Source release 16.2.0
This commit is contained in:
@@ -17515,8 +17515,8 @@ const size_t kInputSize = sizeof(kInput) / sizeof(kInput[0]);
|
||||
// Dummy decrypted output using the CENC 3.0 "cenc" mode. Decrypted using the
|
||||
// key matching kKeyIdCtr.
|
||||
const uint8_t kIvCenc[] = {
|
||||
0xf6, 0xf4, 0xb1, 0xe6, 0x00, 0xa5, 0xb6, 0x78, 0x13, 0xed, 0x2b, 0xde,
|
||||
0xd9, 0x13, 0xba, 0x9f,
|
||||
0xf6, 0xf4, 0xb1, 0xe6, 0x00, 0xa5, 0xb6, 0x78,
|
||||
0x13, 0xed, 0x2b, 0xde, 0xd9, 0x13, 0xba, 0x9f,
|
||||
};
|
||||
const size_t kIvCencSize = sizeof(kIvCenc) / sizeof(kIvCenc[0]);
|
||||
const uint8_t kOutputCenc[] = {
|
||||
@@ -35026,8 +35026,8 @@ const size_t kOutputCencSize = sizeof(kOutputCenc) / sizeof(kOutputCenc[0]);
|
||||
// Dummy decrypted output using the CENC 3.0 "cens" mode. Decrypted using the
|
||||
// key matching kKeyIdCtr.
|
||||
const uint8_t kIvCens[] = {
|
||||
0xa8, 0x91, 0xb8, 0x00, 0x0a, 0xf5, 0x30, 0x49, 0xd7, 0xb2, 0x4b, 0xdc,
|
||||
0x19, 0x07, 0x48, 0x39,
|
||||
0xa8, 0x91, 0xb8, 0x00, 0x0a, 0xf5, 0x30, 0x49,
|
||||
0xd7, 0xb2, 0x4b, 0xdc, 0x19, 0x07, 0x48, 0x39,
|
||||
};
|
||||
const size_t kIvCensSize = sizeof(kIvCens) / sizeof(kIvCens[0]);
|
||||
const uint8_t kOutputCens[] = {
|
||||
@@ -52537,8 +52537,8 @@ const size_t kOutputCensSize = sizeof(kOutputCens) / sizeof(kOutputCens[0]);
|
||||
// Dummy decrypted output using the CENC 3.0 "cbc1" mode. Decrypted using the
|
||||
// key matching kKeyIdCbc.
|
||||
const uint8_t kIvCbc1[] = {
|
||||
0x01, 0x11, 0x32, 0x13, 0x22, 0x79, 0x3b, 0x04, 0xf8, 0x71, 0xaa, 0xb2,
|
||||
0x8f, 0x6b, 0x06, 0x6e,
|
||||
0x01, 0x11, 0x32, 0x13, 0x22, 0x79, 0x3b, 0x04,
|
||||
0xf8, 0x71, 0xaa, 0xb2, 0x8f, 0x6b, 0x06, 0x6e,
|
||||
};
|
||||
const size_t kIvCbc1Size = sizeof(kIvCbc1) / sizeof(kIvCbc1[0]);
|
||||
const uint8_t kOutputCbc1[] = {
|
||||
@@ -70048,8 +70048,8 @@ const size_t kOutputCbc1Size = sizeof(kOutputCbc1) / sizeof(kOutputCbc1[0]);
|
||||
// Dummy decrypted output using the CENC 3.0 "cbcs" mode. Decrypted using the
|
||||
// key matching kKeyIdCbc.
|
||||
const uint8_t kIvCbcs[] = {
|
||||
0x8e, 0x26, 0x1c, 0x96, 0x60, 0xf5, 0x93, 0x0e, 0xbe, 0x17, 0x34, 0x51,
|
||||
0x0c, 0xb9, 0xbc, 0x23,
|
||||
0x8e, 0x26, 0x1c, 0x96, 0x60, 0xf5, 0x93, 0x0e,
|
||||
0xbe, 0x17, 0x34, 0x51, 0x0c, 0xb9, 0xbc, 0x23,
|
||||
};
|
||||
const size_t kIvCbcsSize = sizeof(kIvCbcs) / sizeof(kIvCbcs[0]);
|
||||
const uint8_t kOutputCbcs[] = {
|
||||
@@ -87559,8 +87559,8 @@ const size_t kOutputCbcsSize = sizeof(kOutputCbcs) / sizeof(kOutputCbcs[0]);
|
||||
// Dummy decrypted output for Entitlement License tests. Decrypted using the
|
||||
// key matching kKeyIdEntitlement1.
|
||||
const uint8_t kIvEntitlement1[] = {
|
||||
0xa5, 0xd0, 0x34, 0x63, 0xe3, 0x9c, 0x61, 0x27, 0x18, 0x41, 0xf7, 0x77,
|
||||
0x0b, 0x54, 0x91, 0xfe,
|
||||
0xa5, 0xd0, 0x34, 0x63, 0xe3, 0x9c, 0x61, 0x27,
|
||||
0x18, 0x41, 0xf7, 0x77, 0x0b, 0x54, 0x91, 0xfe,
|
||||
};
|
||||
const size_t kIvEntitlement1Size =
|
||||
sizeof(kIvEntitlement1) / sizeof(kIvEntitlement1[0]);
|
||||
@@ -105072,8 +105072,8 @@ const size_t kOutputEntitlement1Size =
|
||||
// Dummy decrypted output for Entitlement License tests. Decrypted using the
|
||||
// key matching kKeyIdEntitlement2.
|
||||
const uint8_t kIvEntitlement2[] = {
|
||||
0xfa, 0x98, 0x28, 0x28, 0x01, 0x71, 0x08, 0x5e, 0x84, 0x03, 0x7f, 0x5c,
|
||||
0xd3, 0x9d, 0x7d, 0x4e,
|
||||
0xfa, 0x98, 0x28, 0x28, 0x01, 0x71, 0x08, 0x5e,
|
||||
0x84, 0x03, 0x7f, 0x5c, 0xd3, 0x9d, 0x7d, 0x4e,
|
||||
};
|
||||
const size_t kIvEntitlement2Size =
|
||||
sizeof(kIvEntitlement2) / sizeof(kIvEntitlement2[0]);
|
||||
|
||||
Reference in New Issue
Block a user