA1UEAxMHQ2FybERTUwIC
+
+
+
+Hoffman, Ed.                 Informational                    [Page 127]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|AMgwBwYFKw4DAhqgXTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqGSIb3DQEJBT
+|EPFw0wMzA1MTQxNTM5MDBaMCMGCSqGSIb3DQEJBDEWBBRAauwIUnm6bhYCLZ4GKcAilofd
+|SDAJBgcqhkjOOAQDBC4wLAIUO6XgStttWOAZ0QAcT0SaV3pxZmgCFBoRmNYfH680gQHevo
+|vctqhqkWkToYIBYjA+BgsqhkiG9w0BCRACBDEvMC0MIENvbnRlbnQgSGludHMgRGVzY3Jp
+|cHRpb24gQnVmZmVyBgkqhkiG9w0BBwEwggEeBgkqhkiG9w0BCQYxggEPMIIBCwIBATAmMB
+|IxEDAOBgNVBAMTB0NhcmxSU0ECEEY0a8eAAFa8EdNuLsQQs7AwBwYFKw4DAhqgQzAcBgkq
+|hkiG9w0BCQUxDxcNMDMwNTE0MTUzOTAwWjAjBgkqhkiG9w0BCQQxFgQUAl9JTjmYUIWzZt
+|OKH3ueaar72DMwDQYJKoZIhvcNAQEBBQAEgYBtqiAk7XrupV6H3XUfK1QQZfTOm7EseHS8
+|ixxgtduLA55J8it/k249iRTJ42v09n12rj5YH5u7vHwwGU4Q9wLxi1u025q7k7QY0MwryZ
+|GprdlG+GWp4nGV0NROH810b4LoN29aPcvH1F/CgBva04RAaF9WmmL1Ow1sM8PtZz9Dvw==
+|<4.4.bin
+
+***4.5.bin***
+
+|* Example 4.5.bin
+|>4.5.bin
+|MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAaCAJIAEBF
+|RoaXMEGCBpcyBzb21lIHNhbXBsZSBjb250ZW50LgAAAAAAAKCAMIIB6zCCAVSgAwIBAgIQ
+|RjRrx4AAVrwR024un/JQIDANBgkqhkiG9w0BAQUFADASMRAwDgYDVQQDEwdDYXJsUlNBMB
+|4XDTk5MDgxODA3MDAwMFoXDTM5MTIzMTIzNTk1OVowEjEQMA4GA1UEAxMHQ2FybFJTQTCB
+|nzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA5Ev/GLgkV/R3/25ze5NxXLwzGpKSciPYQU
+|bQzRE6BLOOr4KdvVEeF3rydiwrhjmnvdeNGlPs5ADV6OyiNrHt4lDiMgmKP5+ZJY+4Tqu5
+|fdWWZdoWoMW+Dq5EW+9e9Kcpy4LdrETpqpOUKQ74GNbIV17ydsTyEWA4uRs8HZfJavECAw
+|EAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFOng
+|kCeseCB6mtNM8kI3TiKunji7MA0GCSqGSIb3DQEBBQUAA4GBALee1ATT7Snk/4mJFS5M2w
+|zwSA8yYe7EBOwSXS3/D2RZfgrD7Rj941ZAN6cHtfA4EmFQ7e/dP+MLuGGlpJs85p6cVJq2
+|ldbabDu1LUU1nUkBdvq5uTH5+WsSU6D1FGCbfco+8lNrsDdvreZ019v6WuoUQWNdzb7IDs
+|Haao1TNBgCMIICLDCCAZWgAwIBAgIQRjRrx4AAVrwR024uxBCzsDANBgkqhkiG9w0BAQUF
+|ADASMRAwDgYDVQQDEwdDYXJsUlNBMB4XDTk5MDkxOTAxMDg0N1oXDTM5MTIzMTIzNTk1OV
+|owEzERMA8GA1UEAxMIQWxpY2VSU0EwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOCJ
+|czmN2PX16Id2OX9OsAW7U4PeD7er3H3HdSkNBS5tEt+mhibU0m+qWCn8l+z6glEPMIC+sV
+|CeRkTxLLvYMs/GaG8H2bBgrL7uNAlqE/X3BQWT3166NVbZYf8Zf8mB5vhs6odAcO+sbSx0
+|ny36VTq5mXcCpkhSjE7zVzhXdFdfAgMBAAGjgYEwfzAMBgNVHRMBAf8EAjAAMA4GA1UdDw
+|EB/wQEAwIGwDAfBgNVHSMEGDAWgBTp4JAnrHggeprTTPJCN04irp44uzAdBgNVHQ4EFgQU
+|d9K00bdMioqjzkWdzuw8oDrj/1AwHwYDVR0RBBgwFoEUQWxpY2VSU0FAZXhhbXBsZS5jb2
+|0wDQYJKoZIhvcNAQEFBQADgYEAPnBHqEjME1iPylFxa042GF0EfoCxjU3MyqOPzH1WyLzP
+|brMcWakgqgWBqE4lradwFHUv9ceb0Q7pY9Jkt8ZmbnMhVN/0uiVdfUnTlGsiNnRzuErsL2
+|Tt0z3Sp0LF6DeKtNufZ+S9n/n+dO/q+e5jatg/SyUJtdgadq7rm9tJsCIAADGByzCByAIB
+|ATAmMBIxEDAOBgNVBAMTB0NhcmxSU0ECEEY0a8eAAFa8EdNuLsQQs7AwCQYFKw4DAhoFAD
+|ANBgkqhkiG9w0BAQEFAASBgC8jgtLzCV+4DFjrTp2/iZqB5XXEkT3T0NV7ttX+lKGKrOPE
+|hPXNYE4nlfbPAIZ2dT8r8OfUAmen9ceNFgSls7Xn2TLwJO/nIETVnwfFUyT6zgEdDxcTpy
+|qVnSvkA5UUC+k5DbrObpyeDOiY5lUT1Ghv0AfXorFiTOOPr/3g1V3HAAAAAAAA
+|<4.5.bin
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 128]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+***4.6.bin***
+
+|* Example 4.6.bin
+|>4.6.bin
+|MIIFtwYJKoZIhvcNAQcCoIIFqDCCBaQCAQExCTAHBgUrDgMCGjArBgkqhkiG9w0BBwGgHg
+|QcVGhpcyBpcyBzb21lIHNhbXBsZSBjb250ZW50LqCCBJwwggG4MIIBd6ADAgECAgIA0jAJ
+|BgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MwHhcNOTkwODE3MDIwODEwWhcNMzkxMj
+|MxMjM1OTU5WjATMREwDwYDVQQDEwhEaWFuZURTUzCBkzAJBgcqhkjOOAQBA4GFAAKBgQCg
+|ABd4LO5+gVMuLmEID6GbUVIa2lmocy8SJbYIy8rvKkR2ilIJ6r0FItUP9v1G16+ZOAkOE8
+|tPLN0cNPccvyX/I9M7WeeClze+MSTYGMjzSTlbt+LlJ378jEVyW34+j2hN3UZ6Ir6O/8za
+|OSmjOeWfQ+lVyddbpoFnzMCqzS7FI6OBgTB/MAwGA1UdEwEB/wQCMAAwDgYDVR0PAQH/BA
+|QDAgbAMB8GA1UdIwQYMBaAFHBEPoIub4feStN14z0gvEMrk/EfMB0GA1UdDgQWBBRkMJl9
+|XNxFC5k6Ui8Wv1hQ3c4rGDAfBgNVHREEGDAWgRREaWFuZURTU0BleGFtcGxlLmNvbTAJBg
+|cqhkjOOAQDAzAAMC0CFQChGvgXDj5dqIz0tlUzHkvjLKy5XwIUKEsQRVjSHJ1VNRQYkbI/
+|Od+1btMwggLcMIICm6ADAgECAgIAyDAJBgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1
+|MwHhcNOTkwODE3MDExMDQ5WhcNMzkxMjMxMjM1OTU5WjATMREwDwYDVQQDEwhBbGljZURT
+|UzCCAbYwggErBgcqhkjOOAQBMIIBHgKBgQCBjc3tg+oKnjk+wkgoo+RHk90O16gO7FPFq4
+|QIT/+U4XNIfgzW80RI0f6fr6ShiS/h2TDINt4/m7+3TNxfaYrkddA3DJEIlZvep175/PSf
+|L91DqItU8T+wBwhHTV2Iw8O1s+NVCHXVOXYQxHi9/52whJc38uRRG7XkCZZc835b2wIVAO
+|JHphpFZrgTxtqPuDchK2KL95PNAoGAJjjQFIkyqjn7Pm3ZS1lqTHYjOQQCNVzyyxowwx5Q
+|Xd2bWeLNqgU9WMB7oja4bgevfYpCJaf0dc9KCF5LPpD4beqcySGKO3YU6c4uXaMHzSOFuC
+|8wAXxtSYkRiTZEvfjIlUpTVrXi+XPsGmE2HxF/wr3t0VD/mHTC0YFKYDm6NjkDgYQAAoGA
+|XOO5WnUUlgupet3jP6nsrF7cvbcTETSmFokoESPZNIZndXUTEj1DW2/lUb/6ifKiGz4kfT
+|0HjVtjyLtFpaBK44XWzgaAP+gjfhryJKtTGrgnDR7vCL9mFIBcYqxl+hWL8bs01NKWN/Zh
+|R7LEMoTwfkFA/UanY04z8qXi9PKD5bijgYEwfzAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/w
+|QEAwIGwDAfBgNVHSMEGDAWgBRwRD6CLm+H3krTdeM9ILxDK5PxHzAdBgNVHQ4EFgQUvmyh
+|s+PB9+1DcKTOEwHi/eOX/s0wHwYDVR0RBBgwFoEUQWxpY2VEU1NAZXhhbXBsZS5jb20wCQ
+|YHKoZIzjgEAwMwADAtAhRVDKQZH0IriXEiM42DarU9Z2u/RQIVAJ9hU1JUC1yy3drndh3i
+|EFJbQ169MYHGMGECAQEwGDASMRAwDgYDVQQDEwdDYXJsRFNTAgIAyDAHBgUrDgMCGjAJBg
+|cqhkjOOAQDBC4wLAIUSCTei4XyFq/sgmGpVNAtBKHMWk8CFBft1XcC7nUT2BC9PZcXIIi7
+|/XuBMGECAQEwGDASMRAwDgYDVQQDEwdDYXJsRFNTAgIA0jAHBgUrDgMCGjAJBgcqhkjOOA
+|QDBC4wLAIUFf+BTYytgE6bNVgEN25jbulbg/oCFAZ+WE4rMYRB7Ul5OD530qaMdQgh
+|<4.6.bin
+
+***4.7.bin***
+
+|* Example 4.7.bin
+|>4.7.bin
+|MIIDlAYJKoZIhvcNAQcCoIIDhTCCA4ECAQMxCTAHBgUrDgMCGjArBgkqhkiG9w0BBwGgHg
+|QcVGhpcyBpcyBzb21lIHNhbXBsZSBjb250ZW50LqCCAuAwggLcMIICm6ADAgECAgIAyDAJ
+|BgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MwHhcNOTkwODE3MDExMDQ5WhcNMzkxMj
+|MxMjM1OTU5WjATMREwDwYDVQQDEwhBbGljZURTUzCCAbYwggErBgcqhkjOOAQBMIIBHgKB
+|gQCBjc3tg+oKnjk+wkgoo+RHk90O16gO7FPFq4QIT/+U4XNIfgzW80RI0f6fr6ShiS/h2T
+|DINt4/m7+3TNxfaYrkddA3DJEIlZvep175/PSfL91DqItU8T+wBwhHTV2Iw8O1s+NVCHXV
+|OXYQxHi9/52whJc38uRRG7XkCZZc835b2wIVAOJHphpFZrgTxtqPuDchK2KL95PNAoGAJj
+|jQFIkyqjn7Pm3ZS1lqTHYjOQQCNVzyyxowwx5QXd2bWeLNqgU9WMB7oja4bgevfYpCJaf0
+|dc9KCF5LPpD4beqcySGKO3YU6c4uXaMHzSOFuC8wAXxtSYkRiTZEvfjIlUpTVrXi+XPsGm
+|E2HxF/wr3t0VD/mHTC0YFKYDm6NjkDgYQAAoGAXOO5WnUUlgupet3jP6nsrF7cvbcTETSm
+
+
+
+Hoffman, Ed.                 Informational                    [Page 129]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|FokoESPZNIZndXUTEj1DW2/lUb/6ifKiGz4kfT0HjVtjyLtFpaBK44XWzgaAP+gjfhryJK
+|tTGrgnDR7vCL9mFIBcYqxl+hWL8bs01NKWN/ZhR7LEMoTwfkFA/UanY04z8qXi9PKD5bij
+|gYEwfzAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/wQEAwIGwDAfBgNVHSMEGDAWgBRwRD6CLm
+|+H3krTdeM9ILxDK5PxHzAdBgNVHQ4EFgQUvmyhs+PB9+1DcKTOEwHi/eOX/s0wHwYDVR0R
+|BBgwFoEUQWxpY2VEU1NAZXhhbXBsZS5jb20wCQYHKoZIzjgEAwMwADAtAhRVDKQZH0IriX
+|EiM42DarU9Z2u/RQIVAJ9hU1JUC1yy3drndh3iEFJbQ169MWAwXgIBA4AUvmyhs+PB9+1D
+|cKTOEwHi/eOX/s0wBwYFKw4DAhowCQYHKoZIzjgEAwQvMC0CFQCJw2t7VvfDEgBl8Tf1xF
+|gXjRFXgwIUCw9DOqrs3nphLIyc9UGZpzwgw7c=
+|<4.7.bin
+
+***4.8.eml***
+
+|* Example 4.8.eml
+|>4.8.eml
+|TUlNRS1WZXJzaW9uOiAxLjAKVG86IFVzZXIyQGV4YW1wbGVzLmNvbQpGcm9tOiBhbGljZU
+|Rzc0BleGFtcGxlcy5jb20KU3ViamVjdDogRXhhbXBsZSA0LjgKTWVzc2FnZS1JZDogPDAy
+|MDkwNjAwMjU1MDMwMC4yNDlAZXhhbXBsZXMuY29tPgpEYXRlOiBGcmksIDA2IFNlcCAyMD
+|AyIDAwOjI1OjIxIC0wMzAwIApDb250ZW50LVR5cGU6IG11bHRpcGFydC9zaWduZWQ7CiAg
+|ICBtaWNhbGc9U0hBMTsKICAgIGJvdW5kYXJ5PSItLS0tPV9OZXh0Qm91bmRyeV9fX19Gcm
+|ksXzA2X1NlcF8yMDAyXzAwOjI1OjIxIjsKICAgIHByb3RvY29sPSJhcHBsaWNhdGlvbi9w
+|a2NzNy1zaWduYXR1cmUiCgpUaGlzIGlzIGEgbXVsdGktcGFydCBtZXNzYWdlIGluIE1JTU
+|UgZm9ybWF0LgoKLS0tLS0tPV9OZXh0Qm91bmRyeV9fX19GcmksXzA2X1NlcF8yMDAyXzAw
+|OjI1OjIxCgpUaGlzIGlzIHNvbWUgc2FtcGxlIGNvbnRlbnQuCi0tLS0tLT1fTmV4dEJvdW
+|5kcnlfX19fRnJpLF8wNl9TZXBfMjAwMl8wMDoyNToyMQpDb250ZW50LVR5cGU6IGFwcGxp
+|Y2F0aW9uL3BrY3M3LXNpZ25hdHVyZTsgbmFtZT1zbWltZS5wN3MKQ29udGVudC1UcmFuc2
+|Zlci1FbmNvZGluZzogYmFzZTY0CkNvbnRlbnQtRGlzcG9zaXRpb246IGF0dGFjaG1lbnQ7
+|IGZpbGVuYW1lPXNtaW1lLnA3cwoKTUlJRGR3WUpLb1pJaHZjTkFRY0NvSUlEYURDQ0EyUU
+|NBUUV4Q1RBSEJnVXJEZ01DR2pBTEJna3Foa2lHOXcwQkJ3R2dnZ0xnTUlJQwozRENDQXB1
+|Z0F3SUJBZ0lDQU1nd0NRWUhLb1pJempnRUF6QVNNUkF3RGdZRFZRUURFd2REWVhKc1JGTl
+|RNQjRYRFRrNU1EZ3hOekF4Ck1UQTBPVm9YRFRNNU1USXpNVEl6TlRrMU9Wb3dFekVSTUE4
+|R0ExVUVBeE1JUVd4cFkyVkVVMU13Z2dHMk1JSUJLd1lIS29aSXpqZ0UKQVRDQ0FSNENnWU
+|VBZ1kzTjdZUHFDcDQ1UHNKSUtLUGtSNVBkRHRlb0R1eFR4YXVFQ0UvL2xPRnpTSDRNMXZO
+|RVNOSCtuNitrb1lrdgo0ZGt3eURiZVA1dS90MHpjWDJtSzVIWFFOd3lSQ0pXYjNxZGUrZn
+|owbnkvZFE2aUxWUEUvc0FjSVIwMWRpTVBEdGJQalZRaDExVGwyCkVNUjR2Zitkc0lTWE4v
+|TGtVUnUxNUFtV1hQTitXOXNDRlFEaVI2WWFSV2E0RThiYWo3ZzNJU3RpaS9lVHpRS0JnQ1
+|k0MEJTSk1xbzUKK3o1dDJVdFpha3gySXprRUFqVmM4c3NhTU1NZVVGM2RtMW5pemFvRlBW
+|akFlNkkydUc0SHIzMktRaVduOUhYUFNnaGVTejZRK0czcQpuTWtoaWp0MkZPbk9MbDJqQj
+|gwamhiZ3ZNQUY4YlVtSkVZazJSTDM0eUpWS1UxYTE0dmx6N0JwaE5oOFJmOEs5N2RGUS81
+|aDB3dEdCClNtQTV1alk1QTRHRUFBS0JnRnpqdVZwMUZKWUxxWHJkNHorcDdLeGUzTDIzRX
+|hFMHBoYUpLQkVqMlRTR1ozVjFFeEk5UTF0djVWRy8KK29ueW9ocytKSDA5QjQxYlk4aTdS
+|YVdnU3VPRjFzNEdnRC9vSTM0YThpU3JVeHE0SncwZTd3aS9aaFNBWEdLc1pmb1ZpL0c3Tk
+|5UUwpsamYyWVVleXhES0U4SDVCUVAxR3AyTk9NL0tsNHZUeWcrVzRvNEdCTUg4d0RBWURW
+|UjBUQVFIL0JBSXdBREFPQmdOVkhROEJBZjhFCkJBTUNCc0F3SHdZRFZSMGpCQmd3Rm9BVW
+|NFUStnaTV2aDk1SzAzWGpQU0M4UXl1VDhSOHdIUVlEVlIwT0JCWUVGTDVzb2JQandmZnQK
+|UTNDa3poTUI0djNqbC83Tk1COEdBMVVkRVFRWU1CYUJGRUZzYVdObFJGTlRRR1Y0WVcxd2
+|JHVXVZMjl0TUFrR0J5cUdTTTQ0QkFNRApNQUF3TFFJVVZReWtHUjlDSzRseElqT05nMnEx
+|UFdkcnYwVUNGUUNmWVZOU1ZBdGNzdDNhNTNZZDRoQlNXME5ldlRGak1HRUNBUUV3CkdEQV
+|NNUkF3RGdZRFZRUURFd2REWVhKc1JGTlRBZ0lBeURBSEJnVXJEZ01DR2pBSkJnY3Foa2pP
+
+
+
+Hoffman, Ed.                 Informational                    [Page 130]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|T0FRREJDNHdMQUlVTS9tR2Y2Z2sKZ3A5WjBYdFJkR2ltSmVCL0J4VUNGR0ZGSnF3WVJ0MV
+|dZY0lPUW9HaWFvd3FHelZJCgotLS0tLS09X05leHRCb3VuZHJ5X19fX0ZyaSxfMDZfU2Vw
+|XzIwMDJfMDA6MjU6MjEtLQo=
+|<4.8.eml
+
+***4.9.eml***
+
+|* Example 4.9.eml
+|>4.9.eml
+|TUlNRS1WZXJzaW9uOiAxLjAKVG86IFVzZXIyQGV4YW1wbGVzLmNvbQpGcm9tOiBhbGljZU
+|Rzc0BleGFtcGxlcy5jb20KU3ViamVjdDogRXhhbXBsZSA0LjkKTWVzc2FnZS1JZDogPDAy
+|MTAzMTE2NDU0MDMwMC4zMDRAZXhhbXBsZXMuY29tPgpEYXRlOiBUaHUsIDMxIE9jdCAyMD
+|AyIDE2OjQ1OjE0IC0wMzAwIApDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL3BrY3M3LW1p
+|bWU7IHNtaW1lLXR5cGU9c2lnbmVkLWRhdGE7CiAgICBuYW1lPXNtaW1lLnA3bQpDb250ZW
+|50LVRyYW5zZmVyLUVuY29kaW5nOiBiYXNlNjQKQ29udGVudC1EaXNwb3NpdGlvbjogYXR0
+|YWNobWVudDsgZmlsZW5hbWU9c21pbWUucDdtCgpNSUlEbVFZSktvWklodmNOQVFjQ29JSU
+|RpakNDQTRZQ0FRRXhDVEFIQmdVckRnTUNHakF0QmdrcWhraUc5dzBCQndHZ0lBUWVEUXBV
+|CmFHbHpJR2x6SUhOdmJXVWdjMkZ0Y0d4bElHTnZiblJsYm5RdW9JSUM0RENDQXR3d2dnS2
+|JvQU1DQVFJQ0FnRElNQWtHQnlxR1NNNDQKQkFNd0VqRVFNQTRHQTFVRUF4TUhRMkZ5YkVS
+|VFV6QWVGdzA1T1RBNE1UY3dNVEV3TkRsYUZ3MHpPVEV5TXpFeU16VTVOVGxhTUJNeApFVE
+|FQQmdOVkJBTVRDRUZzYVdObFJGTlRNSUlCdGpDQ0FTc0dCeXFHU000NEJBRXdnZ0VlQW9H
+|QkFJR056ZTJENmdxZU9UN0NTQ2lqCjVFZVQzUTdYcUE3c1U4V3JoQWhQLzVUaGMwaCtETm
+|J6UkVqUi9wK3ZwS0dKTCtIWk1NZzIzaitidjdkTTNGOXBpdVIxMERjTWtRaVYKbTk2blh2
+|bjg5Sjh2M1VPb2kxVHhQN0FIQ0VkTlhZakR3N1d6NDFVSWRkVTVkaERFZUwzL25iQ0Vsem
+|Z5NUZFYnRlUUpsbHp6Zmx2YgpBaFVBNGtlbUdrVm11QlBHMm8rNE55RXJZb3YzazgwQ2dZ
+|QW1PTkFVaVRLcU9mcytiZGxMV1dwTWRpTTVCQUkxWFBMTEdqRERIbEJkCjNadFo0czJxQl
+|QxWXdIdWlOcmh1QjY5OWlrSWxwL1IxejBvSVhrcytrUGh0NnB6SklZbzdkaFRwemk1ZG93
+|Zk5JNFc0THpBQmZHMUoKaVJHSk5rUzkrTWlWU2xOV3RlTDVjK3dhWVRZZkVYL0N2ZTNSVV
+|ArWWRNTFJnVXBnT2JvMk9RT0JoQUFDZ1lCYzQ3bGFkUlNXQzZsNgozZU0vcWV5c1h0eTl0
+|eE1STktZV2lTZ1JJOWswaG1kMWRSTVNQVU5iYitWUnYvcUo4cUliUGlSOVBRZU5XMlBJdT
+|BXbG9FcmpoZGJPCkJvQS82Q04rR3ZJa3ExTWF1Q2NOSHU4SXYyWVVnRnhpckdYNkZZdnh1
+|elRVMHBZMzltRkhzc1F5aFBCK1FVRDlScWRqVGpQeXBlTDAKOG9QbHVLT0JnVEIvTUF3R0
+|ExVWRFd0VCL3dRQ01BQXdEZ1lEVlIwUEFRSC9CQVFEQWdiQU1COEdBMVVkSXdRWU1CYUFG
+|SEJFUG9JdQpiNGZlU3ROMTR6MGd2RU1yay9FZk1CMEdBMVVkRGdRV0JCUytiS0d6NDhIMz
+|dVTndwTTRUQWVMOTQ1Zit6VEFmQmdOVkhSRUVHREFXCmdSUkJiR2xqWlVSVFUwQmxlR0Z0
+|Y0d4bExtTnZiVEFKQmdjcWhrak9PQVFEQXpBQU1DMENGRlVNcEJrZlFpdUpjU0l6allOcX
+|RUMW4KYTc5RkFoVUFuMkZUVWxRTFhMTGQydWQySGVJUVVsdERYcjB4WXpCaEFnRUJNQmd3
+|RWpFUU1BNEdBMVVFQXhNSFEyRnliRVJUVXdJQwpBTWd3QndZRkt3NERBaG93Q1FZSEtvWk
+|l6amdFQXdRdU1Dd0NGRDFjU1c2TElVRnplWGxlM1lJNVNLU0Jlci9zQWhRbUNxN3MvQ1RG
+|CkhPRWpnQVNlVWpiTXB4NWc2QT09Cg==
+|<4.9.eml
+
+***4.10.bin***
+
+|* Example 4.10.bin
+|>4.10.bin
+|MIIH/wYJKoZIhvcNAQcCoIIH8DCCB+wCAQExCTAHBgUrDgMCGjArBgkqhkiG9w0BBwGgHg
+|QcVGhpcyBpcyBzb21lIHNhbXBsZSBjb250ZW50LqCCAuAwggLcMIICm6ADAgECAgIAyDAJ
+
+
+
+Hoffman, Ed.                 Informational                    [Page 131]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|BgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MwHhcNOTkwODE3MDExMDQ5WhcNMzkxMj
+|MxMjM1OTU5WjATMREwDwYDVQQDEwhBbGljZURTUzCCAbYwggErBgcqhkjOOAQBMIIBHgKB
+|gQCBjc3tg+oKnjk+wkgoo+RHk90O16gO7FPFq4QIT/+U4XNIfgzW80RI0f6fr6ShiS/h2T
+|DINt4/m7+3TNxfaYrkddA3DJEIlZvep175/PSfL91DqItU8T+wBwhHTV2Iw8O1s+NVCHXV
+|OXYQxHi9/52whJc38uRRG7XkCZZc835b2wIVAOJHphpFZrgTxtqPuDchK2KL95PNAoGAJj
+|jQFIkyqjn7Pm3ZS1lqTHYjOQQCNVzyyxowwx5QXd2bWeLNqgU9WMB7oja4bgevfYpCJaf0
+|dc9KCF5LPpD4beqcySGKO3YU6c4uXaMHzSOFuC8wAXxtSYkRiTZEvfjIlUpTVrXi+XPsGm
+|E2HxF/wr3t0VD/mHTC0YFKYDm6NjkDgYQAAoGAXOO5WnUUlgupet3jP6nsrF7cvbcTETSm
+|FokoESPZNIZndXUTEj1DW2/lUb/6ifKiGz4kfT0HjVtjyLtFpaBK44XWzgaAP+gjfhryJK
+|tTGrgnDR7vCL9mFIBcYqxl+hWL8bs01NKWN/ZhR7LEMoTwfkFA/UanY04z8qXi9PKD5bij
+|gYEwfzAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/wQEAwIGwDAfBgNVHSMEGDAWgBRwRD6CLm
+|+H3krTdeM9ILxDK5PxHzAdBgNVHQ4EFgQUvmyhs+PB9+1DcKTOEwHi/eOX/s0wHwYDVR0R
+|BBgwFoEUQWxpY2VEU1NAZXhhbXBsZS5jb20wCQYHKoZIzjgEAwMwADAtAhRVDKQZH0IriX
+|EiM42DarU9Z2u/RQIVAJ9hU1JUC1yy3drndh3iEFJbQ169MYIEyTCCBMUCAQEwGDASMRAw
+|DgYDVQQDEwdDYXJsRFNTAgIAyDAHBgUrDgMCGqCCBF8wGAYJKoZIhvcNAQkDMQsGCSqGSI
+|b3DQEHATAjBgkqhkiG9w0BCQQxFgQUQGrsCFJ5um4WAi2eBinAIpaH3UgwOAYDKqszMTEE
+|L1RoaXMgaXMgYSB0ZXN0IEdlbmVyYWwgQVNOIEF0dHJpYnV0ZSwgbnVtYmVyIDEuMD4GCy
+|qGSIb3DQEJEAIEMS8wLQwgQ29udGVudCBIaW50cyBEZXNjcmlwdGlvbiBCdWZmZXIGCSqG
+|SIb3DQEHATBKBgkqhkiG9w0BCQ8xPTA7MAcGBSoDBAUGMDAGBioDBAUGTQQmU21pbWUgQ2
+|FwYWJpbGl0aWVzIHBhcmFtZXRlcnMgYnVmZmVyIDIwbQYLKoZIhvcNAQkQAgIxXjFcAgEB
+|BgcqAwQFBgcIExtUSElTIElTIEEgUFJJVkFDWSBNQVJLIFRFU1QxMTAvgAgqAwQFBgeGeK
+|EjEyFUSElTIElTIEEgVEVTVCBTRUNVUklUWS1DQVRFR09SWS4wbwYLKoZIhvcNAQkQAgox
+|YDBeBgUqAwQFBgQrQ29udGVudCBSZWZlcmVuY2UgQ29udGVudCBJZGVudGlmaWVyIEJ1Zm
+|ZlcgQoQ29udGVudCBSZWZlcmVuY2UgU2lnbmF0dXJlIFZhbHVlIEJ1ZmZlcjBzBgsqhkiG
+|9w0BCRACCzFkoGIwWjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDVVTIEdvdmVybm1lbnQxET
+|APBgNVBAsTCFZEQSBTaXRlMQwwCgYDVQQLEwNWREExEjAQBgNVBAMTCURhaXN5IFJTQQIE
+|ClVEMzCB/AYLKoZIhvcNAQkQAgMxgewwgekwgeYEBzU3MzgyOTkYDzE5OTkwMzExMTA0ND
+|MzWqGByTCBxqRhMF8xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1VUyBHb3Zlcm5tZW50MREw
+|DwYDVQQLEwhWREEgU2l0ZTEMMAoGA1UECxMDVkRBMRcwFQYDVQQDEw5CdWdzIEJ1bm55IE
+|RTQaRhMF8xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1VUyBHb3Zlcm5tZW50MREwDwYDVQQL
+|EwhWREEgU2l0ZTEMMAoGA1UECxMDVkRBMRcwFQYDVQQDEw5FbG1lciBGdWRkIERTQTCCAQ
+|IGCyqGSIb3DQEJEAIJMYHyMIHvMXICAQEGByoDBAUGBwkTJkVRVUlWQUxFTlQgVEhJUyBJ
+|UyBBIFBSSVZBQ1kgTUFSSyBURVNUMTwwOoAIKgMEBQYHhnihLhMsRVFVSVZBTEVOVCBUSE
+|lTIElTIEEgVEVTVCBTRUNVUklUWS1DQVRFR09SWS4xeQIBAQYHKgMEBQYHChMtRVFVSVZB
+|TEVOVCBUSElTIElTIEEgU0VDT05EIFBSSVZBQ1kgTUFSSyBURVNUMTwwOoAIKgMEBQYHhn
+|ihLhMsRVFVSVZBTEVOVCBUSElTIElTIEEgVEVTVCBTRUNVUklUWS1DQVRFR09SWS4wCQYH
+|KoZIzjgEAwQvMC0CFQC8MzdlxPdwXBdJE6pMhcq7UpFIWQIUY5aiFIvPV96wSF9sZN2EBE
+|lfHMo=
+|<4.10.bin
+
+***4.11.bin***
+
+|* Example 4.11.bin
+|>4.11.bin
+|MIIGiAYJKoZIhvcNAQcCoIIGeTCCBnUCAQExADALBgkqhkiG9w0BBwGgggV/MIICmzCCAl
+|qgAwIBAgIBATAJBgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MwHhcNOTkwODE2MjI1
+|MDUwWhcNMzkxMjMxMjM1OTU5WjASMRAwDgYDVQQDEwdDYXJsRFNTMIIBtzCCASsGByqGSM
+|44BAEwggEeAoGBALZJGD6KRMEpcZRMAcQSwXp5y1RNqx6B+8ZMsw6UCQbrAdSxyHFLx0XA
+
+
+
+Hoffman, Ed.                 Informational                    [Page 132]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+|UCVdnPza5G3T4oZIhIJ9uhWVShb2Ru3d9pjSu36KCoq6Fnu5UAFIk4vrJRVRl1Xcj1MOEK
+|lQ/HC3zTBU/dreqKoitaGvi8wCiOeLcF+5reEI1G0pLdbpAhUA3cEv31POCzRgdz4CpL+K
+|XZi5ENUCgYAM7lebS73atgdqdDdPVX+d7bxhDetGWTxWCytbDJHOpWJSacrhbT69v/7ht7
+|krYTyty65F4wasjCKdnESHC8fN8BzZtU5dc96vDskdWlH1T0R5NVpzqn9GUR+pQhacSOuK
+|eWG01S9TIkRjH4a4o1gGJfgpwO+64HXwQsRjZVKbCgOBhQACgYEAmYd0JwNmoLHArdwsdb
+|vhbESc2iFtTUdtsWIJ6diuHvI6tJSxo456m3FOAJTJtCVOuWCWGSQB82IM/nXA+87YaADj
+|/dVwT98jlhkGlPSxYY86V7EIEaQLJiXwUnaB6gtiDZUq5oa6crKnUIMLqifNG6lNiZrXjR
+|g5hD+LxVZNgHqjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1Ud
+|DgQWBBRwRD6CLm+H3krTdeM9ILxDK5PxHzAJBgcqhkjOOAQDAzAAMC0CFGup8E56Wnnj+b
+|49K8kGN+kRF6ETAhUAjzRpKouxPAN5lDJNEh/OiftGsjswggLcMIICm6ADAgECAgIAyDAJ
+|BgcqhkjOOAQDMBIxEDAOBgNVBAMTB0NhcmxEU1MwHhcNOTkwODE3MDExMDQ5WhcNMzkxMj
+|MxMjM1OTU5WjATMREwDwYDVQQDEwhBbGljZURTUzCCAbYwggErBgcqhkjOOAQBMIIBHgKB
+|gQCBjc3tg+oKnjk+wkgoo+RHk90O16gO7FPFq4QIT/+U4XNIfgzW80RI0f6fr6ShiS/h2T
+|DINt4/m7+3TNxfaYrkddA3DJEIlZvep175/PSfL91DqItU8T+wBwhHTV2Iw8O1s+NVCHXV
+|OXYQxHi9/52whJc38uRRG7XkCZZc835b2wIVAOJHphpFZrgTxtqPuDchK2KL95PNAoGAJj
+|jQFIkyqjn7Pm3ZS1lqTHYjOQQCNVzyyxowwx5QXd2bWeLNqgU9WMB7oja4bgevfYpCJaf0
+|dc9KCF5LPpD4beqcySGKO3YU6c4uXaMHzSOFuC8wAXxtSYkRiTZEvfjIlUpTVrXi+XPsGm
+|E2HxF/wr3t0VD/mHTC0YFKYDm6NjkDgYQAAoGAXOO5WnUUlgupet3jP6nsrF7cvbcTETSm
+|FokoESPZNIZndXUTEj1DW2/lUb/6ifKiGz4kfT0HjVtjyLtFpaBK44XWzgaAP+gjfhryJK
+|tTGrgnDR7vCL9mFIBcYqxl+hWL8bs01NKWN/ZhR7LEMoTwfkFA/UanY04z8qXi9PKD5bij
+|gYEwfzAMBgNVHRMBAf8EAjAAMA4GA1UdDwEB/wQEAwIGwDAfBgNVHSMEGDAWgBRwRD6CLm
+|+H3krTdeM9ILxDK5PxHzAdBgNVHQ4EFgQUvmyhs+PB9+1DcKTOEwHi/eOX/s0wHwYDVR0R
+|BBgwFoEUQWxpY2VEU1NAZXhhbXBsZS5jb20wCQYHKoZIzjgEAwMwADAtAhRVDKQZH0IriX
+|EiM42DarU9Z2u/RQIVAJ9hU1JUC1yy3drndh3iEFJbQ169oYHbMIHYMIGZMAkGByqGSM44
+|BAMwEjEQMA4GA1UEAxMHQ2FybERTUxcNOTkwODI3MDcwMDAwWjBpMBMCAgDIFw05OTA4Mj
+|IwNzAwMDBaMBMCAgDJFw05OTA4MjIwNzAwMDBaMBMCAgDTFw05OTA4MjIwNzAwMDBaMBMC
+|AgDSFw05OTA4MjIwNzAwMDBaMBMCAgDUFw05OTA4MjQwNzAwMDBaMAkGByqGSM44BAMDLw
+|AwLAIUfmVSdjP+NHMX0feW+aDU2G1cfT0CFAJ6W7fVWxjBz4fvftok8yqDnDWhMQA=
+|<4.11.bin
+
+***5.1.bin***
+
+|* Example 5.1.bin
+|>5.1.bin
+|MIIBHgYJKoZIhvcNAQcDoIIBDzCCAQsCAQAxgcAwgb0CAQAwJjASMRAwDgYDVQQDEwdDYX
+|JsUlNBAhBGNGvHgABWvBHTbi7NXXHQMA0GCSqGSIb3DQEBAQUABIGAC3EN5nGIiJi2lsGP
+|cP2iJ97a4e8kbKQz36zg6Z2i0yx6zYC4mZ7mX7FBs3IWg+f6KgCLx3M1eCbWx8+MDFbbpX
+|adCDgO8/nUkUNYeNxJtuzubGgzoyEd8Ch4H/dd9gdzTd+taTEgS0ipdSJuNnkVY4/M652j
+|KKHRLFf02hosdR8wQwYJKoZIhvcNAQcBMBQGCCqGSIb3DQMHBAgtaMXpRwZRNYAgDsiSf8
+|Z9P43LrY4OxUk660cu1lXeCSFOSOpOJ7FuVyU=
+|<5.1.bin
+
+
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 133]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+***5.2.bin***
+
+|* Example 5.2.bin
+|>5.2.bin
+|MIIBZQYJKoZIhvcNAQcDoIIBVjCCAVICAQIxggEAMIG9AgEAMCYwEjEQMA4GA1UEAxMHQ2
+|FybFJTQQIQRjRrx4AAVrwR024uzV1x0DANBgkqhkiG9w0BAQEFAASBgJQmQojGi7Z4IP+C
+|VypBmNFoCDoEp87khtgyff2N4SmqD3RxPx+8hbLQt9i3YcMwcap+aiOkyqjMalT03VUC0X
+|BOGv+HYI3HBZm/aFzxoq+YOXAWs5xlGerZwTOc9j6AYlK4qXvnztR5SQ8TBjlzytm4V7zg
+|+TGrnGVNQBNw47Ewoj4CAQQwDQQLTWFpbExpc3RSQzIwEAYLKoZIhvcNAQkQAwcCAToEGH
+|cUr5MSJ/g9HnJVHsQ6X56VcwYb+OfojTBJBgkqhkiG9w0BBwEwGgYIKoZIhvcNAwIwDgIC
+|AKAECJwE0hkuKlWhgCBeKNXhojuej3org9Lt7n+wWxOhnky5V50vSpoYRfRRyw==
+|<5.2.bin
+
+***5.3.eml***
+
+|* Example 5.3.eml
+|>5.3.eml
+|TUlNRS1WZXJzaW9uOiAxLjAKTWVzc2FnZS1JZDogPDAwMTAzMTEyMDA1MjAzLjAwMzQ5QG
+|FteWVtaWx5LmlnLmNvbT4KRGF0ZTogVHVlLCAzMSBPY3QgMjAwMCAxMjowMDo1MiAtMDYw
+|MCAoQ2VudHJhbCBTdGFuZGFyZCBUaW1lKQpGcm9tOiBVc2VyMQpUbzogVXNlcjIKU3Viam
+|VjdDogRXhhbXBsZSA1LjMKQ29udGVudC1UeXBlOiBhcHBsaWNhdGlvbi9wa2NzNy1taW1l
+|OwoJbmFtZT1zbWltZS5wN207CglzbWltZS10eXBlPWVudmVsb3BlZC1kYXRhCkNvbnRlbn
+|QtVHJhbnNmZXItRW5jb2Rpbmc6IGJhc2U2NApDb250ZW50LURpc3Bvc2l0aW9uOiBhdHRh
+|Y2htZW50OyBmaWxlbmFtZT1zbWltZS5wN20KCk1JSUJIZ1lKS29aSWh2Y05BUWNEb0lJQk
+|R6Q0NBUXNDQVFBeGdjQXdnYjBDQVFBd0pqQVNNUkF3RGdZRFZRUURFd2REWVhKc1VsTkIK
+|QWhCR05HdkhnQUJXdkJIVGJpN05YWEhRTUEwR0NTcUdTSWIzRFFFQkFRVUFCSUdBQzNFTj
+|VuR0lpSmkybHNHUGNQMmlKOTdhNGU4awpiS1F6MzZ6ZzZaMmkweXg2ellDNG1aN21YN0ZC
+|czNJV2crZjZLZ0NMeDNNMWVDYld4OCtNREZiYnBYYWRDRGdPOC9uVWtVTlllTnhKCnR1en
+|ViR2d6b3lFZDhDaDRIL2RkOWdkelRkK3RhVEVnUzBpcGRTSnVObmtWWTQvTTY1MmpLS0hS
+|TEZmMDJob3NkUjh3UXdZSktvWkkKaHZjTkFRY0JNQlFHQ0NxR1NJYjNEUU1IQkFndGFNWH
+|BSd1pSTllBZ0RzaVNmOFo5UDQzTHJZNE94VWs2NjBjdTFsWGVDU0ZPU09wTwpKN0Z1VnlV
+|PQoK
+|<5.3.eml
+
+***6.0.bin***
+
+|* Example 6.0.bin
+|>6.0.bin
+|MF4GCSqGSIb3DQEHBaBRME8CAQAwBwYFKw4DAhowKwYJKoZIhvcNAQcBoB4EHFRoaXMgaX
+|Mgc29tZSBzYW1wbGUgY29udGVudC4EFEBq7AhSebpuFgItngYpwCKWh91I
+|<6.0.bin
+
+
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 134]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+***7.1.bin***
+
+|* Example 7.1.bin
+|>7.1.bin
+|MFcGCSqGSIb3DQEHBqBKMEgCAQAwQwYJKoZIhvcNAQcBMBQGCCqGSIb3DQMHBAiza2v7Yj
+|EIToAg+vzt2z8YFx04iRHqNNYg2/TD2VgV75M7mvXXBPa1cOI=
+|<7.1.bin
+
+***7.2.bin***
+
+|* Example 7.2.bin
+|>7.2.bin
+|MIGVBgkqhkiG9w0BBwaggYcwgYQCAQIwQwYJKoZIhvcNAQcBMBQGCCqGSIb3DQMHBAgHJy
+|CFkJ6wfoAg0iCPZ0iKy0HkImhdvncFUibt4wG9AJFYpzVuvEuiBzOhOjA4BgMqqzMxMQQv
+|VGhpcyBpcyBhIHRlc3QgR2VuZXJhbCBBU04gQXR0cmlidXRlLCBudW1iZXIgMS4=
+|<7.2.bin
+
+C.  Acknowledgements
+
+   Blake Ramsdell, Jim Schaad, and John Pawling contributed the vast
+   majority of the examples in this document, and/or correct examples
+   during the early versions of this document.  Additional examples came
+   from many people, including Rob Colestock and Paul Hoffman.
+   Additional testing came from Holger Ebel and Russ Housley.
+
+   The examples are displayed with a modified version of Peter Gutmann's
+   "dumpasn1" program.  Peter and Jim Schaad and Blake Ramsdell have
+   been updating the program based on input from the process of writing
+   this draft.
+
+Editor's Address
+
+   Paul Hoffman
+   Internet Mail Consortium
+   127 Segre Place
+   Santa Cruz, CA  95060 USA
+
+   EMail: phoffman@imc.org
+
+
+
+
+
+
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 135]
+
+RFC 4134              Examples of S/MIME Messages              July 2005
+
+
+Full Copyright Statement
+
+   Copyright (C) The Internet Society (2005).
+
+   This document is subject to the rights, licenses and restrictions
+   contained in BCP 78, and except as set forth therein, the authors
+   retain all their rights.
+
+   This document and the information contained herein are provided on an
+   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+   The IETF takes no position regarding the validity or scope of any
+   Intellectual Property Rights or other rights that might be claimed to
+   pertain to the implementation or use of the technology described in
+   this document or the extent to which any license under such rights
+   might or might not be available; nor does it represent that it has
+   made any independent effort to identify any such rights.  Information
+   on the procedures with respect to rights in RFC documents can be
+   found in BCP 78 and BCP 79.
+
+   Copies of IPR disclosures made to the IETF Secretariat and any
+   assurances of licenses to be made available, or the result of an
+   attempt made to obtain a general license or permission for the use of
+   such proprietary rights by implementers or users of this
+   specification can be obtained from the IETF on-line IPR repository at
+   http://www.ietf.org/ipr.
+
+   The IETF invites any interested party to bring to its attention any
+   copyrights, patents or patent applications, or other proprietary
+   rights that may cover technology that may be required to implement
+   this standard.  Please address the information to the IETF at ietf-
+   ipr@ietf.org.
+
+Acknowledgement
+
+   Funding for the RFC Editor function is currently provided by the
+   Internet Society.
+
+
+
+
+
+
+
+Hoffman, Ed.                 Informational                    [Page 136]
+
diff --git a/crypto/test/data/rsa3/self-testcase-A.p12 b/crypto/test/data/rsa3/self-testcase-A.p12
new file mode 100644
index 000000000..79fe2f2fd
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-A.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-A.pem b/crypto/test/data/rsa3/self-testcase-A.pem
new file mode 100644
index 000000000..3e507ba9c
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-A.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-B.p12 b/crypto/test/data/rsa3/self-testcase-B.p12
new file mode 100644
index 000000000..ef5013228
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-B.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-B.pem b/crypto/test/data/rsa3/self-testcase-B.pem
new file mode 100644
index 000000000..6c449109a
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-B.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----
+MIIEogIBAAKCAQEAq17Evhk/UJYyxV52b6kPbE8b6Z1VtGqRVINBjGsdTJFUqV62
+OW5j3n3TxuwCUlH2gr9h6Fd71buv4uei1pH7LLU/jmCFJZrpM2XWzPc0YhnB1T1Z
+2p002z1jIODMV7PHNl9+uH3EVNIXQJHrpObVVqwprbTr1FPHh8TmfiRnH4Mp8EYJ
+fc8Gmu8gA1mnSet+6F/bWKP2U5Ej06QhPCpHvY+vJsH1ANkH7uiDWMYsAZtEE1Hr
+WYtV8quDbIlWGmTV0c+xTN5WvcEHlcryLsO9+VbDl2I97JThLuqbtYtn1Z2DVc5y
+GRBabOoRQ8bvV0bMbqOg+F2nnosWDZiDnybJFwIDAQABAoIBAGA8GNn0DaUwo5RI
+htQPqVSWXENlklJ9od1G1FGJeWudFWEDietYfYbdPEcyE9+snXUxCkdSkX0mKBCR
+KdW7JsUlh2pp83t5scmmP+jcTbNlaX9ZM5Nbwun3YCp/cuExWQbEu8HZBp7nWB1v
+lFgHNPi2N7WPqvuSjLNGtHVT9gEwWGUl1zfbuZp8pNT4r1l7nwj+S9pGF3v5RXDt
+qZWSbfPF3ESPkMOpXxGk5uDLx3aoeHBQALVjeNdVlkyxjrG75Pv7ZnrmXjXzcuVv
+aVACiCPWxzaRFR9cRCx/Z34KrJorLglrfIPIrRMKJY33QO2gpYYEpFkLsLth/Ip4
+NMSJ3KkCgYEA36skUOFK0iQcdEaUXR2zcvQd3P3ctxe0JqD7dHFWnY2ndA5+VvAP
+vUjemZgw+tNt1qjLCAwxMi4cEOEICG6zSlMBRcVbqkKPS3gd3fGvD/lfQZ02EePz
+6KYVC7xz1WXIcId/HvkBNmbPEyOLqi9fIJQoYrM3LnB3AFIUqQ4K3UMCgYEAxCRT
+Z6yLGFb6Evkvvc6usqDhpAjWaaTSxlsSf9IGsKXW90OronB1IiTaWgJze1PrwWy4
+z4YOSI8oEEpF7LdwI9hztg9wFGht8lahGkfHtgR7V/QzyLMYfcU/57STI9vvsw2S
+FNqIdeP1Bd/CE8iI6o6HOAadsWlTBBUBUtnZnZ0CgYA/ecthpL5eKt9kZE9gqbgu
+rHb5K5aC45g9yjvyjOO+7N+UATT7qT9eQZrizh1AYdZvMBIGo6cmjY1rgOGNuxTo
+x+u5iEv+YstV6K3ZOeiryOKutVYN97pV0SRx4zagXjVnMhzyhkpAzSaBUPom/zCp
+B0L618+WP1aWYbT5UUHmDwKBgA3Ju+86yuBgJN42lCuUnuVBt/rvABuXEZYOCuPf
+YMcEMXNaV3No0mMfEhZnu7R8tsL3IJq+Ar0JCzjx765vSrvKWIAA39EfcjMp8dNG
+HnzmHcGWEhnWtS8KMa7ZG8rWiCgfGRjML/GRn8TU8PCxFSbf9BN1K5qwG7zauSgY
+1lplAoGAfl1Qw77H27TYGMVBgco/2g05MaKb8TZ4PKn1znlPnNcqFEBi779W0/dD
+Zgb1mjnRQkw68Jj5XA2zv/06yjvTS+nHVEDCdgIrZI2p1IrI3F4tihSoWgYtoe+8
+5OVDiHQ73d6lxVLqIRoRic8ZtWR02PbrK5SmoPsFdeTcmtzqo6c=
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-C.p12 b/crypto/test/data/rsa3/self-testcase-C.p12
new file mode 100644
index 000000000..72527d634
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-C.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-C.pem b/crypto/test/data/rsa3/self-testcase-C.pem
new file mode 100644
index 000000000..f844ee47f
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-C.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----
+MIIEHTCCAwWgAwIBAgIBADANBgkqhkiG9w0BAQQFADBsMQswCQYDVQQGEwJHQjES
+MBAGA1UECBMJQmVya3NoaXJlMRAwDgYDVQQHEwdOZXdidXJ5MRcwFQYDVQQKEw5N
+eSBDb21wYW55IEx0ZDEKMAgGA1UECxMBYTESMBAGA1UEAxMJbG9jYWxob3N0MB4X
+DTA2MDkxMzE4MjYzMloXDTA3MDkxMzE4MjYzMlowbDELMAkGA1UEBhMCR0IxEjAQ
+BgNVBAgTCUJlcmtzaGlyZTEQMA4GA1UEBxMHTmV3YnVyeTEXMBUGA1UEChMOTXkg
+Q29tcGFueSBMdGQxCjAIBgNVBAsTAWExEjAQBgNVBAMTCWxvY2FsaG9zdDCCASIw
+DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKtexL4ZP1CWMsVedm+pD2xPG+md
+VbRqkVSDQYxrHUyRVKletjluY95908bsAlJR9oK/YehXe9W7r+LnotaR+yy1P45g
+hSWa6TNl1sz3NGIZwdU9WdqdNNs9YyDgzFezxzZffrh9xFTSF0CR66Tm1VasKa20
+69RTx4fE5n4kZx+DKfBGCX3PBprvIANZp0nrfuhf21ij9lORI9OkITwqR72PrybB
+9QDZB+7og1jGLAGbRBNR61mLVfKrg2yJVhpk1dHPsUzeVr3BB5XK8i7DvflWw5di
+PeyU4S7qm7WLZ9Wdg1XOchkQWmzqEUPG71dGzG6joPhdp56LFg2Yg58myRcCAwEA
+AaOByTCBxjAdBgNVHQ4EFgQUPd6mAcGQZ8iNGajt0kffN4AeDZswgZYGA1UdIwSB
+jjCBi4AUPd6mAcGQZ8iNGajt0kffN4AeDZuhcKRuMGwxCzAJBgNVBAYTAkdCMRIw
+EAYDVQQIEwlCZXJrc2hpcmUxEDAOBgNVBAcTB05ld2J1cnkxFzAVBgNVBAoTDk15
+IENvbXBhbnkgTHRkMQowCAYDVQQLEwFhMRIwEAYDVQQDEwlsb2NhbGhvc3SCAQAw
+DAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQQFAAOCAQEAkWkqxLQH4vvX5e2oiydv
+VN8Et+ZznJ78yifF7Tctjm9+EfEBRupHwXHlAZd2n2CsZfhVTqk/Rnffb078X3g5
+9jx9ka0/hhkYyG6XqLybS3yXVpC/mvaeQMRu0Ubi0uSOkcf6rYiaqGjcG5DRaSAz
+SNNrDTEDYNxsuaPJoxZtQ+o1VaB3ksJ2UanzAHy45IJKXlSWS4l0Xsu6NZJxeMLB
+0iL0j5+TcaK37dkNpDi4dhFbeOi30Q8rvC5BDorFMM8GEl+GevH6Rpk0P67WlnOY
+qeDoKjzKi1w0ZDBS8XI95DLsmnHXcg2Iu8Dx1iBJMFST6mLtsMdVQAD+y2NTkbpM
+xA==
+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----
+MIIEogIBAAKCAQEAq17Evhk/UJYyxV52b6kPbE8b6Z1VtGqRVINBjGsdTJFUqV62
+OW5j3n3TxuwCUlH2gr9h6Fd71buv4uei1pH7LLU/jmCFJZrpM2XWzPc0YhnB1T1Z
+2p002z1jIODMV7PHNl9+uH3EVNIXQJHrpObVVqwprbTr1FPHh8TmfiRnH4Mp8EYJ
+fc8Gmu8gA1mnSet+6F/bWKP2U5Ej06QhPCpHvY+vJsH1ANkH7uiDWMYsAZtEE1Hr
+WYtV8quDbIlWGmTV0c+xTN5WvcEHlcryLsO9+VbDl2I97JThLuqbtYtn1Z2DVc5y
+GRBabOoRQ8bvV0bMbqOg+F2nnosWDZiDnybJFwIDAQABAoIBAGA8GNn0DaUwo5RI
+htQPqVSWXENlklJ9od1G1FGJeWudFWEDietYfYbdPEcyE9+snXUxCkdSkX0mKBCR
+KdW7JsUlh2pp83t5scmmP+jcTbNlaX9ZM5Nbwun3YCp/cuExWQbEu8HZBp7nWB1v
+lFgHNPi2N7WPqvuSjLNGtHVT9gEwWGUl1zfbuZp8pNT4r1l7nwj+S9pGF3v5RXDt
+qZWSbfPF3ESPkMOpXxGk5uDLx3aoeHBQALVjeNdVlkyxjrG75Pv7ZnrmXjXzcuVv
+aVACiCPWxzaRFR9cRCx/Z34KrJorLglrfIPIrRMKJY33QO2gpYYEpFkLsLth/Ip4
+NMSJ3KkCgYEA36skUOFK0iQcdEaUXR2zcvQd3P3ctxe0JqD7dHFWnY2ndA5+VvAP
+vUjemZgw+tNt1qjLCAwxMi4cEOEICG6zSlMBRcVbqkKPS3gd3fGvD/lfQZ02EePz
+6KYVC7xz1WXIcId/HvkBNmbPEyOLqi9fIJQoYrM3LnB3AFIUqQ4K3UMCgYEAxCRT
+Z6yLGFb6Evkvvc6usqDhpAjWaaTSxlsSf9IGsKXW90OronB1IiTaWgJze1PrwWy4
+z4YOSI8oEEpF7LdwI9hztg9wFGht8lahGkfHtgR7V/QzyLMYfcU/57STI9vvsw2S
+FNqIdeP1Bd/CE8iI6o6HOAadsWlTBBUBUtnZnZ0CgYA/ecthpL5eKt9kZE9gqbgu
+rHb5K5aC45g9yjvyjOO+7N+UATT7qT9eQZrizh1AYdZvMBIGo6cmjY1rgOGNuxTo
+x+u5iEv+YstV6K3ZOeiryOKutVYN97pV0SRx4zagXjVnMhzyhkpAzSaBUPom/zCp
+B0L618+WP1aWYbT5UUHmDwKBgA3Ju+86yuBgJN42lCuUnuVBt/rvABuXEZYOCuPf
+YMcEMXNaV3No0mMfEhZnu7R8tsL3IJq+Ar0JCzjx765vSrvKWIAA39EfcjMp8dNG
+HnzmHcGWEhnWtS8KMa7ZG8rWiCgfGRjML/GRn8TU8PCxFSbf9BN1K5qwG7zauSgY
+1lplAoGAfl1Qw77H27TYGMVBgco/2g05MaKb8TZ4PKn1znlPnNcqFEBi779W0/dD
+Zgb1mjnRQkw68Jj5XA2zv/06yjvTS+nHVEDCdgIrZI2p1IrI3F4tihSoWgYtoe+8
+5OVDiHQ73d6lxVLqIRoRic8ZtWR02PbrK5SmoPsFdeTcmtzqo6c=
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-D.p12 b/crypto/test/data/rsa3/self-testcase-D.p12
new file mode 100644
index 000000000..c2fa40bb5
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-D.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-D.pem b/crypto/test/data/rsa3/self-testcase-D.pem
new file mode 100644
index 000000000..6f93f1c06
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-D.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-E.p12 b/crypto/test/data/rsa3/self-testcase-E.p12
new file mode 100644
index 000000000..026564215
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-E.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-E.pem b/crypto/test/data/rsa3/self-testcase-E.pem
new file mode 100644
index 000000000..0c30777de
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-E.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----
+MIIEHTCCAwWgAwIBAgIBADANBgkqhkiG9w0BAQQFADBsMQswCQYDVQQGEwJHQjES
+MBAGA1UECBMJQmVya3NoaXJlMRAwDgYDVQQHEwdOZXdidXJ5MRcwFQYDVQQKEw5N
+eSBDb21wYW55IEx0ZDEKMAgGA1UECxMBYTESMBAGA1UEAxMJbG9jYWxob3N0MB4X
+DTA2MDkxMzE4MjYzMloXDTA3MDkxMzE4MjYzMlowbDELMAkGA1UEBhMCR0IxEjAQ
+BgNVBAgTCUJlcmtzaGlyZTEQMA4GA1UEBxMHTmV3YnVyeTEXMBUGA1UEChMOTXkg
+Q29tcGFueSBMdGQxCjAIBgNVBAsTAWExEjAQBgNVBAMTCWxvY2FsaG9zdDCCASIw
+DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKtexL4ZP1CWMsVedm+pD2xPG+md
+VbRqkVSDQYxrHUyRVKletjluY95908bsAlJR9oK/YehXe9W7r+LnotaR+yy1P45g
+hSWa6TNl1sz3NGIZwdU9WdqdNNs9YyDgzFezxzZffrh9xFTSF0CR66Tm1VasKa20
+69RTx4fE5n4kZx+DKfBGCX3PBprvIANZp0nrfuhf21ij9lORI9OkITwqR72PrybB
+9QDZB+7og1jGLAGbRBNR61mLVfKrg2yJVhpk1dHPsUzeVr3BB5XK8i7DvflWw5di
+PeyU4S7qm7WLZ9Wdg1XOchkQWmzqEUPG71dGzG6joPhdp56LFg2Yg58myRcCAwEA
+AaOByTCBxjAdBgNVHQ4EFgQUPd6mAcGQZ8iNGajt0kffN4AeDZswgZYGA1UdIwSB
+jjCBi4AUPd6mAcGQZ8iNGajt0kffN4AeDZuhcKRuMGwxCzAJBgNVBAYTAkdCMRIw
+EAYDVQQIEwlCZXJrc2hpcmUxEDAOBgNVBAcTB05ld2J1cnkxFzAVBgNVBAoTDk15
+IENvbXBhbnkgTHRkMQowCAYDVQQLEwFhMRIwEAYDVQQDEwlsb2NhbGhvc3SCAQAw
+DAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQQFAAOCAQEAkFwewElSyXCGG2ygI3I4
+iYLtjAJAy002ES4JGHvr39dNhYoZ1poop18AU52mrx+SKX5vc/hAipisVa0rK9Jl
+91GF5NQdhU0KWxNCBHZAy3dUf1M63jvTC3eiG8LVV+C77Cx936i8qO5f3qWCN40z
+4W8eMwkCoVtpfzuuHk1by0VwCgU5IYuNIrwxR1bjudOctyhXNJjgr3SIsjDrqpTA
+nS4AauNFVqFfSyyaw5AX+7eA/WrMOGdJBJT1bEhHqrWxLtQzwSzKBKu7FpuF3mVX
+SHcSW4AzA6Yzq2Hcedo+SJt96IDr5xT17ncPMBzdq9pdoHlyJVq9+3O5JQOTx1WD
+6g==
+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----
+MIIEogIBAAKCAQEAq17Evhk/UJYyxV52b6kPbE8b6Z1VtGqRVINBjGsdTJFUqV62
+OW5j3n3TxuwCUlH2gr9h6Fd71buv4uei1pH7LLU/jmCFJZrpM2XWzPc0YhnB1T1Z
+2p002z1jIODMV7PHNl9+uH3EVNIXQJHrpObVVqwprbTr1FPHh8TmfiRnH4Mp8EYJ
+fc8Gmu8gA1mnSet+6F/bWKP2U5Ej06QhPCpHvY+vJsH1ANkH7uiDWMYsAZtEE1Hr
+WYtV8quDbIlWGmTV0c+xTN5WvcEHlcryLsO9+VbDl2I97JThLuqbtYtn1Z2DVc5y
+GRBabOoRQ8bvV0bMbqOg+F2nnosWDZiDnybJFwIDAQABAoIBAGA8GNn0DaUwo5RI
+htQPqVSWXENlklJ9od1G1FGJeWudFWEDietYfYbdPEcyE9+snXUxCkdSkX0mKBCR
+KdW7JsUlh2pp83t5scmmP+jcTbNlaX9ZM5Nbwun3YCp/cuExWQbEu8HZBp7nWB1v
+lFgHNPi2N7WPqvuSjLNGtHVT9gEwWGUl1zfbuZp8pNT4r1l7nwj+S9pGF3v5RXDt
+qZWSbfPF3ESPkMOpXxGk5uDLx3aoeHBQALVjeNdVlkyxjrG75Pv7ZnrmXjXzcuVv
+aVACiCPWxzaRFR9cRCx/Z34KrJorLglrfIPIrRMKJY33QO2gpYYEpFkLsLth/Ip4
+NMSJ3KkCgYEA36skUOFK0iQcdEaUXR2zcvQd3P3ctxe0JqD7dHFWnY2ndA5+VvAP
+vUjemZgw+tNt1qjLCAwxMi4cEOEICG6zSlMBRcVbqkKPS3gd3fGvD/lfQZ02EePz
+6KYVC7xz1WXIcId/HvkBNmbPEyOLqi9fIJQoYrM3LnB3AFIUqQ4K3UMCgYEAxCRT
+Z6yLGFb6Evkvvc6usqDhpAjWaaTSxlsSf9IGsKXW90OronB1IiTaWgJze1PrwWy4
+z4YOSI8oEEpF7LdwI9hztg9wFGht8lahGkfHtgR7V/QzyLMYfcU/57STI9vvsw2S
+FNqIdeP1Bd/CE8iI6o6HOAadsWlTBBUBUtnZnZ0CgYA/ecthpL5eKt9kZE9gqbgu
+rHb5K5aC45g9yjvyjOO+7N+UATT7qT9eQZrizh1AYdZvMBIGo6cmjY1rgOGNuxTo
+x+u5iEv+YstV6K3ZOeiryOKutVYN97pV0SRx4zagXjVnMhzyhkpAzSaBUPom/zCp
+B0L618+WP1aWYbT5UUHmDwKBgA3Ju+86yuBgJN42lCuUnuVBt/rvABuXEZYOCuPf
+YMcEMXNaV3No0mMfEhZnu7R8tsL3IJq+Ar0JCzjx765vSrvKWIAA39EfcjMp8dNG
+HnzmHcGWEhnWtS8KMa7ZG8rWiCgfGRjML/GRn8TU8PCxFSbf9BN1K5qwG7zauSgY
+1lplAoGAfl1Qw77H27TYGMVBgco/2g05MaKb8TZ4PKn1znlPnNcqFEBi779W0/dD
+Zgb1mjnRQkw68Jj5XA2zv/06yjvTS+nHVEDCdgIrZI2p1IrI3F4tihSoWgYtoe+8
+5OVDiHQ73d6lxVLqIRoRic8ZtWR02PbrK5SmoPsFdeTcmtzqo6c=
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-F.p12 b/crypto/test/data/rsa3/self-testcase-F.p12
new file mode 100644
index 000000000..58410dcab
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-F.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-F.pem b/crypto/test/data/rsa3/self-testcase-F.pem
new file mode 100644
index 000000000..fcc520547
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-F.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----
+MIIEogIBAAKCAQEAq17Evhk/UJYyxV52b6kPbE8b6Z1VtGqRVINBjGsdTJFUqV62
+OW5j3n3TxuwCUlH2gr9h6Fd71buv4uei1pH7LLU/jmCFJZrpM2XWzPc0YhnB1T1Z
+2p002z1jIODMV7PHNl9+uH3EVNIXQJHrpObVVqwprbTr1FPHh8TmfiRnH4Mp8EYJ
+fc8Gmu8gA1mnSet+6F/bWKP2U5Ej06QhPCpHvY+vJsH1ANkH7uiDWMYsAZtEE1Hr
+WYtV8quDbIlWGmTV0c+xTN5WvcEHlcryLsO9+VbDl2I97JThLuqbtYtn1Z2DVc5y
+GRBabOoRQ8bvV0bMbqOg+F2nnosWDZiDnybJFwIDAQABAoIBAGA8GNn0DaUwo5RI
+htQPqVSWXENlklJ9od1G1FGJeWudFWEDietYfYbdPEcyE9+snXUxCkdSkX0mKBCR
+KdW7JsUlh2pp83t5scmmP+jcTbNlaX9ZM5Nbwun3YCp/cuExWQbEu8HZBp7nWB1v
+lFgHNPi2N7WPqvuSjLNGtHVT9gEwWGUl1zfbuZp8pNT4r1l7nwj+S9pGF3v5RXDt
+qZWSbfPF3ESPkMOpXxGk5uDLx3aoeHBQALVjeNdVlkyxjrG75Pv7ZnrmXjXzcuVv
+aVACiCPWxzaRFR9cRCx/Z34KrJorLglrfIPIrRMKJY33QO2gpYYEpFkLsLth/Ip4
+NMSJ3KkCgYEA36skUOFK0iQcdEaUXR2zcvQd3P3ctxe0JqD7dHFWnY2ndA5+VvAP
+vUjemZgw+tNt1qjLCAwxMi4cEOEICG6zSlMBRcVbqkKPS3gd3fGvD/lfQZ02EePz
+6KYVC7xz1WXIcId/HvkBNmbPEyOLqi9fIJQoYrM3LnB3AFIUqQ4K3UMCgYEAxCRT
+Z6yLGFb6Evkvvc6usqDhpAjWaaTSxlsSf9IGsKXW90OronB1IiTaWgJze1PrwWy4
+z4YOSI8oEEpF7LdwI9hztg9wFGht8lahGkfHtgR7V/QzyLMYfcU/57STI9vvsw2S
+FNqIdeP1Bd/CE8iI6o6HOAadsWlTBBUBUtnZnZ0CgYA/ecthpL5eKt9kZE9gqbgu
+rHb5K5aC45g9yjvyjOO+7N+UATT7qT9eQZrizh1AYdZvMBIGo6cmjY1rgOGNuxTo
+x+u5iEv+YstV6K3ZOeiryOKutVYN97pV0SRx4zagXjVnMhzyhkpAzSaBUPom/zCp
+B0L618+WP1aWYbT5UUHmDwKBgA3Ju+86yuBgJN42lCuUnuVBt/rvABuXEZYOCuPf
+YMcEMXNaV3No0mMfEhZnu7R8tsL3IJq+Ar0JCzjx765vSrvKWIAA39EfcjMp8dNG
+HnzmHcGWEhnWtS8KMa7ZG8rWiCgfGRjML/GRn8TU8PCxFSbf9BN1K5qwG7zauSgY
+1lplAoGAfl1Qw77H27TYGMVBgco/2g05MaKb8TZ4PKn1znlPnNcqFEBi779W0/dD
+Zgb1mjnRQkw68Jj5XA2zv/06yjvTS+nHVEDCdgIrZI2p1IrI3F4tihSoWgYtoe+8
+5OVDiHQ73d6lxVLqIRoRic8ZtWR02PbrK5SmoPsFdeTcmtzqo6c=
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-G.p12 b/crypto/test/data/rsa3/self-testcase-G.p12
new file mode 100644
index 000000000..c8184a252
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-G.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-G.pem b/crypto/test/data/rsa3/self-testcase-G.pem
new file mode 100644
index 000000000..d10c2283b
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-G.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-H.p12 b/crypto/test/data/rsa3/self-testcase-H.p12
new file mode 100644
index 000000000..b38c9eb71
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-H.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-H.pem b/crypto/test/data/rsa3/self-testcase-H.pem
new file mode 100644
index 000000000..0cab07503
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-H.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-I.p12 b/crypto/test/data/rsa3/self-testcase-I.p12
new file mode 100644
index 000000000..7b97f68d6
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-I.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-I.pem b/crypto/test/data/rsa3/self-testcase-I.pem
new file mode 100644
index 000000000..8717fd869
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-I.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----
+MIIEogIBAAKCAQEAq17Evhk/UJYyxV52b6kPbE8b6Z1VtGqRVINBjGsdTJFUqV62
+OW5j3n3TxuwCUlH2gr9h6Fd71buv4uei1pH7LLU/jmCFJZrpM2XWzPc0YhnB1T1Z
+2p002z1jIODMV7PHNl9+uH3EVNIXQJHrpObVVqwprbTr1FPHh8TmfiRnH4Mp8EYJ
+fc8Gmu8gA1mnSet+6F/bWKP2U5Ej06QhPCpHvY+vJsH1ANkH7uiDWMYsAZtEE1Hr
+WYtV8quDbIlWGmTV0c+xTN5WvcEHlcryLsO9+VbDl2I97JThLuqbtYtn1Z2DVc5y
+GRBabOoRQ8bvV0bMbqOg+F2nnosWDZiDnybJFwIDAQABAoIBAGA8GNn0DaUwo5RI
+htQPqVSWXENlklJ9od1G1FGJeWudFWEDietYfYbdPEcyE9+snXUxCkdSkX0mKBCR
+KdW7JsUlh2pp83t5scmmP+jcTbNlaX9ZM5Nbwun3YCp/cuExWQbEu8HZBp7nWB1v
+lFgHNPi2N7WPqvuSjLNGtHVT9gEwWGUl1zfbuZp8pNT4r1l7nwj+S9pGF3v5RXDt
+qZWSbfPF3ESPkMOpXxGk5uDLx3aoeHBQALVjeNdVlkyxjrG75Pv7ZnrmXjXzcuVv
+aVACiCPWxzaRFR9cRCx/Z34KrJorLglrfIPIrRMKJY33QO2gpYYEpFkLsLth/Ip4
+NMSJ3KkCgYEA36skUOFK0iQcdEaUXR2zcvQd3P3ctxe0JqD7dHFWnY2ndA5+VvAP
+vUjemZgw+tNt1qjLCAwxMi4cEOEICG6zSlMBRcVbqkKPS3gd3fGvD/lfQZ02EePz
+6KYVC7xz1WXIcId/HvkBNmbPEyOLqi9fIJQoYrM3LnB3AFIUqQ4K3UMCgYEAxCRT
+Z6yLGFb6Evkvvc6usqDhpAjWaaTSxlsSf9IGsKXW90OronB1IiTaWgJze1PrwWy4
+z4YOSI8oEEpF7LdwI9hztg9wFGht8lahGkfHtgR7V/QzyLMYfcU/57STI9vvsw2S
+FNqIdeP1Bd/CE8iI6o6HOAadsWlTBBUBUtnZnZ0CgYA/ecthpL5eKt9kZE9gqbgu
+rHb5K5aC45g9yjvyjOO+7N+UATT7qT9eQZrizh1AYdZvMBIGo6cmjY1rgOGNuxTo
+x+u5iEv+YstV6K3ZOeiryOKutVYN97pV0SRx4zagXjVnMhzyhkpAzSaBUPom/zCp
+B0L618+WP1aWYbT5UUHmDwKBgA3Ju+86yuBgJN42lCuUnuVBt/rvABuXEZYOCuPf
+YMcEMXNaV3No0mMfEhZnu7R8tsL3IJq+Ar0JCzjx765vSrvKWIAA39EfcjMp8dNG
+HnzmHcGWEhnWtS8KMa7ZG8rWiCgfGRjML/GRn8TU8PCxFSbf9BN1K5qwG7zauSgY
+1lplAoGAfl1Qw77H27TYGMVBgco/2g05MaKb8TZ4PKn1znlPnNcqFEBi779W0/dD
+Zgb1mjnRQkw68Jj5XA2zv/06yjvTS+nHVEDCdgIrZI2p1IrI3F4tihSoWgYtoe+8
+5OVDiHQ73d6lxVLqIRoRic8ZtWR02PbrK5SmoPsFdeTcmtzqo6c=
+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-J.p12 b/crypto/test/data/rsa3/self-testcase-J.p12
new file mode 100644
index 000000000..4073ea600
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-J.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-J.pem b/crypto/test/data/rsa3/self-testcase-J.pem
new file mode 100644
index 000000000..c3fba7935
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-J.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/self-testcase-L.p12 b/crypto/test/data/rsa3/self-testcase-L.p12
new file mode 100644
index 000000000..50b3b76f2
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-L.p12
Binary files differdiff --git a/crypto/test/data/rsa3/self-testcase-L.pem b/crypto/test/data/rsa3/self-testcase-L.pem
new file mode 100644
index 000000000..b9805f5b0
--- /dev/null
+++ b/crypto/test/data/rsa3/self-testcase-L.pem
@@ -0,0 +1,52 @@
+-----BEGIN CERTIFICATE-----
+MIIEHTCCAwWgAwIBAgIBADANBgkqhkiG9w0BAQQFADBsMQswCQYDVQQGEwJHQjES
+MBAGA1UECBMJQmVya3NoaXJlMRAwDgYDVQQHEwdOZXdidXJ5MRcwFQYDVQQKEw5N
+eSBDb21wYW55IEx0ZDEKMAgGA1UECxMBYTESMBAGA1UEAxMJbG9jYWxob3N0MB4X
+DTA2MDkxMzE4MjYzMloXDTA3MDkxMzE4MjYzMlowbDELMAkGA1UEBhMCR0IxEjAQ
+BgNVBAgTCUJlcmtzaGlyZTEQMA4GA1UEBxMHTmV3YnVyeTEXMBUGA1UEChMOTXkg
+Q29tcGFueSBMdGQxCjAIBgNVBAsTAWExEjAQBgNVBAMTCWxvY2FsaG9zdDCCASIw
+DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKtexL4ZP1CWMsVedm+pD2xPG+md
+VbRqkVSDQYxrHUyRVKletjluY95908bsAlJR9oK/YehXe9W7r+LnotaR+yy1P45g
+hSWa6TNl1sz3NGIZwdU9WdqdNNs9YyDgzFezxzZffrh9xFTSF0CR66Tm1VasKa20
+69RTx4fE5n4kZx+DKfBGCX3PBprvIANZp0nrfuhf21ij9lORI9OkITwqR72PrybB
+9QDZB+7og1jGLAGbRBNR61mLVfKrg2yJVhpk1dHPsUzeVr3BB5XK8i7DvflWw5di
+PeyU4S7qm7WLZ9Wdg1XOchkQWmzqEUPG71dGzG6joPhdp56LFg2Yg58myRcCAwEA
+AaOByTCBxjAdBgNVHQ4EFgQUPd6mAcGQZ8iNGajt0kffN4AeDZswgZYGA1UdIwSB
+jjCBi4AUPd6mAcGQZ8iNGajt0kffN4AeDZuhcKRuMGwxCzAJBgNVBAYTAkdCMRIw
+EAYDVQQIEwlCZXJrc2hpcmUxEDAOBgNVBAcTB05ld2J1cnkxFzAVBgNVBAoTDk15
+IENvbXBhbnkgTHRkMQowCAYDVQQLEwFhMRIwEAYDVQQDEwlsb2NhbGhvc3SCAQAw
+DAYDVR0TBAUwAwEB/zANBgkqhkiG9w0BAQQFAAOCAQEAoArZH56QUnasmPqCd68C
+kcG6hw5S6p7wloY9jz+iwh9b2tF3k1SPCeE7rBV7cevr1ruv/wWttBFiGfJK/hlL
+8C/MMPj1X5JuLY3JgNmNDSK9MLr5Ejvps0AQ+kA4CCSxxpTLWeUlqNnGk/Zcfoqa
+Gyk37PDlHMQC3QWLgAX+wG/rg8WvrAP1ZjM6t25yb6hIPZgCWZbq+j8X5kS3Qxz0
+buc9HMi9oeuejeP7zWRJHhnCcDuClmpI6pk9nkjmunYtF2rMWi7f2eJ0Qjbo1wnn
+rUU5sCGLZ6i3ux/HvMgynho7RVqV+bqV+G9wZem3crNbtLhUSB2SAgYZnMqrLcW9
+jQ==
+-----END CERTIFICATE-----
+-----BEGIN RSA PRIVATE KEY-----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+-----END RSA PRIVATE KEY-----
diff --git a/crypto/test/data/rsa3/testcases.README b/crypto/test/data/rsa3/testcases.README
new file mode 100644
index 000000000..648574027
--- /dev/null
+++ b/crypto/test/data/rsa3/testcases.README
Binary files differdiff --git a/crypto/test/data/scrypt/TestVectors.txt b/crypto/test/data/scrypt/TestVectors.txt
new file mode 100644
index 000000000..1b54dd696
--- /dev/null
+++ b/crypto/test/data/scrypt/TestVectors.txt
@@ -0,0 +1,20 @@
+scrypt(“”, “”, 16, 1, 1, 64) =
+77 d6 57 62 38 65 7b 20 3b 19 ca 42 c1 8a 04 97
+f1 6b 48 44 e3 07 4a e8 df df fa 3f ed e2 14 42
+fc d0 06 9d ed 09 48 f8 32 6a 75 3a 0f c8 1f 17
+e8 d3 e0 fb 2e 0d 36 28 cf 35 e2 0c 38 d1 89 06
+scrypt(“password”, “NaCl”, 1024, 8, 16, 64) =
+fd ba be 1c 9d 34 72 00 78 56 e7 19 0d 01 e9 fe
+7c 6a d7 cb c8 23 78 30 e7 73 76 63 4b 37 31 62
+2e af 30 d9 2e 22 a3 88 6f f1 09 27 9d 98 30 da
+c7 27 af b9 4a 83 ee 6d 83 60 cb df a2 cc 06 40
+scrypt(“pleaseletmein”, “SodiumChloride”, 16384, 8, 1, 64) =
+70 23 bd cb 3a fd 73 48 46 1c 06 cd 81 fd 38 eb
+fd a8 fb ba 90 4f 8e 3e a9 b5 43 f6 54 5d a1 f2
+d5 43 29 55 61 3f 0f cf 62 d4 97 05 24 2a 9a f9
+e6 1e 85 dc 0d 65 1e 40 df cf 01 7b 45 57 58 87
+scrypt(“pleaseletmein”, “SodiumChloride”, 1048576, 8, 1, 64) =
+21 01 cb 9b 6a 51 1a ae ad db be 09 cf 70 f8 81
+ec 56 8d 57 4a 2f fd 4d ab e5 ee 98 20 ad aa 47
+8e 56 fd 8f 4b a5 d0 9f fa 1c 6d 92 7c 40 f4 c3
+37 30 40 49 e8 a9 52 fb cb f4 5c 6f a7 7a 41 a4
diff --git a/crypto/test/data/tls/keystores/client_store.dsa b/crypto/test/data/tls/keystores/client_store.dsa
new file mode 100644
index 000000000..77c6e47c0
--- /dev/null
+++ b/crypto/test/data/tls/keystores/client_store.dsa
Binary files differdiff --git a/crypto/test/data/tls/keystores/client_store.rsa b/crypto/test/data/tls/keystores/client_store.rsa
new file mode 100644
index 000000000..fb4810331
--- /dev/null
+++ b/crypto/test/data/tls/keystores/client_store.rsa
Binary files differdiff --git a/crypto/test/data/tls/keystores/server_store.dsa b/crypto/test/data/tls/keystores/server_store.dsa
new file mode 100644
index 000000000..819cecd70
--- /dev/null
+++ b/crypto/test/data/tls/keystores/server_store.dsa
Binary files differdiff --git a/crypto/test/data/tls/keystores/server_store.rsa b/crypto/test/data/tls/keystores/server_store.rsa
new file mode 100644
index 000000000..5ade0b7b9
--- /dev/null
+++ b/crypto/test/data/tls/keystores/server_store.rsa
Binary files differ