[
  {
    "path": ".editorconfig",
    "content": "[*]\nend_of_line = lf\ninsert_final_newline = true\n\n[*.swift]\ncharset = utf-8\nindent_style = space\nindent_size = 2\n\n[Makefile]\nindent_style = tab\n"
  },
  {
    "path": ".github/CODEOWNERS",
    "content": "*       @krzyzanowskim\n"
  },
  {
    "path": ".github/FUNDING.yml",
    "content": "github: [krzyzanowskim, NathanFallet]\n"
  },
  {
    "path": ".github/ISSUE_TEMPLATE/bug_report.md",
    "content": "---\nname: Bug report\nabout: Create a report to help us improve\n\n---\n\n**Describe the bug**\n\n\n**Reproduce**\nSteps to reproduce:\n1.\n"
  },
  {
    "path": ".github/PULL_REQUEST_TEMPLATE.md",
    "content": "Fixes #\n\nChecklist:\n- [ ] Correct file headers (see CONTRIBUTING.md).\n- [ ] Formatted with [SwiftFormat](https://github.com/nicklockwood/SwiftFormat).\n- [ ] Tests added.\n\nChanges proposed in this pull request:\n-\n"
  },
  {
    "path": ".github/workflows/android.yml",
    "content": "name: Android\n\non:\n  push:\n    branches: [ main ]\n  pull_request:\n    branches: [ main ]\n\njobs:\n  build:\n\n    runs-on: ubuntu-latest\n\n    steps:\n    - name: Checkout\n      uses: actions/checkout@v4\n      with:\n        fetch-depth: 0\n\n    - name: Run tests\n      uses: skiptools/swift-android-action@v2\n"
  },
  {
    "path": ".github/workflows/linux.yml",
    "content": "name: Linux\n\non:\n  push:\n    branches: [ main ]\n  pull_request:\n    branches: [ main ]\n\njobs:\n  build:\n\n    runs-on: ubuntu-latest\n\n    steps:\n    - name: Checkout\n      uses: actions/checkout@v4\n      with:\n        fetch-depth: 0\n\n    - name: Swift Package Build\n      run: swift build -v\n\n    - name: Run tests\n      run: swift test -c release -Xswiftc -enable-testing -Xswiftc -DCI -Xswiftc -Xfrontend -Xswiftc -solver-memory-threshold -Xswiftc -Xfrontend -Xswiftc 999999999\n"
  },
  {
    "path": ".github/workflows/macos.yml",
    "content": "name: macOS\n\non:\n  push:\n    branches: [ main ]\n  pull_request:\n    branches: [ main ]\n\njobs:\n  build:\n\n    runs-on: macos-latest\n\n    steps:\n    - name: Checkout\n      uses: actions/checkout@v4\n      with:\n        fetch-depth: 0\n\n    - name: Select Xcode Version\n      uses: maxim-lobanov/setup-xcode@v1\n      with:\n        xcode-version: latest-stable\n\n    - name: Swift Package Build\n      run: swift build -v\n\n    - name: Run tests\n      run: swift test -c release -Xswiftc -enable-testing -Xswiftc -DCI -Xswiftc -Xfrontend -Xswiftc -solver-memory-threshold -Xswiftc -Xfrontend -Xswiftc 999999999\n"
  },
  {
    "path": ".gitignore",
    "content": "### Xcode ###\n.build/\nbuild/\n*.pbxuser\n!default.pbxuser\n*.mode1v3\n!default.mode1v3\n*.mode2v3\n!default.mode2v3\n*.perspectivev3\n!default.perspectivev3\nxcuserdata\n*.xccheckout\n*.moved-aside\nDerivedData\n*.xcuserstate\ntimeline.xctimeline\n.swiftpm/xcode\nPackage.resolved\nCryptoSwift.xcframework\n\n/Framework\n.DS_Store\nCarthage/Build\n\n.idea\n.vscode\n"
  },
  {
    "path": ".mailmap",
    "content": "Marcin Krzyzanowski <marcin.krzyzanowski@gmail.com> <758033+krzyzanowskim@users.noreply.github.com>\nMarcin Krzyzanowski <marcin.krzyzanowski@gmail.com> <krzyzanowskim@users.noreply.github.com>\nMarcin Krzyzanowski <marcin.krzyzanowski@gmail.com> <marcin@krzyzanowskim.com>\nMarcin Krzyzanowski <marcin.krzyzanowski@gmail.com> <marcin.krzyzanowski@gmail.com>\nLuis Reisewitz <reisewitz@me.com> <zweigraf@users.noreply.github.com>\nNathan Fallet <contact@nathanfallet.me> <nathan.fallet@gmail.com>"
  },
  {
    "path": ".spi.yml",
    "content": "version: 1\nbuilder:\n  configs:\n    - documentation_targets: [CryptoSwift]"
  },
  {
    "path": ".swiftformat",
    "content": "\n--exclude .build, Carthage, DerivedData, .git, Tests/LinuxMain.swift, Tests/CryptoSwiftTests/XCTestManifests.swift, Tests/TestsPerformance/XCTestManifests.swift\n\n--swiftversion 5.0\n--allman false\n--commas always\n--comments indent\n--elseposition same-line\n--empty void\n--exponentcase lowercase\n--exponentgrouping disabled\n--fractiongrouping disabled\n--header ignore\n--octalgrouping 4,8\n--decimalgrouping 3,6\n--binarygrouping 4,8\n--hexgrouping ignore\n--hexliteralcase lowercase\n--ifdef indent\n--indent 2\n--indentcase true\n--importgrouping testable-bottom\n--linebreaks lf\n--operatorfunc spaced\n--patternlet inline\n--ranges no-space\n--self insert\n--semicolons inline\n--stripunusedargs closure-only\n--trimwhitespace always\n--wraparguments preserve\n--wrapcollections before-first\n\n# rules\n\n--rules indent, braces, isEmpty, redundantBreak, blankLinesAroundMark, blankLinesAtEndOfScope, blankLinesBetweenScopes, consecutiveBlankLines, consecutiveSpaces, duplicateImports, elseOnSameLine, leadingDelimiters, redundantBreak, redundantExtensionACL, redundantFileprivate, redundantGet, redundantInit, redundantLet, redundantNilInit, redundantObjc, redundantParens, redundantPattern, redundantRawValues, redundantReturn, redundantSelf, redundantVoidReturnType, semicolons, sortedImports, spaceAroundBraces, spaceAroundBrackets, spaceAroundComments, spaceAroundGenerics, spaceAroundOperators, spaceAroundParens, spaceInsideBraces, spaceInsideBrackets, specifiers, strongOutlets, strongifiedSelf, todos, void, wrapArguments, yodaConditions, trailingSpace"
  },
  {
    "path": "CHANGELOG",
    "content": "1.9.0\n- Renamed bytes to byteArray in Data extension to avoid conflict with Swift 6.2 by @mluisbrown in #1076 and #1077\n\n1.8.5\n- Update README.md by @donatik27 in #1059\n- Add Android support by @marcprux in #1065\n- chore: fix some typos in comment by @sunxunle in #1068\n- fix: typos in documentation files by @vtjl10 in #1066\n- fix: typos in documentation files by @kilavvy in #1071\n- docs: fix typos by @RekCuy63 in #1072\n- fix: externalRepresentation condition to validate if key is private should be d not prime by @beatt83 in #1060\n\n1.8.4\n- Docs fix spelling issues by @nnsW3 in #1053\n- chore: fix some comments by @dropbigfish in #1050\n- docs fix spelling issues by @Guayaba221 in #1056\n- Support for Static Linux SDK Based on Musl Instead of Glibc by @AnneBlair in #1058\n- Use .sha2(.sha256) for PBKDF2 in readme by @sjudd in #1061\n\n1.8.3\n- Remove whitespace from the filename to please bezel build system\n- minors\n\n1.8.2\n- Enable VisionOS as supported platform for Xcode project and SwiftPM package\n- Tweak CocoaPods setup for privacy manifest\n\n1.8.1\n- Update publicKeyDER to support exponent of any byte length\n- Add SHA3 variants for RSA signature verification\n- Throw error on unsupported calls, rather than call fatalError\n- Update PKCS7 padding logic\n- Add SDK Privacy Manifest - PrivacyInfo.xcprivacy\n\n1.8.0\n- Add XChaCha20 and XChaCha20-Poly1305 (@zssz)\n\n1.7.2\n- Validate RSA input values\n- Minor updates\n\n1.7.1\n- Address Swift 5.8 warnings\n\n1.7.0\n- Fix compilation warnings\n- Ignore unknown character for base64 decoding\n- Bump minimum targets (for Xcode)\n- Xcode project disable bitcode (Building with bitcode is deprecated)\n\n1.6.0\n- Improve & extend RSA support with DER (see README for details)\n- Fix Blowfish memory leaks\n- Fix PCBC mode\n- SwiftWasm compatibility\n\n1.5.1\n- Resolve type name clash by renaming BigInt -> BigInteger\n\n1.5.0\n- RSA (@NathanFallet)\n- Workaround for Xcode 13.3.1\n\n1.4.3\n- Fix PCBC mode.\n\n1.4.2\n- Update Xcode project to Xcode 13\n- Add SHA3 support for HMAC\n- Update HMAC.Variant API (deprecate current cases)\n\n1.4.1\n- Introduce ISO 10126 padding\n- fix various compiler warnings\n- Revert Xcode project deployment target\n\n1.4.0\n- Customize CFB segment size (cfb8, cfb128).\n- Adapt Swift @inlineable for better code optimization\n\n1.3.8\n- Revert xcframework revolution. Back to build from sources. (I'm sorry)\n\n1.3.7\n- Re-release to workaround Swift Package Manager release\n\n1.3.6\n- Fix macOS binary\n- Windows support\n\n1.3.5\n- Re-release binary framework due to codesign issue\n\n1.3.4\n- Distribute optimized binary (xcframework) via SPM for apple platforms\n\n1.3.3\n- Adds OCB Authenticated-Encryption Algorithm (RFC7253)\n- build-framework.sh output CryptoSwift.xcframework\n- Xcode 12.2 maintenance updates\n- Removed CryptoSwift.playground (couldn't make it work since Xcode 12 update)\n\n1.3.2\n- Swift 5.3 update (Xcode 12)\n- Bump target platform (iOS 9, macOS 10.12)\n- Allow CMAC with any Cipher\n- Remove CMAC key limit\n\n1.3.1\n- Fix tests\n- Swift 5.2 update\n- Address possible timing issue\n\n1.3.0\n- Adds ISO-78164 padding\n- Performance improvements\n- Swift 5.1 update\n\n1.2.0\n- Performance improvements\n- Workaround Xcode test builds with Xcode 11\n\n1.1.3\n- Fix build crash: https://bugs.swift.org/browse/SR-11630\n- Fixes Xcode project tests build\n- SwiftFormat all the things\n- Increase/fix SHA2 data length for big input by use Int64 for calculation\n\n1.1.2\n- Fix Swift 5.0 build (for real this time)\n\n1.1.1\n- Fix Swift 5.0 build\n\n1.1.0\n- Replace RandomBytesSequence with Swift.RandomNumberGenerator\n- Fix CBC-MAC\n- Update SPM support\n- Update for Xcode 11 and Swift 5.1\n- Xcode: BUILD_LIBRARY_FOR_DISTRIBUTION = YES\n\n1.0.0\n- Swift 5\n- Let's\n- Celebrate\n- This\n- Event\n- With\n- 1.0.0 release\n- After\n- 4 years\n- Thank you\n\n0.15.0\n- Adds The scrypt Password-Based Key Derivation Function (https://tools.ietf.org/html/rfc7914)\n- Minor improvements\n\n0.14.0\n- Fixed decryption of AES-GCM ciphertexts with custom tag length\n\n0.13.1\n- Adds AES-GCM tag length configuration.\n- Fixes count check for initializing UInt64 from Data.\n\n0.13.0\n- Adds CBC-MAC authenticator.\n- Adds AES-CCM operation mode.\n\n0.12.0\n- Swift 4.2 maintenance update.\n\n0.11.0\n- API: Cryptor.seek() is throwable\n- Adds proper stream support for CTR encryption with Updaptable interface.\n- Refactor internals for the stream cipher modes.\n- Set minimum deployment target to 8.0 (again).\n\n0.10.0\n- API: BlockMode is no longer an enum. Please migrate to eg. CBC() etc...\n- Adds AES-GCM support. #97 - Feature sponsored by GesundheitsCloud (http://www.gesundheitscloud.de/)\n- Adds CRC32c support.\n- Improves AES variant validation.\n- Fixes empty password in PBKDF2.\n\n0.9.0\n- Swift 4.1 compatibility\n- Added CMAC message authenticator https://tools.ietf.org/html/rfc4493\n- Added AEADChaCha20Poly1305 (AEAD_CHACHA20_POLY1305) https://tools.ietf.org/html/rfc7539#section-2.8.1\n\n0.8.3\n- Fixes SHA3 padding.\n- Fixes Carthage builds.\n\n0.8.2\n- Fixes SHA3 partial updates calculations.\n- Makes ChaCha20 processing faster again.\n\n0.8.1\n- Adds Data(hex:) helper.\n- Adds HKDF (HMAC-based Extract-and-Expand Key Derivation Function)\n- Prevent ChaCha overflow error\n\n0.8.0\n- Adds SHA3 Keccak variants\n- Adds String.bytes helper to convert String to array of bytes\n- Improves AES performance\n- Speeds up compilation times with Swift 4\n- Fixes: Blowfish minimum key size is 5\n- Removes Ciphers \"iv\" parameter (value moved to BlockMode)\n- BlockMode uses associated value for IV value where apply e.g. .CBC(iv: ivbytes)\n- Refactors internal hacks no longer needed with Swift 4\n\n0.7.2\n- Adds Padding enum (.pkcs5, .pkcs7, .noPadding, .zeroPadding)\n- Removes Generics from the public API.\n- Slightly improves SHA1, SHA2, SHA3 performance.\n- Update SPM configuration for Swift 4\n\n0.7.1\n- Swift 4.0 compatibility release\n\n0.7.0\n- Swift 3.2 compatibility release\n\n0.6.9\n- Fixed padding issue where padding was not properly added in CTR mode.\n- Fixed thrown error on decrypting empty string,\n- Fixed CI build script.\n- Added String.encryptToBase64()\n\n0.6.8\n- Speed up MD5()\n- Faster Array(hex:)\n- Improve AES performance\n- Fix tvOS bitcode\n- Fix Blowfish CFB, OFB, CTR block modes.\n- Fix Blowfish for 32-bit arch.\n- Fix ChaCha20 preconditions\n\n0.6.7\n- Release for Xcode 8.2\n- Fix playground example\n\n0.6.6\n- Rework ChaCha20\n- Fix Poly1305\n\n0.6.5\n- Significant performance improvement when processing lange amount of data.\n- Degeneric functions and change Sequence -> Collection in generic constraints.\n\n0.6.4\n- More performance improvements\n- Add convenient Digest.sha2(bytes:variant)\n- New: Blowfish cipher\n\n0.6.3\n- Hotfix release\n- Fixes bitPadding() that breaks Digests calculations, introduced in 0.6.2\n\n0.6.2\n- SHA performance improvements by using less Swift in Swift\n- Fix public access to all digests classes\n\n0.6.1\n- Update tests.\n- New: RandomBytesSequence urandom values on Linux.\n- Throw appropriate error for AES with invalid input where padding is needed.\n- Improve performance, especially to SHA-1, SHA-2, PBKDF and related.\n- Set deployment targets for all platform. Fixes Carthage builds.\n- New: SHA-3 implementation (request #291)\n- SHA-1 conforms to Updatable protocol and may be calculated incrementally.\n- SHA-2 conforms to Updatable protocol and may be calculated incrementally.\n\n0.6.0\n- Remove bridge() workaround for Linux (not needed)\n- make MD5() public\n- Update README\n- Convenience HMAC initializer for String input\n\n0.6.0-beta2\n- SHA-2 fix #319\n- HashProtocol -> Digest and refactor\n- MD5 conforms to Updatable protocol and may be calculated incrementally\n- Cipher protocol accepts Collection input now\n\n0.6.0-beta1\n- Swift 3 compatibility\n- Multiplatform, Single-scheme Xcode Project\n- Swift Package Manager fully supported (build and tests)\n- Improved Linux support\n- Travis configuration added\n- Public interface tests added\n- enum Authenticator -> protocol Authenticator\n- CRC -> Checksum\n- String.encrypt() returns hex string instead of Array<UInt8>\n- removed String.decrypt()\n- enum Hash -> struct Hash\n- Convenience initializer of Array of bytes with Hex string. Array<UInt8>(hex: \"0xb1b1b2b2\")\n- Fix reusability of ChaCha20 instance\n- Replace optional initializers with throwable initializers\n- Allow to set initial counter explicitly (AES block modes). RandomAccessCryptor.seek()\n\n0.5.2\n- Fix AES-CTR incremental updates. #287\n- Fixed PBKDF2 tests. #295\n- Fixed assertion check in PKCS7. #288\n- Updatable protocol accept SequenceType in place of Array\n\n0.5.1\n- Fixed PBKDF2 not taking key length parameter into account\n- Switch to Array<> in code\n\n0.5\n- Added PBKDF1 https://tools.ietf.org/html/rfc2898#section-5.1\n- Added PBKDF2 https://tools.ietf.org/html/rfc2898#section-5.2\n- UpdatableCryptor protocol allows incremental encryption stream of data\n- CryptoSwift.playground\n- Docs update\n- Added reflection control to CRC-32 (Luís Silva)\n- Fix AES.init() (Pascal Pfiffner)\n\n0.4.1\n- fix NoPadding()\n\n0.4\n- Padding setup is now part of cipher constructor\n- Added PBKDF2 http://tools.ietf.org/html/rfc2898#section-5.2\n- Add BlockCipher protocol\n- Rename Cipher -> CipherProtocol\n- Remove build-frameworks.sh script\n- Keep sensitive data in memory with SecureBytes\n- Allows direct use of HMAC and Poly1305\n- README update\n- Fix missing Foundation import on Linux\n\n0.3.1\n- replace deprecated Bit with new enum.\n\n0.3\n- Swift 2.2 support\n- use generators for cipher block modes should reduce memory overload.\n- add OFB block mode\n- add PCBC block mode\n- String.decryptBase64ToString to decrypt Base64 encoded strings\n- broke up complicated expressions which were taking ages to compile\n\n0.2.3\n- enable bitcode setting for Debug on an Apple TV\n- faster compilation times\n- improve padding functions\n\n0.2.2\n- Fix ChaCha20 cipher\n- Replace for(;;) with for-in\n- Workaround for \"NSString are not yet implicitly convertible to String\" on Linux\n\n0.2.1\n- Fix linux build\n- re-add umbrella header\n\n0.2\n- Rabbit cipher (RFC4503)\n- Linux Swift support\n- Swift Package Manager support\n- tvOS support\n- Add optional seed to CRC\n- Add umbrella header (CryptoSwift.h)\n- Fix AES in CTR mode\n- Fix no padding support for CTR and CFB block modes\n- Fix access to AES.Error and ChaCha20.Error\n\n0.1.1\n- Fix Cococapods package (missing Foundation integration)\n\n0.1.0\n- Major performance improvements.\n- Transition from Optionals to throw error.\n- Replace enum Cipher with protocol for ciphers.\n- Added CRC16\n- Fixed AES CFB decryption\n- Drop internal \"Foundation\" dependency, nonetheless it is supported as usual.\n\n0.0.16\n- Critical fix for private \"md5\" selector issue (#135)\n\n0.0.15\n- Fix 32-bit CTR block mode\n- Carthage support update\n- Mark as App-Extension-Safe API\n\n0.0.14\n- hexString -> toHextString() #105\n- CTR (Counter mode)\n- Hex string is lowercase now\n- Carthage support\n- Tests update\n- Swift 2.0 support - overall update\n"
  },
  {
    "path": "CNAME",
    "content": "cryptoswift.io\n"
  },
  {
    "path": "CODE_OF_CONDUCT.md",
    "content": "# Contributor Covenant Code of Conduct\n\n## Our Pledge\n\nIn the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to make participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation.\n\n## Our Standards\n\nExamples of behavior that contributes to creating a positive environment include:\n\n* Using welcoming and inclusive language\n* Being respectful of differing viewpoints and experiences\n* Gracefully accepting constructive criticism\n* Focusing on what is best for the community\n* Showing empathy towards other community members\n\nExamples of unacceptable behavior by participants include:\n\n* The use of sexualized language or imagery and unwelcome sexual attention or advances\n* Trolling, insulting/derogatory comments, and personal or political attacks\n* Public or private harassment\n* Publishing others' private information, such as a physical or electronic address, without explicit permission\n* Other conduct which could reasonably be considered inappropriate in a professional setting\n\n## Our Responsibilities\n\nProject maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior.\n\nProject maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful.\n\n## Scope\n\nThis Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.\n\n## Enforcement\n\nInstances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at marcin@krzyzanowskim.com. The project team will review and investigate all complaints, and will respond in a way that it deems appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.\n\nProject maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership.\n\n## Attribution\n\nThis Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4, available at [http://contributor-covenant.org/version/1/4][version]\n\n[homepage]: http://contributor-covenant.org\n[version]: http://contributor-covenant.org/version/1/4/\n"
  },
  {
    "path": "CONTRIBUTING.md",
    "content": "By submitting a pull request, you represent that you have the right to license\nyour contribution to Marcin Krzyżanowski and the community, and agree by submitting the patch that your contributions are licensed under the CryptoSwift project license.\n\n---\n\nBefore submitting the pull request, please make sure you have tested your changes.\n\n---\n\nFor new files, please use the correct file header:\n\n```\n//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n```\n"
  },
  {
    "path": "CONTRIBUTORS.txt",
    "content": "For the purpose of tracking copyright, this is the list of individuals and\norganizations who have contributed source code to CryptoSwift.\n\n### Contributors\n\n- 0xabhisek <128348758+0xabhisek@users.noreply.github.com>\n- Adin Cebic <cebic.ad@gmail.com>\n- Adolfo Martinelli <adolfo@airmap.com>\n- Aidan Woods <aidantwoods@gmail.com>\n- Alejandro Isaza <alejandro.isaza@gmail.com>\n- Alex Binary <alexandre@bintz.io>\n- Alex Vlasov <alex.m.vlasov@gmail.com>\n- AlexDenisov <1101.debian@gmail.com>\n- Alexey Komnin <Interfere@users.noreply.github.com>\n- Alsey Coleman Miller <alseycmiller@gmail.com>\n- Andrew Wagner <845683+drewag@users.noreply.github.com>\n- André Berenguel <andre.berenguel@gmail.com>\n- Anton <antonmes@users.noreply.github.com>\n- Ayaka Nonaka <ayanonagon@gmail.com>\n- Bart Cone <cone.bart@gmail.com>\n- Bing Cheung <32565605+eungch@users.noreply.github.com>\n- Bogdan Bystritskiy <q80061@gmail.com>\n- Brandon Toms <btoms.20@gmail.com>\n- Brice Cesarin <bc@dejamobile.com>\n- Bruce Geerdes <bruce@vdub.software>\n- Bryan Chen <xlchen1291@gmail.com>\n- Bryant Luk <bryant.luk@bryantluk.com>\n- C.W. Betts <computers57@hotmail.com>\n- Caio Mathielo <mathielo@gmail.com>\n- Cheng-Yu Hsu <m@cyhsu.me>\n- Chris Amanse <chris@chrisamanse.xyz>\n- Christian Steffens <cs@hibento.de>\n- Cihat Gündüz <github@cihatguenduez.de>\n- Cosmin Baies <cbaies@blockchain.com>\n- Dave Wood <dave@cerebralgardens.com>\n- Dima Kalachov <dima.kalachov@gmail.com>\n- Dusan Klinec <dusan.klinec@gmail.com>\n- Elaine Lyons <e.lyons@fetchrewards.com>\n- Elias Rad <146735585+nnsW3@users.noreply.github.com>\n- Eneko Alonso <eneko.alonso@gmail.com>\n- Eugene Berdnikov <eberdnikov@outlook.com>\n- Evan Maloney <emaloney@gilt.com>\n- Evin Ugur <evinoog96@gmail.com>\n- Frank Langel <frank@frankjlangel.com>\n- Frank Langel <gr.markin@googlemail.com>\n- Franklin Schrans <f.schrans@me.com>\n- FreeThinker <59345560+Free-FreeThinker@users.noreply.github.com>\n- Grzegorz Nowicki <sp3esu@gmail.com>\n- Hamilton Chapman <hamchapman@gmail.com>\n- Honza Dvorsky <jan.dvorsky@yahoo.com>\n- Howtin <gonghao@ghsky.com>\n- Ibrahim Kteish <ibrahimk@vinelab.com>\n- Igor Camilo <igor.rcamilo@gmail.com>\n- JP Simard <jp@jpsim.com>\n- Javier Soto <javiers@twitter.com>\n- Jeremy Greenwood <jeremy@mobelux.com>\n- Jimmie Johansson <jim@svep.se>\n- John Hammerlund <johnhammerlund@gmail.com>\n- Jonas Obrist <ojiidotch@gmail.com>\n- K.K. POON <noopkk@gmail.com>\n- Katrin Annuk <katrin.annuk@lab.mobi>\n- Keith Smiley <keithbsmiley@gmail.com>\n- Kenji Wada <ch3cooh393@gmail.com>\n- Koray Koska <koray@koska.at>\n- Kyle Fuller <kyle@fuller.li>\n- LamTrinh.Dev <me@lamtrinh.dev>\n- Lex Tang <lexrus@gmail.com>\n- Logan Wright <logan.william.wright@gmail.com>\n- Ludo Galabru <ludovic@galabru.com>\n- Luis Reisewitz <reisewitz@me.com>\n- Luís Silva <lm2s@gmx.com>\n- Madhava Jay <me@madhavajay.com>\n- Marc Prud'hommeaux <marc@prux.org>\n- Marcelo Fabri <me@marcelofabri.com>\n- Marcin Krzyzanowski <marcin.krzyzanowski@gmail.com>\n- Masayuki Ono <mono0926@gmail.com>\n- Matias Cudich <mcudich@gmail.com>\n- Matias Piipari <matias.piipari@gmail.com>\n- Matthew Chung <matthewchung74@gmail.com>\n- Matthias Geihs <matthias@geihs.de>\n- Maxence Mottard <mottard.maxence@gmail.com>\n- Michael Ledin <m.ledin@appheads.ru>\n- Michael Redig <mredig@gmail.com>\n- Mikael LE GOFF <mikael@mercari.com>\n- Mo Ramezanpoor <me@mohsenr.com>\n- Nabil Elqatib <nabilelqatib@gmail.com>\n- Nate West <nwest@detroitlabs.com>\n- Nathan Fallet <contact@nathanfallet.me>\n- Nicholas Maccharoli <nicko@screaming-cactus.com>\n- Nobutaka Yuasa <nobutaka.yuasa@gmail.com>\n- Oscar Choi <oscar@goodnotesapp.com>\n- Oscar De Moya <oscar.demoya@koombea.com>\n- Pantelis Zirinis <info@paz-labs.com>\n- Paolo Musolino <info@codeido.com>\n- Pascal Pfiffner <phase.of.matter@gmail.com>\n- Pedro Silva <pjlsilva@gmail.com>\n- Pierpaolo Frasa <pfrasa@chegg.com>\n- Quinn McHenry <quinn@jqm.us>\n- R4v3nPr0 <m_117@outlook.com>\n- Rich Lowenberg <me@richlowenberg.com>\n- Roman Podymov <podymfrombryansk@yandex.ru>\n- Ronald Mannak <ronaldmannak@me.com>\n- SLboat <toaier@me.com>\n- Sali0m <jehan.vossen@gmail.com>\n- Sam <sam.a.judd@gmail.com>\n- Sam Soffes <sam@soff.es>\n- Samuel GRAU <samuel.grau@gmail.com>\n- ScottieY <scottieyan@gmail.com>\n- Semen Zhydenko <simeon.zhidenko@gmail.com>\n- Simon Hartmann <simon.hartmann@andrena.de>\n- Stefan Hintz <stefan.hintz@bild.de>\n- Thomas Bibby <hello@ipadtills.com>\n- Thomas Haak <thomas.haak@teleboy.ch>\n- TictoDev <kjelldebaeremaecker@icloud.com>\n- Tomas Kraina <tomas@mailcloud.com>\n- Tomasz Szulc <mail@szulctomasz.com>\n- Tomasz Wierzbik <twierzbik@msn.com>\n- Valeriy Van <github@w7software.com>\n- WFrost3 <134406901+WFrost3@users.noreply.github.com>\n- Xavier Matos <matos.xav@gmail.com>\n- Yannick Loriot <yannick.loriot@gmail.com>\n- YinYuGuang <yin.yuguang@immomo.com>\n- Yury Lapitsky <yury.lapitsky@gmail.com>\n- Zsombor Szabo <zsombor@gmail.com>\n- Zsombor Szabo <zsombor@proxy.com>\n- akreutz <27BBsan08!>\n- dropbigfish <fillfish@foxmail.com>\n- jose <nextgenappsllc@gmail.com>\n- mrahmiao <mrahmiao@gmail.com>\n- planetBoy <140164174+Guayaba221@users.noreply.github.com>\n- spatno <seanpatno@gmail.com>\n- sweepty <adie0423@gmail.com>\n- venj <im.venj@gmail.com>\n- Исаев Владислав Игоревич <viisayev@mts.ru>\n\n**Updating this list**\n\nPlease do not edit this file manually. It is generated using `./scripts/generate-contributors-list.sh`. If a name is misspelled or appearing multiple times: add an entry in `./.mailmap`\n"
  },
  {
    "path": "CryptoSwift-TestHostApp/AppDelegate.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport UIKit\n\n@UIApplicationMain\nclass AppDelegate: UIResponder, UIApplicationDelegate {\n\n  var window: UIWindow?\n\n  func application(_ application: UIApplication, didFinishLaunchingWithOptions launchOptions: [UIApplication.LaunchOptionsKey: Any]?) -> Bool {\n    // Override point for customization after application launch.\n    true\n  }\n\n  func applicationWillResignActive(_ application: UIApplication) {\n    // Sent when the application is about to move from active to inactive state. This can occur for certain types of temporary interruptions (such as an incoming phone call or SMS message) or when the user quits the application and it begins the transition to the background state.\n    // Use this method to pause ongoing tasks, disable timers, and invalidate graphics rendering callbacks. Games should use this method to pause the game.\n  }\n\n  func applicationDidEnterBackground(_ application: UIApplication) {\n    // Use this method to release shared resources, save user data, invalidate timers, and store enough application state information to restore your application to its current state in case it is terminated later.\n    // If your application supports background execution, this method is called instead of applicationWillTerminate: when the user quits.\n  }\n\n  func applicationWillEnterForeground(_ application: UIApplication) {\n    // Called as part of the transition from the background to the active state; here you can undo many of the changes made on entering the background.\n  }\n\n  func applicationDidBecomeActive(_ application: UIApplication) {\n    // Restart any tasks that were paused (or not yet started) while the application was inactive. If the application was previously in the background, optionally refresh the user interface.\n  }\n\n  func applicationWillTerminate(_ application: UIApplication) {\n    // Called when the application is about to terminate. Save data if appropriate. See also applicationDidEnterBackground:.\n  }\n}\n"
  },
  {
    "path": "CryptoSwift-TestHostApp/Info.plist",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n<plist version=\"1.0\">\n<dict>\n\t<key>CFBundleDevelopmentRegion</key>\n\t<string>$(DEVELOPMENT_LANGUAGE)</string>\n\t<key>CFBundleExecutable</key>\n\t<string>$(EXECUTABLE_NAME)</string>\n\t<key>CFBundleIdentifier</key>\n\t<string>$(PRODUCT_BUNDLE_IDENTIFIER)</string>\n\t<key>CFBundleInfoDictionaryVersion</key>\n\t<string>6.0</string>\n\t<key>CFBundleName</key>\n\t<string>$(PRODUCT_NAME)</string>\n\t<key>CFBundlePackageType</key>\n\t<string>APPL</string>\n\t<key>CFBundleShortVersionString</key>\n\t<string>1.0</string>\n\t<key>CFBundleVersion</key>\n\t<string>1</string>\n\t<key>LSRequiresIPhoneOS</key>\n\t<true/>\n\t<key>UIRequiredDeviceCapabilities</key>\n\t<array>\n\t\t<string>armv7</string>\n\t</array>\n\t<key>UIRequiresFullScreen</key>\n\t<true/>\n\t<key>UISupportedInterfaceOrientations</key>\n\t<array>\n\t\t<string>UIInterfaceOrientationPortrait</string>\n\t\t<string>UIInterfaceOrientationLandscapeLeft</string>\n\t\t<string>UIInterfaceOrientationLandscapeRight</string>\n\t</array>\n\t<key>UISupportedInterfaceOrientations~ipad</key>\n\t<array>\n\t\t<string>UIInterfaceOrientationPortrait</string>\n\t\t<string>UIInterfaceOrientationPortraitUpsideDown</string>\n\t\t<string>UIInterfaceOrientationLandscapeLeft</string>\n\t\t<string>UIInterfaceOrientationLandscapeRight</string>\n\t</array>\n</dict>\n</plist>\n"
  },
  {
    "path": "CryptoSwift.podspec",
    "content": "Pod::Spec.new do |s|\n  s.name         = \"CryptoSwift\"\n  s.version      = \"1.9.0\"\n  s.source       = { :git => \"https://github.com/krzyzanowskim/CryptoSwift.git\", :tag => \"#{s.version}\" }\n  s.summary      = \"Cryptography in Swift. SHA, MD5, CRC, PBKDF, Poly1305, HMAC, CMAC, HDKF, Scrypt, ChaCha20, Rabbit, Blowfish, AES, RSA.\"\n  s.description  = \"Cryptography functions and helpers for Swift implemented in Swift. SHA-1, SHA-2, SHA-3, MD5, PBKDF1, PBKDF2, Scrypt, CRC, Poly1305, HMAC, ChaCha20, Rabbit, Blowfish, AES, RSA\"\n  s.homepage     = \"https://github.com/krzyzanowskim/CryptoSwift\"\n  s.license      = {:type => \"Attribution\", :file => \"LICENSE\"}\n  s.authors      = {'Marcin Krzyżanowski' => 'marcin@krzyzanowskim.com'}\n  s.social_media_url = \"https://x.com/krzyzanowskim\"\n  s.cocoapods_version = '>= 1.10.0'\n  s.swift_version = \"5.6\"\n  s.ios.deployment_target = \"11.0\"\n  s.osx.deployment_target = \"10.13\"\n  s.watchos.deployment_target = \"4.0\"\n  s.tvos.deployment_target = \"11.0\"\n  s.source_files  = \"Sources/CryptoSwift/**/*.swift\"\n  s.requires_arc = true\n  s.resource_bundles = {'CryptoSwift' => ['Sources/CryptoSwift/PrivacyInfo.xcprivacy']}\nend\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/project.pbxproj",
    "content": "// !$*UTF8*$!\n{\n\tarchiveVersion = 1;\n\tclasses = {\n\t};\n\tobjectVersion = 55;\n\tobjects = {\n\n/* Begin PBXBuildFile section */\n\t\t0AF023D5230F2B0F008E4E68 /* ISO78164Padding.swift in Sources */ = {isa = PBXBuildFile; fileRef = 0AF023D4230F2B0F008E4E68 /* ISO78164Padding.swift */; };\n\t\t0EE73E71204D598100110E11 /* CMAC.swift in Sources */ = {isa = PBXBuildFile; fileRef = 0EE73E70204D598100110E11 /* CMAC.swift */; };\n\t\t0EE73E74204D59C200110E11 /* CMACTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 0EE73E72204D599C00110E11 /* CMACTests.swift */; };\n\t\t14156CE52011422400DDCFBC /* ChaCha20Poly1305Tests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 14156CE42011422400DDCFBC /* ChaCha20Poly1305Tests.swift */; };\n\t\t1467460F2017BB3600DF04ED /* AEAD.swift in Sources */ = {isa = PBXBuildFile; fileRef = 1467460E2017BB3600DF04ED /* AEAD.swift */; };\n\t\t35F3E51C23BF9A6700A024A1 /* OCB.swift in Sources */ = {isa = PBXBuildFile; fileRef = 35F3E51B23BF9A6700A024A1 /* OCB.swift */; };\n\t\t42012783267A6F1C00F82506 /* ISO10126Padding.swift in Sources */ = {isa = PBXBuildFile; fileRef = 42012782267A6F1C00F82506 /* ISO10126Padding.swift */; };\n\t\t5431FD5B2B021476001DEE77 /* SignatureVerificationTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 5431FD592B021470001DEE77 /* SignatureVerificationTests.swift */; };\n\t\t674A736F1BF5D85B00866C5B /* RabbitTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 674A736E1BF5D85B00866C5B /* RabbitTests.swift */; };\n\t\t6A7CDEED26CD1E4C00FFB1AF /* RSATests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6A7CDEEC26CD1E4C00FFB1AF /* RSATests.swift */; };\n\t\t6AC893F626DB950F00F7E787 /* Addition.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893E026DB950C00F7E787 /* Addition.swift */; };\n\t\t6AC893F826DB950F00F7E787 /* GCD.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893E226DB950D00F7E787 /* GCD.swift */; };\n\t\t6AC893F926DB950F00F7E787 /* Comparable.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893E326DB950D00F7E787 /* Comparable.swift */; };\n\t\t6AC893FA26DB950F00F7E787 /* Hashable.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893E426DB950D00F7E787 /* Hashable.swift */; };\n\t\t6AC893FC26DB950F00F7E787 /* Codable.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893E626DB950D00F7E787 /* Codable.swift */; };\n\t\t6AC893FD26DB950F00F7E787 /* Shifts.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893E726DB950D00F7E787 /* Shifts.swift */; };\n\t\t6AC8940026DB950F00F7E787 /* Subtraction.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893EA26DB950D00F7E787 /* Subtraction.swift */; };\n\t\t6AC8940226DB950F00F7E787 /* Multiplication.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893EC26DB950D00F7E787 /* Multiplication.swift */; };\n\t\t6AC8940526DB950F00F7E787 /* Strideable.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893EF26DB950E00F7E787 /* Strideable.swift */; };\n\t\t6AC8940626DB950F00F7E787 /* BigInt.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893F026DB950E00F7E787 /* BigInt.swift */; };\n\t\t6AC8940726DB950F00F7E787 /* Exponentiation.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893F126DB950E00F7E787 /* Exponentiation.swift */; };\n\t\t6AC8940826DB950F00F7E787 /* Random.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893F226DB950E00F7E787 /* Random.swift */; };\n\t\t6AC8940A26DB950F00F7E787 /* BigUInt.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893F426DB950E00F7E787 /* BigUInt.swift */; };\n\t\t6AC8940B26DB950F00F7E787 /* Division.swift in Sources */ = {isa = PBXBuildFile; fileRef = 6AC893F526DB950E00F7E787 /* Division.swift */; };\n\t\t750509991F6BEF2A00394A1B /* PKCS7.swift in Sources */ = {isa = PBXBuildFile; fileRef = 750509981F6BEF2A00394A1B /* PKCS7.swift */; };\n\t\t7507705F28D61E78004A44DC /* RSA.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507705C28D61E78004A44DC /* RSA.swift */; };\n\t\t7507706028D61E78004A44DC /* RSA+Signature.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507705D28D61E78004A44DC /* RSA+Signature.swift */; };\n\t\t7507706128D61E78004A44DC /* RSA+Cipher.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507705E28D61E78004A44DC /* RSA+Cipher.swift */; };\n\t\t7507706428D61E8B004A44DC /* DER.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507706328D61E8B004A44DC /* DER.swift */; };\n\t\t7507706A28D61E97004A44DC /* ASN1Scanner.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507706628D61E97004A44DC /* ASN1Scanner.swift */; };\n\t\t7507706B28D61E97004A44DC /* ASN1Encoder.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507706728D61E97004A44DC /* ASN1Encoder.swift */; };\n\t\t7507706C28D61E97004A44DC /* ASN1Decoder.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507706828D61E97004A44DC /* ASN1Decoder.swift */; };\n\t\t7507706D28D61E97004A44DC /* ASN1.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507706928D61E97004A44DC /* ASN1.swift */; };\n\t\t7507706F28D61EBA004A44DC /* PKCS1v15.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507706E28D61EBA004A44DC /* PKCS1v15.swift */; };\n\t\t7507707128D61ED5004A44DC /* Signature.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7507707028D61ED5004A44DC /* Signature.swift */; };\n\t\t750CC3EB1DC0CACE0096BE6E /* BlowfishTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 750CC3EA1DC0CACE0096BE6E /* BlowfishTests.swift */; };\n\t\t75100F8F19B0BC890005C5F5 /* Poly1305Tests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75100F8E19B0BC890005C5F5 /* Poly1305Tests.swift */; };\n\t\t751AA0F3255F4EB600D4719E /* AESOCBTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 35F3E51D23BF9AD300A024A1 /* AESOCBTests.swift */; };\n\t\t751EE9781F93996100161FFC /* AES.Cryptors.swift in Sources */ = {isa = PBXBuildFile; fileRef = 751EE9771F93996100161FFC /* AES.Cryptors.swift */; };\n\t\t75211F95207249D8004E41F8 /* AppDelegate.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75211F94207249D8004E41F8 /* AppDelegate.swift */; };\n\t\t7523742D2083C61D0016D662 /* GCM.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7523742C2083C61C0016D662 /* GCM.swift */; };\n\t\t7529366A20683DFC00195874 /* AEADChaCha20Poly1305.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7529366920683DFC00195874 /* AEADChaCha20Poly1305.swift */; };\n\t\t752BED9D208C120D00FC4743 /* Blowfish+Foundation.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52541EE8B6CA0048EB3B /* Blowfish+Foundation.swift */; };\n\t\t752BED9E208C121000FC4743 /* Blowfish.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52491EE8B6CA0048EB3B /* Blowfish.swift */; };\n\t\t752BED9F208C135700FC4743 /* AES+Foundation.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52531EE8B6CA0048EB3B /* AES+Foundation.swift */; };\n\t\t753674072175D012003E32A6 /* StreamDecryptor.swift in Sources */ = {isa = PBXBuildFile; fileRef = 753674062175D012003E32A6 /* StreamDecryptor.swift */; };\n\t\t754310442050111A003FB1DF /* CompactMap.swift in Sources */ = {isa = PBXBuildFile; fileRef = 754310432050111A003FB1DF /* CompactMap.swift */; };\n\t\t75482EA41CB310B7001F66A5 /* PBKDF.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75482EA31CB310B7001F66A5 /* PBKDF.swift */; };\n\t\t754BE46819693E190098E6F3 /* DigestTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 754BE46719693E190098E6F3 /* DigestTests.swift */; };\n\t\t755BA296235387700039CAB5 /* Default-568h@2x.png in Resources */ = {isa = PBXBuildFile; fileRef = 7576F64C20725BD5006688F8 /* Default-568h@2x.png */; };\n\t\t755FB1DA199E347D00475437 /* ExtensionsTest.swift in Sources */ = {isa = PBXBuildFile; fileRef = 755FB1D9199E347D00475437 /* ExtensionsTest.swift */; };\n\t\t7564F0522072EAEB00CA5A96 /* PBKDFPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6F6207290F8006688F8 /* PBKDFPerf.swift */; platformFilter = ios; };\n\t\t7564F0532072EAEB00CA5A96 /* ChaCha20TestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6F020728EAB006688F8 /* ChaCha20TestsPerf.swift */; platformFilter = ios; };\n\t\t7564F0542072EAEB00CA5A96 /* RabbitTestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6F220728F00006688F8 /* RabbitTestsPerf.swift */; platformFilter = ios; };\n\t\t7564F0552072EAEB00CA5A96 /* ExtensionsTestPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6F420729069006688F8 /* ExtensionsTestPerf.swift */; platformFilter = ios; };\n\t\t7564F0562072EAEB00CA5A96 /* DigestTestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6EB20726319006688F8 /* DigestTestsPerf.swift */; platformFilter = ios; };\n\t\t7564F0582072EAEB00CA5A96 /* AESTestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6EE20726422006688F8 /* AESTestsPerf.swift */; platformFilter = ios; };\n\t\t7564F05A2072EAEB00CA5A96 /* CryptoSwift.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 754BE45519693E190098E6F3 /* CryptoSwift.framework */; };\n\t\t7564F0642072ED7000CA5A96 /* CryptoSwift.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 754BE45519693E190098E6F3 /* CryptoSwift.framework */; };\n\t\t7564F0652072ED7000CA5A96 /* CryptoSwift.framework in Embed Frameworks */ = {isa = PBXBuildFile; fileRef = 754BE45519693E190098E6F3 /* CryptoSwift.framework */; settings = {ATTRIBUTES = (CodeSignOnCopy, RemoveHeadersOnCopy, ); }; };\n\t\t756A64C62111083B00BE8805 /* StreamEncryptor.swift in Sources */ = {isa = PBXBuildFile; fileRef = 756A64C52111083B00BE8805 /* StreamEncryptor.swift */; };\n\t\t7571938E2816BFE3001C3AC0 /* CS.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7571938D2816BFE3001C3AC0 /* CS.swift */; };\n\t\t757DA2531A4ED0A4002BA3EF /* PaddingTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 757DA2521A4ED0A4002BA3EF /* PaddingTests.swift */; };\n\t\t757DA2551A4ED408002BA3EF /* AESTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 757DA2541A4ED408002BA3EF /* AESTests.swift */; };\n\t\t757DA2591A4ED4D7002BA3EF /* ChaCha20Tests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 757DA2581A4ED4D7002BA3EF /* ChaCha20Tests.swift */; };\n\t\t758A94291A65C67400E46135 /* HMACTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 758A94271A65C59200E46135 /* HMACTests.swift */; };\n\t\t7594CCBC217A76DC0055C95D /* AESCCMTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 755E0303217A756F00065FC6 /* AESCCMTests.swift */; };\n\t\t7595C1582072E5B900EA1A5F /* DigestTestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6EB20726319006688F8 /* DigestTestsPerf.swift */; platformFilters = (macos, ); };\n\t\t7595C1592072E5B900EA1A5F /* AESTestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6EE20726422006688F8 /* AESTestsPerf.swift */; platformFilters = (macos, ); };\n\t\t7595C15A2072E5B900EA1A5F /* ChaCha20TestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6F020728EAB006688F8 /* ChaCha20TestsPerf.swift */; platformFilters = (macos, ); };\n\t\t7595C15B2072E5B900EA1A5F /* RabbitTestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6F220728F00006688F8 /* RabbitTestsPerf.swift */; platformFilters = (macos, ); };\n\t\t7595C15C2072E5B900EA1A5F /* ExtensionsTestPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6F420729069006688F8 /* ExtensionsTestPerf.swift */; platformFilters = (macos, ); };\n\t\t7595C15D2072E5B900EA1A5F /* PBKDFPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 7576F6F6207290F8006688F8 /* PBKDFPerf.swift */; platformFilters = (macos, ); };\n\t\t7595C1602072E64900EA1A5F /* CryptoSwift.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 754BE45519693E190098E6F3 /* CryptoSwift.framework */; };\n\t\t75B3ED77210F9DF7005D4ADA /* BlockDecryptor.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75B3ED76210F9DF7005D4ADA /* BlockDecryptor.swift */; };\n\t\t75B3ED79210FA016005D4ADA /* BlockEncryptor.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75B3ED78210FA016005D4ADA /* BlockEncryptor.swift */; };\n\t\t75B601EB197D6A6C0009B53D /* CryptoSwift.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 754BE45519693E190098E6F3 /* CryptoSwift.framework */; };\n\t\t75C2E76D1D55F097003D2BCA /* Access.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75C2E76C1D55F097003D2BCA /* Access.swift */; };\n\t\t75D7AF38208BFB1600D22BEB /* UInt128.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75D7AF37208BFB1600D22BEB /* UInt128.swift */; };\n\t\t75EC527B1EE8B73A0048EB3B /* CryptoSwift.h in Headers */ = {isa = PBXBuildFile; fileRef = 75EC527A1EE8B6CA0048EB3B /* CryptoSwift.h */; settings = {ATTRIBUTES = (Public, ); }; };\n\t\t75EC527C1EE8B8130048EB3B /* AES.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52381EE8B6CA0048EB3B /* AES.swift */; };\n\t\t75EC527D1EE8B8130048EB3B /* Array+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52391EE8B6CA0048EB3B /* Array+Extension.swift */; };\n\t\t75EC527E1EE8B8130048EB3B /* Authenticator.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC523A1EE8B6CA0048EB3B /* Authenticator.swift */; };\n\t\t75EC527F1EE8B8130048EB3B /* BatchedCollection.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC523B1EE8B6CA0048EB3B /* BatchedCollection.swift */; };\n\t\t75EC52801EE8B8130048EB3B /* Bit.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC523C1EE8B6CA0048EB3B /* Bit.swift */; };\n\t\t75EC52811EE8B8130048EB3B /* BlockCipher.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC523D1EE8B6CA0048EB3B /* BlockCipher.swift */; };\n\t\t75EC52821EE8B8170048EB3B /* BlockMode.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC523F1EE8B6CA0048EB3B /* BlockMode.swift */; };\n\t\t75EC52831EE8B8170048EB3B /* BlockModeOptions.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52401EE8B6CA0048EB3B /* BlockModeOptions.swift */; };\n\t\t75EC52841EE8B8170048EB3B /* CipherModeWorker.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52411EE8B6CA0048EB3B /* CipherModeWorker.swift */; };\n\t\t75EC52851EE8B8170048EB3B /* CBC.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52421EE8B6CA0048EB3B /* CBC.swift */; };\n\t\t75EC52861EE8B8170048EB3B /* CFB.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52431EE8B6CA0048EB3B /* CFB.swift */; };\n\t\t75EC52871EE8B8170048EB3B /* CTR.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52441EE8B6CA0048EB3B /* CTR.swift */; };\n\t\t75EC52881EE8B8170048EB3B /* ECB.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52451EE8B6CA0048EB3B /* ECB.swift */; };\n\t\t75EC52891EE8B8170048EB3B /* OFB.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52461EE8B6CA0048EB3B /* OFB.swift */; };\n\t\t75EC528A1EE8B8170048EB3B /* PCBC.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52471EE8B6CA0048EB3B /* PCBC.swift */; };\n\t\t75EC528D1EE8B81A0048EB3B /* ChaCha20.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC524A1EE8B6CA0048EB3B /* ChaCha20.swift */; };\n\t\t75EC528E1EE8B81A0048EB3B /* Checksum.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC524B1EE8B6CA0048EB3B /* Checksum.swift */; };\n\t\t75EC528F1EE8B81A0048EB3B /* Cipher.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC524C1EE8B6CA0048EB3B /* Cipher.swift */; };\n\t\t75EC52901EE8B81A0048EB3B /* Collection+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC524D1EE8B6CA0048EB3B /* Collection+Extension.swift */; };\n\t\t75EC52911EE8B81A0048EB3B /* Cryptors.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC524E1EE8B6CA0048EB3B /* Cryptors.swift */; };\n\t\t75EC52931EE8B81A0048EB3B /* Digest.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52501EE8B6CA0048EB3B /* Digest.swift */; };\n\t\t75EC52941EE8B81A0048EB3B /* DigestType.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52511EE8B6CA0048EB3B /* DigestType.swift */; };\n\t\t75EC52971EE8B8200048EB3B /* ChaCha20+Foundation.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52551EE8B6CA0048EB3B /* ChaCha20+Foundation.swift */; };\n\t\t75EC52981EE8B8200048EB3B /* Array+Foundation.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52561EE8B6CA0048EB3B /* Array+Foundation.swift */; };\n\t\t75EC52991EE8B8200048EB3B /* Data+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52571EE8B6CA0048EB3B /* Data+Extension.swift */; };\n\t\t75EC529A1EE8B8200048EB3B /* HMAC+Foundation.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52581EE8B6CA0048EB3B /* HMAC+Foundation.swift */; };\n\t\t75EC529B1EE8B8200048EB3B /* Rabbit+Foundation.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52591EE8B6CA0048EB3B /* Rabbit+Foundation.swift */; };\n\t\t75EC529C1EE8B8200048EB3B /* String+FoundationExtension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC525A1EE8B6CA0048EB3B /* String+FoundationExtension.swift */; };\n\t\t75EC529D1EE8B8200048EB3B /* Utils+Foundation.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC525B1EE8B6CA0048EB3B /* Utils+Foundation.swift */; };\n\t\t75EC529E1EE8B8230048EB3B /* Generics.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC525C1EE8B6CA0048EB3B /* Generics.swift */; };\n\t\t75EC529F1EE8B8230048EB3B /* HMAC.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC525D1EE8B6CA0048EB3B /* HMAC.swift */; };\n\t\t75EC52A01EE8B8290048EB3B /* Int+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC525F1EE8B6CA0048EB3B /* Int+Extension.swift */; };\n\t\t75EC52A21EE8B8290048EB3B /* MD5.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52611EE8B6CA0048EB3B /* MD5.swift */; };\n\t\t75EC52A31EE8B8290048EB3B /* NoPadding.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52621EE8B6CA0048EB3B /* NoPadding.swift */; };\n\t\t75EC52A41EE8B8290048EB3B /* Operators.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52631EE8B6CA0048EB3B /* Operators.swift */; };\n\t\t75EC52A51EE8B8290048EB3B /* Padding.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52641EE8B6CA0048EB3B /* Padding.swift */; };\n\t\t75EC52A61EE8B8390048EB3B /* PBKDF1.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52661EE8B6CA0048EB3B /* PBKDF1.swift */; };\n\t\t75EC52A71EE8B8390048EB3B /* PBKDF2.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52671EE8B6CA0048EB3B /* PBKDF2.swift */; };\n\t\t75EC52A81EE8B8390048EB3B /* PKCS5.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52681EE8B6CA0048EB3B /* PKCS5.swift */; };\n\t\t75EC52A91EE8B83D0048EB3B /* PKCS7Padding.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52691EE8B6CA0048EB3B /* PKCS7Padding.swift */; };\n\t\t75EC52AA1EE8B83D0048EB3B /* Poly1305.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC526A1EE8B6CA0048EB3B /* Poly1305.swift */; };\n\t\t75EC52AB1EE8B83D0048EB3B /* Rabbit.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC526B1EE8B6CA0048EB3B /* Rabbit.swift */; };\n\t\t75EC52AC1EE8B83D0048EB3B /* Cryptor.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC526C1EE8B6CA0048EB3B /* Cryptor.swift */; };\n\t\t75EC52AE1EE8B83D0048EB3B /* SecureBytes.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC526E1EE8B6CA0048EB3B /* SecureBytes.swift */; };\n\t\t75EC52AF1EE8B83D0048EB3B /* SHA1.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC526F1EE8B6CA0048EB3B /* SHA1.swift */; };\n\t\t75EC52B01EE8B83D0048EB3B /* SHA2.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52701EE8B6CA0048EB3B /* SHA2.swift */; };\n\t\t75EC52B11EE8B83D0048EB3B /* SHA3.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52711EE8B6CA0048EB3B /* SHA3.swift */; };\n\t\t75EC52B21EE8B83D0048EB3B /* String+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52721EE8B6CA0048EB3B /* String+Extension.swift */; };\n\t\t75EC52B31EE8B83D0048EB3B /* UInt16+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52731EE8B6CA0048EB3B /* UInt16+Extension.swift */; };\n\t\t75EC52B41EE8B83D0048EB3B /* UInt32+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52741EE8B6CA0048EB3B /* UInt32+Extension.swift */; };\n\t\t75EC52B51EE8B83D0048EB3B /* UInt64+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52751EE8B6CA0048EB3B /* UInt64+Extension.swift */; };\n\t\t75EC52B61EE8B83D0048EB3B /* UInt8+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52761EE8B6CA0048EB3B /* UInt8+Extension.swift */; };\n\t\t75EC52B71EE8B83D0048EB3B /* Updatable.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52771EE8B6CA0048EB3B /* Updatable.swift */; };\n\t\t75EC52B81EE8B83D0048EB3B /* Utils.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52781EE8B6CA0048EB3B /* Utils.swift */; };\n\t\t75EC52B91EE8B83D0048EB3B /* ZeroPadding.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75EC52791EE8B6CA0048EB3B /* ZeroPadding.swift */; };\n\t\t75F4E434216C93EF00F09710 /* CCM.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75F4E433216C93EF00F09710 /* CCM.swift */; };\n\t\t75F4E436216C98DE00F09710 /* CBCMAC.swift in Sources */ = {isa = PBXBuildFile; fileRef = 75F4E435216C98DE00F09710 /* CBCMAC.swift */; };\n\t\t81F279DD2181F58300449EDA /* Scrypt.swift in Sources */ = {isa = PBXBuildFile; fileRef = 81F279DC2181F58300449EDA /* Scrypt.swift */; };\n\t\t81F279DF2181F5A000449EDA /* ScryptTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = 81F279DE2181F5A000449EDA /* ScryptTests.swift */; };\n\t\t81F279E12181F5C500449EDA /* ScryptTestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 81F279E02181F5C500449EDA /* ScryptTestsPerf.swift */; platformFilters = (macos, ); };\n\t\t81F279E22181F5C500449EDA /* ScryptTestsPerf.swift in Sources */ = {isa = PBXBuildFile; fileRef = 81F279E02181F5C500449EDA /* ScryptTestsPerf.swift */; platformFilter = ios; };\n\t\tAA54CF312B860926006BF411 /* PrivacyInfo.xcprivacy in CopyFiles */ = {isa = PBXBuildFile; fileRef = 75C454012B4B6EBC00FC5020 /* PrivacyInfo.xcprivacy */; };\n\t\tE3FD2D531D6B81CE00A9F35F /* Error+Extension.swift in Sources */ = {isa = PBXBuildFile; fileRef = E3FD2D511D6B813C00A9F35F /* Error+Extension.swift */; };\n\t\tE6200E141FB9A7AE00258382 /* HKDF.swift in Sources */ = {isa = PBXBuildFile; fileRef = E6200E131FB9A7AE00258382 /* HKDF.swift */; };\n\t\tE6200E171FB9B68C00258382 /* HKDFTests.swift in Sources */ = {isa = PBXBuildFile; fileRef = E6200E151FB9B67C00258382 /* HKDFTests.swift */; };\n\t\tEC353DB42BECCEFD0026B46B /* BitwiseOps.swift in Sources */ = {isa = PBXBuildFile; fileRef = EC353DB32BECCEFD0026B46B /* BitwiseOps.swift */; };\n\t\tEC353DB62BECCF3A0026B46B /* DataConversion.swift in Sources */ = {isa = PBXBuildFile; fileRef = EC353DB52BECCF3A0026B46B /* DataConversion.swift */; };\n\t\tEC353DB82BECCF4B0026B46B /* FloatingPointConversion.swift in Sources */ = {isa = PBXBuildFile; fileRef = EC353DB72BECCF4B0026B46B /* FloatingPointConversion.swift */; };\n\t\tEC353DBA2BECCF5A0026B46B /* IntegerConversion.swift in Sources */ = {isa = PBXBuildFile; fileRef = EC353DB92BECCF5A0026B46B /* IntegerConversion.swift */; };\n\t\tEC353DBC2BECCF6A0026B46B /* PrimeTest.swift in Sources */ = {isa = PBXBuildFile; fileRef = EC353DBB2BECCF6A0026B46B /* PrimeTest.swift */; };\n\t\tEC353DBE2BECCF770026B46B /* SquareRoot.swift in Sources */ = {isa = PBXBuildFile; fileRef = EC353DBD2BECCF770026B46B /* SquareRoot.swift */; };\n\t\tEC353DC02BECCF860026B46B /* StringConversion.swift in Sources */ = {isa = PBXBuildFile; fileRef = EC353DBF2BECCF860026B46B /* StringConversion.swift */; };\n\t\tEC353DC22BECCF8F0026B46B /* WordsAndBits.swift in Sources */ = {isa = PBXBuildFile; fileRef = EC353DC12BECCF8F0026B46B /* WordsAndBits.swift */; };\n/* End PBXBuildFile section */\n\n/* Begin PBXContainerItemProxy section */\n\t\t7564F0502072EAEB00CA5A96 /* PBXContainerItemProxy */ = {\n\t\t\tisa = PBXContainerItemProxy;\n\t\t\tcontainerPortal = 754BE44C19693E190098E6F3 /* Project object */;\n\t\t\tproxyType = 1;\n\t\t\tremoteGlobalIDString = 754BE45419693E190098E6F3;\n\t\t\tremoteInfo = CryptoSwift;\n\t\t};\n\t\t7564F0612072EB5D00CA5A96 /* PBXContainerItemProxy */ = {\n\t\t\tisa = PBXContainerItemProxy;\n\t\t\tcontainerPortal = 754BE44C19693E190098E6F3 /* Project object */;\n\t\t\tproxyType = 1;\n\t\t\tremoteGlobalIDString = 75211F91207249D8004E41F8;\n\t\t\tremoteInfo = \"CryptoSwift-TestHostApp\";\n\t\t};\n\t\t7564F0662072ED7000CA5A96 /* PBXContainerItemProxy */ = {\n\t\t\tisa = PBXContainerItemProxy;\n\t\t\tcontainerPortal = 754BE44C19693E190098E6F3 /* Project object */;\n\t\t\tproxyType = 1;\n\t\t\tremoteGlobalIDString = 754BE45419693E190098E6F3;\n\t\t\tremoteInfo = CryptoSwift;\n\t\t};\n\t\t7595C15E2072E64000EA1A5F /* PBXContainerItemProxy */ = {\n\t\t\tisa = PBXContainerItemProxy;\n\t\t\tcontainerPortal = 754BE44C19693E190098E6F3 /* Project object */;\n\t\t\tproxyType = 1;\n\t\t\tremoteGlobalIDString = 754BE45419693E190098E6F3;\n\t\t\tremoteInfo = CryptoSwift;\n\t\t};\n\t\t75B601E3197D69EB0009B53D /* PBXContainerItemProxy */ = {\n\t\t\tisa = PBXContainerItemProxy;\n\t\t\tcontainerPortal = 754BE44C19693E190098E6F3 /* Project object */;\n\t\t\tproxyType = 1;\n\t\t\tremoteGlobalIDString = 754BE45419693E190098E6F3;\n\t\t\tremoteInfo = CryptoSwift;\n\t\t};\n\t\t75F9482120BDDF9900956311 /* PBXContainerItemProxy */ = {\n\t\t\tisa = PBXContainerItemProxy;\n\t\t\tcontainerPortal = 754BE44C19693E190098E6F3 /* Project object */;\n\t\t\tproxyType = 1;\n\t\t\tremoteGlobalIDString = 75211F91207249D8004E41F8;\n\t\t\tremoteInfo = \"CryptoSwift-TestHostApp\";\n\t\t};\n/* End PBXContainerItemProxy section */\n\n/* Begin PBXCopyFilesBuildPhase section */\n\t\t7564F0682072ED7000CA5A96 /* Embed Frameworks */ = {\n\t\t\tisa = PBXCopyFilesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tdstPath = \"\";\n\t\t\tdstSubfolderSpec = 10;\n\t\t\tfiles = (\n\t\t\t\t7564F0652072ED7000CA5A96 /* CryptoSwift.framework in Embed Frameworks */,\n\t\t\t);\n\t\t\tname = \"Embed Frameworks\";\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t75B601E0197D69770009B53D /* CopyFiles */ = {\n\t\t\tisa = PBXCopyFilesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tdstPath = \"\";\n\t\t\tdstSubfolderSpec = 7;\n\t\t\tfiles = (\n\t\t\t\tAA54CF312B860926006BF411 /* PrivacyInfo.xcprivacy in CopyFiles */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n/* End PBXCopyFilesBuildPhase section */\n\n/* Begin PBXFileReference section */\n\t\t0AF023D4230F2B0F008E4E68 /* ISO78164Padding.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ISO78164Padding.swift; sourceTree = \"<group>\"; };\n\t\t0EE73E70204D598100110E11 /* CMAC.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = CMAC.swift; sourceTree = \"<group>\"; };\n\t\t0EE73E72204D599C00110E11 /* CMACTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = CMACTests.swift; sourceTree = \"<group>\"; };\n\t\t14156CE42011422400DDCFBC /* ChaCha20Poly1305Tests.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ChaCha20Poly1305Tests.swift; sourceTree = \"<group>\"; };\n\t\t1467460E2017BB3600DF04ED /* AEAD.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = AEAD.swift; sourceTree = \"<group>\"; };\n\t\t35F3E51B23BF9A6700A024A1 /* OCB.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = OCB.swift; sourceTree = \"<group>\"; };\n\t\t35F3E51D23BF9AD300A024A1 /* AESOCBTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = AESOCBTests.swift; sourceTree = \"<group>\"; };\n\t\t42012782267A6F1C00F82506 /* ISO10126Padding.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ISO10126Padding.swift; sourceTree = \"<group>\"; };\n\t\t5431FD592B021470001DEE77 /* SignatureVerificationTests.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = SignatureVerificationTests.swift; sourceTree = \"<group>\"; };\n\t\t674A736E1BF5D85B00866C5B /* RabbitTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = RabbitTests.swift; sourceTree = \"<group>\"; };\n\t\t6A7CDEEC26CD1E4C00FFB1AF /* RSATests.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = RSATests.swift; sourceTree = \"<group>\"; };\n\t\t6AC893E026DB950C00F7E787 /* Addition.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Addition.swift; sourceTree = \"<group>\"; };\n\t\t6AC893E226DB950D00F7E787 /* GCD.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = GCD.swift; sourceTree = \"<group>\"; };\n\t\t6AC893E326DB950D00F7E787 /* Comparable.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Comparable.swift; sourceTree = \"<group>\"; };\n\t\t6AC893E426DB950D00F7E787 /* Hashable.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Hashable.swift; sourceTree = \"<group>\"; };\n\t\t6AC893E626DB950D00F7E787 /* Codable.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Codable.swift; sourceTree = \"<group>\"; };\n\t\t6AC893E726DB950D00F7E787 /* Shifts.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Shifts.swift; sourceTree = \"<group>\"; };\n\t\t6AC893EA26DB950D00F7E787 /* Subtraction.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Subtraction.swift; sourceTree = \"<group>\"; };\n\t\t6AC893EC26DB950D00F7E787 /* Multiplication.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Multiplication.swift; sourceTree = \"<group>\"; };\n\t\t6AC893EF26DB950E00F7E787 /* Strideable.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Strideable.swift; sourceTree = \"<group>\"; };\n\t\t6AC893F026DB950E00F7E787 /* BigInt.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = BigInt.swift; sourceTree = \"<group>\"; };\n\t\t6AC893F126DB950E00F7E787 /* Exponentiation.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Exponentiation.swift; sourceTree = \"<group>\"; };\n\t\t6AC893F226DB950E00F7E787 /* Random.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Random.swift; sourceTree = \"<group>\"; };\n\t\t6AC893F426DB950E00F7E787 /* BigUInt.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = BigUInt.swift; sourceTree = \"<group>\"; };\n\t\t6AC893F526DB950E00F7E787 /* Division.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Division.swift; sourceTree = \"<group>\"; };\n\t\t750509981F6BEF2A00394A1B /* PKCS7.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = PKCS7.swift; sourceTree = \"<group>\"; };\n\t\t7507705C28D61E78004A44DC /* RSA.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = RSA.swift; sourceTree = \"<group>\"; };\n\t\t7507705D28D61E78004A44DC /* RSA+Signature.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = \"RSA+Signature.swift\"; sourceTree = \"<group>\"; };\n\t\t7507705E28D61E78004A44DC /* RSA+Cipher.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = \"RSA+Cipher.swift\"; sourceTree = \"<group>\"; };\n\t\t7507706328D61E8B004A44DC /* DER.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = DER.swift; sourceTree = \"<group>\"; };\n\t\t7507706628D61E97004A44DC /* ASN1Scanner.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ASN1Scanner.swift; sourceTree = \"<group>\"; };\n\t\t7507706728D61E97004A44DC /* ASN1Encoder.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ASN1Encoder.swift; sourceTree = \"<group>\"; };\n\t\t7507706828D61E97004A44DC /* ASN1Decoder.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ASN1Decoder.swift; sourceTree = \"<group>\"; };\n\t\t7507706928D61E97004A44DC /* ASN1.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ASN1.swift; sourceTree = \"<group>\"; };\n\t\t7507706E28D61EBA004A44DC /* PKCS1v15.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = PKCS1v15.swift; sourceTree = \"<group>\"; };\n\t\t7507707028D61ED5004A44DC /* Signature.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Signature.swift; sourceTree = \"<group>\"; };\n\t\t750CC3EA1DC0CACE0096BE6E /* BlowfishTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = BlowfishTests.swift; sourceTree = \"<group>\"; };\n\t\t75100F8E19B0BC890005C5F5 /* Poly1305Tests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Poly1305Tests.swift; sourceTree = \"<group>\"; };\n\t\t751EE9771F93996100161FFC /* AES.Cryptors.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = AES.Cryptors.swift; sourceTree = \"<group>\"; };\n\t\t75211F92207249D8004E41F8 /* CryptoSwift-TestHostApp.app */ = {isa = PBXFileReference; explicitFileType = wrapper.application; includeInIndex = 0; path = \"CryptoSwift-TestHostApp.app\"; sourceTree = BUILT_PRODUCTS_DIR; };\n\t\t75211F94207249D8004E41F8 /* AppDelegate.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = AppDelegate.swift; sourceTree = \"<group>\"; };\n\t\t75211FA0207249D8004E41F8 /* Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = Info.plist; sourceTree = \"<group>\"; };\n\t\t75211FA520724A0F004E41F8 /* CryptoSwift-TestHostApp-Test.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"CryptoSwift-TestHostApp-Test.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FA820724A0F004E41F8 /* CryptoSwift-Shared.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"CryptoSwift-Shared.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FA920724A0F004E41F8 /* CryptoSwift-TestHostApp-Shared.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"CryptoSwift-TestHostApp-Shared.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FAA20724A0F004E41F8 /* Project-Release.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"Project-Release.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FAC20724A0F004E41F8 /* CryptoSwift-Release.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"CryptoSwift-Release.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FAE20724A10004E41F8 /* Tests-Shared.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"Tests-Shared.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FAF20724A10004E41F8 /* CryptoSwift-Debug.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"CryptoSwift-Debug.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FB020724A10004E41F8 /* Project-Debug.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"Project-Debug.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FB120724A10004E41F8 /* Tests-Test.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"Tests-Test.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FB220724A10004E41F8 /* Project-Shared.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"Project-Shared.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t75211FB420724A10004E41F8 /* CryptoSwift-Test.xcconfig */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = text.xcconfig; path = \"CryptoSwift-Test.xcconfig\"; sourceTree = \"<group>\"; };\n\t\t7523742C2083C61C0016D662 /* GCM.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = GCM.swift; sourceTree = \"<group>\"; };\n\t\t7529366920683DFC00195874 /* AEADChaCha20Poly1305.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = AEADChaCha20Poly1305.swift; sourceTree = \"<group>\"; };\n\t\t753674062175D012003E32A6 /* StreamDecryptor.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = StreamDecryptor.swift; sourceTree = \"<group>\"; };\n\t\t7536A93E207254A000F39140 /* UIKit.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = UIKit.framework; path = Platforms/iPhoneOS.platform/Developer/SDKs/iPhoneOS11.3.sdk/System/Library/Frameworks/UIKit.framework; sourceTree = DEVELOPER_DIR; };\n\t\t754310432050111A003FB1DF /* CompactMap.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CompactMap.swift; sourceTree = \"<group>\"; };\n\t\t75482EA31CB310B7001F66A5 /* PBKDF.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = PBKDF.swift; sourceTree = \"<group>\"; };\n\t\t754BE45519693E190098E6F3 /* CryptoSwift.framework */ = {isa = PBXFileReference; explicitFileType = wrapper.framework; includeInIndex = 0; path = CryptoSwift.framework; sourceTree = BUILT_PRODUCTS_DIR; };\n\t\t754BE46019693E190098E6F3 /* CryptoSwiftTests.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = CryptoSwiftTests.xctest; sourceTree = BUILT_PRODUCTS_DIR; };\n\t\t754BE46719693E190098E6F3 /* DigestTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = DigestTests.swift; sourceTree = \"<group>\"; };\n\t\t755E0303217A756F00065FC6 /* AESCCMTests.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = AESCCMTests.swift; sourceTree = \"<group>\"; };\n\t\t755FB1D9199E347D00475437 /* ExtensionsTest.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ExtensionsTest.swift; sourceTree = \"<group>\"; };\n\t\t7564F0602072EAEB00CA5A96 /* TestsPerformance-iOS.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = \"TestsPerformance-iOS.xctest\"; sourceTree = BUILT_PRODUCTS_DIR; };\n\t\t756A64C52111083B00BE8805 /* StreamEncryptor.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = StreamEncryptor.swift; sourceTree = \"<group>\"; };\n\t\t756BFDCA1A82B87300B9D9A4 /* Bridging.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = Bridging.h; sourceTree = \"<group>\"; };\n\t\t7571938D2816BFE3001C3AC0 /* CS.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CS.swift; sourceTree = \"<group>\"; };\n\t\t7576F64C20725BD5006688F8 /* Default-568h@2x.png */ = {isa = PBXFileReference; lastKnownFileType = image.png; path = \"Default-568h@2x.png\"; sourceTree = \"<group>\"; };\n\t\t7576F6EB20726319006688F8 /* DigestTestsPerf.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = DigestTestsPerf.swift; sourceTree = \"<group>\"; };\n\t\t7576F6EE20726422006688F8 /* AESTestsPerf.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = AESTestsPerf.swift; sourceTree = \"<group>\"; };\n\t\t7576F6F020728EAB006688F8 /* ChaCha20TestsPerf.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ChaCha20TestsPerf.swift; sourceTree = \"<group>\"; };\n\t\t7576F6F220728F00006688F8 /* RabbitTestsPerf.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = RabbitTestsPerf.swift; sourceTree = \"<group>\"; };\n\t\t7576F6F420729069006688F8 /* ExtensionsTestPerf.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ExtensionsTestPerf.swift; sourceTree = \"<group>\"; };\n\t\t7576F6F6207290F8006688F8 /* PBKDFPerf.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = PBKDFPerf.swift; sourceTree = \"<group>\"; };\n\t\t757DA2521A4ED0A4002BA3EF /* PaddingTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = PaddingTests.swift; sourceTree = \"<group>\"; };\n\t\t757DA2541A4ED408002BA3EF /* AESTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = AESTests.swift; sourceTree = \"<group>\"; };\n\t\t757DA2581A4ED4D7002BA3EF /* ChaCha20Tests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = ChaCha20Tests.swift; sourceTree = \"<group>\"; };\n\t\t758A94271A65C59200E46135 /* HMACTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = HMACTests.swift; sourceTree = \"<group>\"; };\n\t\t7595C14A2072E48C00EA1A5F /* TestsPerformance-Mac.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = \"TestsPerformance-Mac.xctest\"; sourceTree = BUILT_PRODUCTS_DIR; };\n\t\t75B3ED76210F9DF7005D4ADA /* BlockDecryptor.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = BlockDecryptor.swift; sourceTree = \"<group>\"; };\n\t\t75B3ED78210FA016005D4ADA /* BlockEncryptor.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = BlockEncryptor.swift; sourceTree = \"<group>\"; };\n\t\t75C2E76C1D55F097003D2BCA /* Access.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Access.swift; sourceTree = \"<group>\"; };\n\t\t75C454012B4B6EBC00FC5020 /* PrivacyInfo.xcprivacy */ = {isa = PBXFileReference; lastKnownFileType = text.xml; name = PrivacyInfo.xcprivacy; path = Sources/CryptoSwift/PrivacyInfo.xcprivacy; sourceTree = \"<group>\"; };\n\t\t75D7AF37208BFB1600D22BEB /* UInt128.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = UInt128.swift; sourceTree = \"<group>\"; };\n\t\t75EC52381EE8B6CA0048EB3B /* AES.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = AES.swift; sourceTree = \"<group>\"; };\n\t\t75EC52391EE8B6CA0048EB3B /* Array+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"Array+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC523A1EE8B6CA0048EB3B /* Authenticator.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Authenticator.swift; sourceTree = \"<group>\"; };\n\t\t75EC523B1EE8B6CA0048EB3B /* BatchedCollection.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = BatchedCollection.swift; sourceTree = \"<group>\"; };\n\t\t75EC523C1EE8B6CA0048EB3B /* Bit.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Bit.swift; sourceTree = \"<group>\"; };\n\t\t75EC523D1EE8B6CA0048EB3B /* BlockCipher.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = BlockCipher.swift; sourceTree = \"<group>\"; };\n\t\t75EC523F1EE8B6CA0048EB3B /* BlockMode.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = BlockMode.swift; sourceTree = \"<group>\"; };\n\t\t75EC52401EE8B6CA0048EB3B /* BlockModeOptions.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = BlockModeOptions.swift; sourceTree = \"<group>\"; };\n\t\t75EC52411EE8B6CA0048EB3B /* CipherModeWorker.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CipherModeWorker.swift; sourceTree = \"<group>\"; };\n\t\t75EC52421EE8B6CA0048EB3B /* CBC.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CBC.swift; sourceTree = \"<group>\"; };\n\t\t75EC52431EE8B6CA0048EB3B /* CFB.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CFB.swift; sourceTree = \"<group>\"; };\n\t\t75EC52441EE8B6CA0048EB3B /* CTR.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CTR.swift; sourceTree = \"<group>\"; };\n\t\t75EC52451EE8B6CA0048EB3B /* ECB.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ECB.swift; sourceTree = \"<group>\"; };\n\t\t75EC52461EE8B6CA0048EB3B /* OFB.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = OFB.swift; sourceTree = \"<group>\"; };\n\t\t75EC52471EE8B6CA0048EB3B /* PCBC.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = PCBC.swift; sourceTree = \"<group>\"; };\n\t\t75EC52491EE8B6CA0048EB3B /* Blowfish.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Blowfish.swift; sourceTree = \"<group>\"; };\n\t\t75EC524A1EE8B6CA0048EB3B /* ChaCha20.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ChaCha20.swift; sourceTree = \"<group>\"; };\n\t\t75EC524B1EE8B6CA0048EB3B /* Checksum.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Checksum.swift; sourceTree = \"<group>\"; };\n\t\t75EC524C1EE8B6CA0048EB3B /* Cipher.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Cipher.swift; sourceTree = \"<group>\"; };\n\t\t75EC524D1EE8B6CA0048EB3B /* Collection+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"Collection+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC524E1EE8B6CA0048EB3B /* Cryptors.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Cryptors.swift; sourceTree = \"<group>\"; };\n\t\t75EC52501EE8B6CA0048EB3B /* Digest.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Digest.swift; sourceTree = \"<group>\"; };\n\t\t75EC52511EE8B6CA0048EB3B /* DigestType.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = DigestType.swift; sourceTree = \"<group>\"; };\n\t\t75EC52531EE8B6CA0048EB3B /* AES+Foundation.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"AES+Foundation.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52541EE8B6CA0048EB3B /* Blowfish+Foundation.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"Blowfish+Foundation.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52551EE8B6CA0048EB3B /* ChaCha20+Foundation.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"ChaCha20+Foundation.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52561EE8B6CA0048EB3B /* Array+Foundation.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"Array+Foundation.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52571EE8B6CA0048EB3B /* Data+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"Data+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52581EE8B6CA0048EB3B /* HMAC+Foundation.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"HMAC+Foundation.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52591EE8B6CA0048EB3B /* Rabbit+Foundation.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"Rabbit+Foundation.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC525A1EE8B6CA0048EB3B /* String+FoundationExtension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"String+FoundationExtension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC525B1EE8B6CA0048EB3B /* Utils+Foundation.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"Utils+Foundation.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC525C1EE8B6CA0048EB3B /* Generics.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Generics.swift; sourceTree = \"<group>\"; };\n\t\t75EC525D1EE8B6CA0048EB3B /* HMAC.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = HMAC.swift; sourceTree = \"<group>\"; };\n\t\t75EC525F1EE8B6CA0048EB3B /* Int+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"Int+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52611EE8B6CA0048EB3B /* MD5.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = MD5.swift; sourceTree = \"<group>\"; };\n\t\t75EC52621EE8B6CA0048EB3B /* NoPadding.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = NoPadding.swift; sourceTree = \"<group>\"; };\n\t\t75EC52631EE8B6CA0048EB3B /* Operators.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Operators.swift; sourceTree = \"<group>\"; };\n\t\t75EC52641EE8B6CA0048EB3B /* Padding.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Padding.swift; sourceTree = \"<group>\"; };\n\t\t75EC52661EE8B6CA0048EB3B /* PBKDF1.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = PBKDF1.swift; sourceTree = \"<group>\"; };\n\t\t75EC52671EE8B6CA0048EB3B /* PBKDF2.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = PBKDF2.swift; sourceTree = \"<group>\"; };\n\t\t75EC52681EE8B6CA0048EB3B /* PKCS5.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = PKCS5.swift; sourceTree = \"<group>\"; };\n\t\t75EC52691EE8B6CA0048EB3B /* PKCS7Padding.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = PKCS7Padding.swift; sourceTree = \"<group>\"; };\n\t\t75EC526A1EE8B6CA0048EB3B /* Poly1305.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Poly1305.swift; sourceTree = \"<group>\"; };\n\t\t75EC526B1EE8B6CA0048EB3B /* Rabbit.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Rabbit.swift; sourceTree = \"<group>\"; };\n\t\t75EC526C1EE8B6CA0048EB3B /* Cryptor.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Cryptor.swift; sourceTree = \"<group>\"; };\n\t\t75EC526E1EE8B6CA0048EB3B /* SecureBytes.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = SecureBytes.swift; sourceTree = \"<group>\"; };\n\t\t75EC526F1EE8B6CA0048EB3B /* SHA1.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = SHA1.swift; sourceTree = \"<group>\"; };\n\t\t75EC52701EE8B6CA0048EB3B /* SHA2.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = SHA2.swift; sourceTree = \"<group>\"; };\n\t\t75EC52711EE8B6CA0048EB3B /* SHA3.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = SHA3.swift; sourceTree = \"<group>\"; };\n\t\t75EC52721EE8B6CA0048EB3B /* String+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"String+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52731EE8B6CA0048EB3B /* UInt16+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"UInt16+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52741EE8B6CA0048EB3B /* UInt32+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"UInt32+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52751EE8B6CA0048EB3B /* UInt64+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"UInt64+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52761EE8B6CA0048EB3B /* UInt8+Extension.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = \"UInt8+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\t75EC52771EE8B6CA0048EB3B /* Updatable.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Updatable.swift; sourceTree = \"<group>\"; };\n\t\t75EC52781EE8B6CA0048EB3B /* Utils.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = Utils.swift; sourceTree = \"<group>\"; };\n\t\t75EC52791EE8B6CA0048EB3B /* ZeroPadding.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ZeroPadding.swift; sourceTree = \"<group>\"; };\n\t\t75EC527A1EE8B6CA0048EB3B /* CryptoSwift.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = CryptoSwift.h; sourceTree = \"<group>\"; };\n\t\t75F4E433216C93EF00F09710 /* CCM.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CCM.swift; sourceTree = \"<group>\"; };\n\t\t75F4E435216C98DE00F09710 /* CBCMAC.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = CBCMAC.swift; sourceTree = \"<group>\"; };\n\t\t75F4E437216C9B5D00F09710 /* CHANGELOG */ = {isa = PBXFileReference; lastKnownFileType = text; path = CHANGELOG; sourceTree = SOURCE_ROOT; };\n\t\t75F4E438216C9B6900F09710 /* README.md */ = {isa = PBXFileReference; lastKnownFileType = net.daringfireball.markdown; path = README.md; sourceTree = SOURCE_ROOT; };\n\t\t81F279DC2181F58300449EDA /* Scrypt.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = Scrypt.swift; sourceTree = \"<group>\"; };\n\t\t81F279DE2181F5A000449EDA /* ScryptTests.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ScryptTests.swift; sourceTree = \"<group>\"; };\n\t\t81F279E02181F5C500449EDA /* ScryptTestsPerf.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = ScryptTestsPerf.swift; sourceTree = \"<group>\"; };\n\t\tE3FD2D511D6B813C00A9F35F /* Error+Extension.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = \"Error+Extension.swift\"; sourceTree = \"<group>\"; };\n\t\tE6200E131FB9A7AE00258382 /* HKDF.swift */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.swift; path = HKDF.swift; sourceTree = \"<group>\"; };\n\t\tE6200E151FB9B67C00258382 /* HKDFTests.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = HKDFTests.swift; sourceTree = \"<group>\"; };\n\t\tEC353DB32BECCEFD0026B46B /* BitwiseOps.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = BitwiseOps.swift; sourceTree = \"<group>\"; };\n\t\tEC353DB52BECCF3A0026B46B /* DataConversion.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = DataConversion.swift; sourceTree = \"<group>\"; };\n\t\tEC353DB72BECCF4B0026B46B /* FloatingPointConversion.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = FloatingPointConversion.swift; sourceTree = \"<group>\"; };\n\t\tEC353DB92BECCF5A0026B46B /* IntegerConversion.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = IntegerConversion.swift; sourceTree = \"<group>\"; };\n\t\tEC353DBB2BECCF6A0026B46B /* PrimeTest.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = PrimeTest.swift; sourceTree = \"<group>\"; };\n\t\tEC353DBD2BECCF770026B46B /* SquareRoot.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = SquareRoot.swift; sourceTree = \"<group>\"; };\n\t\tEC353DBF2BECCF860026B46B /* StringConversion.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = StringConversion.swift; sourceTree = \"<group>\"; };\n\t\tEC353DC12BECCF8F0026B46B /* WordsAndBits.swift */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.swift; path = WordsAndBits.swift; sourceTree = \"<group>\"; };\n/* End PBXFileReference section */\n\n/* Begin PBXFrameworksBuildPhase section */\n\t\t75211F8F207249D8004E41F8 /* Frameworks */ = {\n\t\t\tisa = PBXFrameworksBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t7564F0642072ED7000CA5A96 /* CryptoSwift.framework in Frameworks */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t754BE45119693E190098E6F3 /* Frameworks */ = {\n\t\t\tisa = PBXFrameworksBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t754BE45D19693E190098E6F3 /* Frameworks */ = {\n\t\t\tisa = PBXFrameworksBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t75B601EB197D6A6C0009B53D /* CryptoSwift.framework in Frameworks */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t7564F0592072EAEB00CA5A96 /* Frameworks */ = {\n\t\t\tisa = PBXFrameworksBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t7564F05A2072EAEB00CA5A96 /* CryptoSwift.framework in Frameworks */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t7595C1472072E48C00EA1A5F /* Frameworks */ = {\n\t\t\tisa = PBXFrameworksBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t7595C1602072E64900EA1A5F /* CryptoSwift.framework in Frameworks */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n/* End PBXFrameworksBuildPhase section */\n\n/* Begin PBXGroup section */\n\t\t24B0BBA29D734E62809E53BC /* Frameworks */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t7536A93E207254A000F39140 /* UIKit.framework */,\n\t\t\t);\n\t\t\tname = Frameworks;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t6AC893DF26DB94F700F7E787 /* CS_BigInt */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t6AC893E026DB950C00F7E787 /* Addition.swift */,\n\t\t\t\t6AC893F026DB950E00F7E787 /* BigInt.swift */,\n\t\t\t\t6AC893F426DB950E00F7E787 /* BigUInt.swift */,\n\t\t\t\tEC353DB32BECCEFD0026B46B /* BitwiseOps.swift */,\n\t\t\t\t6AC893E626DB950D00F7E787 /* Codable.swift */,\n\t\t\t\t6AC893E326DB950D00F7E787 /* Comparable.swift */,\n\t\t\t\tEC353DB52BECCF3A0026B46B /* DataConversion.swift */,\n\t\t\t\t6AC893F526DB950E00F7E787 /* Division.swift */,\n\t\t\t\t6AC893F126DB950E00F7E787 /* Exponentiation.swift */,\n\t\t\t\tEC353DB72BECCF4B0026B46B /* FloatingPointConversion.swift */,\n\t\t\t\t6AC893E226DB950D00F7E787 /* GCD.swift */,\n\t\t\t\t6AC893E426DB950D00F7E787 /* Hashable.swift */,\n\t\t\t\tEC353DB92BECCF5A0026B46B /* IntegerConversion.swift */,\n\t\t\t\t6AC893EC26DB950D00F7E787 /* Multiplication.swift */,\n\t\t\t\tEC353DBB2BECCF6A0026B46B /* PrimeTest.swift */,\n\t\t\t\t6AC893F226DB950E00F7E787 /* Random.swift */,\n\t\t\t\t6AC893E726DB950D00F7E787 /* Shifts.swift */,\n\t\t\t\tEC353DBD2BECCF770026B46B /* SquareRoot.swift */,\n\t\t\t\t6AC893EF26DB950E00F7E787 /* Strideable.swift */,\n\t\t\t\tEC353DBF2BECCF860026B46B /* StringConversion.swift */,\n\t\t\t\t6AC893EA26DB950D00F7E787 /* Subtraction.swift */,\n\t\t\t\tEC353DC12BECCF8F0026B46B /* WordsAndBits.swift */,\n\t\t\t\t7571938D2816BFE3001C3AC0 /* CS.swift */,\n\t\t\t);\n\t\t\tpath = CS_BigInt;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t7507705B28D61E78004A44DC /* RSA */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t7507705C28D61E78004A44DC /* RSA.swift */,\n\t\t\t\t7507705D28D61E78004A44DC /* RSA+Signature.swift */,\n\t\t\t\t7507705E28D61E78004A44DC /* RSA+Cipher.swift */,\n\t\t\t);\n\t\t\tpath = RSA;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t7507706228D61E8B004A44DC /* PEM */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t7507706328D61E8B004A44DC /* DER.swift */,\n\t\t\t);\n\t\t\tpath = PEM;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t7507706528D61E97004A44DC /* ASN1 */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t7507706628D61E97004A44DC /* ASN1Scanner.swift */,\n\t\t\t\t7507706728D61E97004A44DC /* ASN1Encoder.swift */,\n\t\t\t\t7507706828D61E97004A44DC /* ASN1Decoder.swift */,\n\t\t\t\t7507706928D61E97004A44DC /* ASN1.swift */,\n\t\t\t);\n\t\t\tpath = ASN1;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t75211F93207249D8004E41F8 /* CryptoSwift-TestHostApp */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t7576F64C20725BD5006688F8 /* Default-568h@2x.png */,\n\t\t\t\t75211F94207249D8004E41F8 /* AppDelegate.swift */,\n\t\t\t\t75211FA0207249D8004E41F8 /* Info.plist */,\n\t\t\t);\n\t\t\tpath = \"CryptoSwift-TestHostApp\";\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t7529366820683DFC00195874 /* AEAD */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t1467460E2017BB3600DF04ED /* AEAD.swift */,\n\t\t\t\t7529366920683DFC00195874 /* AEADChaCha20Poly1305.swift */,\n\t\t\t);\n\t\t\tpath = AEAD;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t754BE44B19693E190098E6F3 = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t75C454012B4B6EBC00FC5020 /* PrivacyInfo.xcprivacy */,\n\t\t\t\t75843E9A2072457A0050583A /* config */,\n\t\t\t\t75EC52361EE8B6CA0048EB3B /* Sources */,\n\t\t\t\t754BE46419693E190098E6F3 /* Tests */,\n\t\t\t\t75211F93207249D8004E41F8 /* CryptoSwift-TestHostApp */,\n\t\t\t\t754BE46519693E190098E6F3 /* Supporting Files */,\n\t\t\t\t754BE45619693E190098E6F3 /* Products */,\n\t\t\t\t24B0BBA29D734E62809E53BC /* Frameworks */,\n\t\t\t);\n\t\t\tindentWidth = 2;\n\t\t\tsourceTree = \"<group>\";\n\t\t\ttabWidth = 2;\n\t\t};\n\t\t754BE45619693E190098E6F3 /* Products */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t754BE45519693E190098E6F3 /* CryptoSwift.framework */,\n\t\t\t\t754BE46019693E190098E6F3 /* CryptoSwiftTests.xctest */,\n\t\t\t\t75211F92207249D8004E41F8 /* CryptoSwift-TestHostApp.app */,\n\t\t\t\t7595C14A2072E48C00EA1A5F /* TestsPerformance-Mac.xctest */,\n\t\t\t\t7564F0602072EAEB00CA5A96 /* TestsPerformance-iOS.xctest */,\n\t\t\t);\n\t\t\tname = Products;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t754BE46419693E190098E6F3 /* Tests */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t81F279DE2181F5A000449EDA /* ScryptTests.swift */,\n\t\t\t\t81F279E02181F5C500449EDA /* ScryptTestsPerf.swift */,\n\t\t\t\t14156CE42011422400DDCFBC /* ChaCha20Poly1305Tests.swift */,\n\t\t\t\tE3FD2D511D6B813C00A9F35F /* Error+Extension.swift */,\n\t\t\t\t754BE46719693E190098E6F3 /* DigestTests.swift */,\n\t\t\t\t7576F6EB20726319006688F8 /* DigestTestsPerf.swift */,\n\t\t\t\t75100F8E19B0BC890005C5F5 /* Poly1305Tests.swift */,\n\t\t\t\t758A94271A65C59200E46135 /* HMACTests.swift */,\n\t\t\t\t0EE73E72204D599C00110E11 /* CMACTests.swift */,\n\t\t\t\tE6200E151FB9B67C00258382 /* HKDFTests.swift */,\n\t\t\t\t757DA2541A4ED408002BA3EF /* AESTests.swift */,\n\t\t\t\t755E0303217A756F00065FC6 /* AESCCMTests.swift */,\n\t\t\t\t35F3E51D23BF9AD300A024A1 /* AESOCBTests.swift */,\n\t\t\t\t7576F6EE20726422006688F8 /* AESTestsPerf.swift */,\n\t\t\t\t750CC3EA1DC0CACE0096BE6E /* BlowfishTests.swift */,\n\t\t\t\t757DA2581A4ED4D7002BA3EF /* ChaCha20Tests.swift */,\n\t\t\t\t7576F6F020728EAB006688F8 /* ChaCha20TestsPerf.swift */,\n\t\t\t\t674A736E1BF5D85B00866C5B /* RabbitTests.swift */,\n\t\t\t\t7576F6F220728F00006688F8 /* RabbitTestsPerf.swift */,\n\t\t\t\t755FB1D9199E347D00475437 /* ExtensionsTest.swift */,\n\t\t\t\t7576F6F420729069006688F8 /* ExtensionsTestPerf.swift */,\n\t\t\t\t757DA2521A4ED0A4002BA3EF /* PaddingTests.swift */,\n\t\t\t\t75482EA31CB310B7001F66A5 /* PBKDF.swift */,\n\t\t\t\t7576F6F6207290F8006688F8 /* PBKDFPerf.swift */,\n\t\t\t\t6A7CDEEC26CD1E4C00FFB1AF /* RSATests.swift */,\n\t\t\t\t5431FD592B021470001DEE77 /* SignatureVerificationTests.swift */,\n\t\t\t\t75C2E76C1D55F097003D2BCA /* Access.swift */,\n\t\t\t\t756BFDCA1A82B87300B9D9A4 /* Bridging.h */,\n\t\t\t);\n\t\t\tname = Tests;\n\t\t\tpath = Tests/CryptoSwiftTests;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t754BE46519693E190098E6F3 /* Supporting Files */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t75F4E438216C9B6900F09710 /* README.md */,\n\t\t\t\t75F4E437216C9B5D00F09710 /* CHANGELOG */,\n\t\t\t);\n\t\t\tname = \"Supporting Files\";\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t75843E9A2072457A0050583A /* config */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t75211FAF20724A10004E41F8 /* CryptoSwift-Debug.xcconfig */,\n\t\t\t\t75211FAC20724A0F004E41F8 /* CryptoSwift-Release.xcconfig */,\n\t\t\t\t75211FA820724A0F004E41F8 /* CryptoSwift-Shared.xcconfig */,\n\t\t\t\t75211FB420724A10004E41F8 /* CryptoSwift-Test.xcconfig */,\n\t\t\t\t75211FA520724A0F004E41F8 /* CryptoSwift-TestHostApp-Test.xcconfig */,\n\t\t\t\t75211FA920724A0F004E41F8 /* CryptoSwift-TestHostApp-Shared.xcconfig */,\n\t\t\t\t75211FB020724A10004E41F8 /* Project-Debug.xcconfig */,\n\t\t\t\t75211FAA20724A0F004E41F8 /* Project-Release.xcconfig */,\n\t\t\t\t75211FB220724A10004E41F8 /* Project-Shared.xcconfig */,\n\t\t\t\t75211FAE20724A10004E41F8 /* Tests-Shared.xcconfig */,\n\t\t\t\t75211FB120724A10004E41F8 /* Tests-Test.xcconfig */,\n\t\t\t);\n\t\t\tpath = config;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t75EC52361EE8B6CA0048EB3B /* Sources */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t75EC52371EE8B6CA0048EB3B /* CryptoSwift */,\n\t\t\t\t75EC527A1EE8B6CA0048EB3B /* CryptoSwift.h */,\n\t\t\t);\n\t\t\tpath = Sources;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t75EC52371EE8B6CA0048EB3B /* CryptoSwift */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t7507706528D61E97004A44DC /* ASN1 */,\n\t\t\t\t7507706228D61E8B004A44DC /* PEM */,\n\t\t\t\t7507705B28D61E78004A44DC /* RSA */,\n\t\t\t\t0AF023D4230F2B0F008E4E68 /* ISO78164Padding.swift */,\n\t\t\t\t42012782267A6F1C00F82506 /* ISO10126Padding.swift */,\n\t\t\t\t7529366820683DFC00195874 /* AEAD */,\n\t\t\t\t75EC52381EE8B6CA0048EB3B /* AES.swift */,\n\t\t\t\t751EE9771F93996100161FFC /* AES.Cryptors.swift */,\n\t\t\t\t75EC52391EE8B6CA0048EB3B /* Array+Extension.swift */,\n\t\t\t\t75EC523A1EE8B6CA0048EB3B /* Authenticator.swift */,\n\t\t\t\t75EC523B1EE8B6CA0048EB3B /* BatchedCollection.swift */,\n\t\t\t\t6AC893DF26DB94F700F7E787 /* CS_BigInt */,\n\t\t\t\t75EC523C1EE8B6CA0048EB3B /* Bit.swift */,\n\t\t\t\t75EC523D1EE8B6CA0048EB3B /* BlockCipher.swift */,\n\t\t\t\t75EC523E1EE8B6CA0048EB3B /* BlockMode */,\n\t\t\t\t75EC52491EE8B6CA0048EB3B /* Blowfish.swift */,\n\t\t\t\t75EC524A1EE8B6CA0048EB3B /* ChaCha20.swift */,\n\t\t\t\t75EC524B1EE8B6CA0048EB3B /* Checksum.swift */,\n\t\t\t\t75EC524C1EE8B6CA0048EB3B /* Cipher.swift */,\n\t\t\t\t0EE73E70204D598100110E11 /* CMAC.swift */,\n\t\t\t\t75F4E435216C98DE00F09710 /* CBCMAC.swift */,\n\t\t\t\t75EC524D1EE8B6CA0048EB3B /* Collection+Extension.swift */,\n\t\t\t\t75EC524E1EE8B6CA0048EB3B /* Cryptors.swift */,\n\t\t\t\t75EC52501EE8B6CA0048EB3B /* Digest.swift */,\n\t\t\t\t75EC52511EE8B6CA0048EB3B /* DigestType.swift */,\n\t\t\t\t75EC52521EE8B6CA0048EB3B /* Foundation */,\n\t\t\t\t75EC525C1EE8B6CA0048EB3B /* Generics.swift */,\n\t\t\t\tE6200E131FB9A7AE00258382 /* HKDF.swift */,\n\t\t\t\t75EC525D1EE8B6CA0048EB3B /* HMAC.swift */,\n\t\t\t\t75EC52611EE8B6CA0048EB3B /* MD5.swift */,\n\t\t\t\t75EC52621EE8B6CA0048EB3B /* NoPadding.swift */,\n\t\t\t\t75EC52631EE8B6CA0048EB3B /* Operators.swift */,\n\t\t\t\t75EC52641EE8B6CA0048EB3B /* Padding.swift */,\n\t\t\t\t75EC52651EE8B6CA0048EB3B /* PKCS */,\n\t\t\t\t75EC526A1EE8B6CA0048EB3B /* Poly1305.swift */,\n\t\t\t\t75EC526B1EE8B6CA0048EB3B /* Rabbit.swift */,\n\t\t\t\t75EC526C1EE8B6CA0048EB3B /* Cryptor.swift */,\n\t\t\t\t75EC526E1EE8B6CA0048EB3B /* SecureBytes.swift */,\n\t\t\t\t81F279DC2181F58300449EDA /* Scrypt.swift */,\n\t\t\t\t75EC526F1EE8B6CA0048EB3B /* SHA1.swift */,\n\t\t\t\t75EC52701EE8B6CA0048EB3B /* SHA2.swift */,\n\t\t\t\t75EC52711EE8B6CA0048EB3B /* SHA3.swift */,\n\t\t\t\t75EC52721EE8B6CA0048EB3B /* String+Extension.swift */,\n\t\t\t\t75EC525F1EE8B6CA0048EB3B /* Int+Extension.swift */,\n\t\t\t\t75EC52761EE8B6CA0048EB3B /* UInt8+Extension.swift */,\n\t\t\t\t75EC52731EE8B6CA0048EB3B /* UInt16+Extension.swift */,\n\t\t\t\t75EC52741EE8B6CA0048EB3B /* UInt32+Extension.swift */,\n\t\t\t\t75EC52751EE8B6CA0048EB3B /* UInt64+Extension.swift */,\n\t\t\t\t75D7AF37208BFB1600D22BEB /* UInt128.swift */,\n\t\t\t\t75EC52771EE8B6CA0048EB3B /* Updatable.swift */,\n\t\t\t\t75EC52781EE8B6CA0048EB3B /* Utils.swift */,\n\t\t\t\t75EC52791EE8B6CA0048EB3B /* ZeroPadding.swift */,\n\t\t\t\t754310432050111A003FB1DF /* CompactMap.swift */,\n\t\t\t\t75B3ED76210F9DF7005D4ADA /* BlockDecryptor.swift */,\n\t\t\t\t75B3ED78210FA016005D4ADA /* BlockEncryptor.swift */,\n\t\t\t\t753674062175D012003E32A6 /* StreamDecryptor.swift */,\n\t\t\t\t756A64C52111083B00BE8805 /* StreamEncryptor.swift */,\n\t\t\t\t7507707028D61ED5004A44DC /* Signature.swift */,\n\t\t\t);\n\t\t\tpath = CryptoSwift;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t75EC523E1EE8B6CA0048EB3B /* BlockMode */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t75EC523F1EE8B6CA0048EB3B /* BlockMode.swift */,\n\t\t\t\t75EC52401EE8B6CA0048EB3B /* BlockModeOptions.swift */,\n\t\t\t\t75EC52411EE8B6CA0048EB3B /* CipherModeWorker.swift */,\n\t\t\t\t75EC52421EE8B6CA0048EB3B /* CBC.swift */,\n\t\t\t\t75EC52431EE8B6CA0048EB3B /* CFB.swift */,\n\t\t\t\t75EC52441EE8B6CA0048EB3B /* CTR.swift */,\n\t\t\t\t7523742C2083C61C0016D662 /* GCM.swift */,\n\t\t\t\t75F4E433216C93EF00F09710 /* CCM.swift */,\n\t\t\t\t75EC52451EE8B6CA0048EB3B /* ECB.swift */,\n\t\t\t\t75EC52461EE8B6CA0048EB3B /* OFB.swift */,\n\t\t\t\t75EC52471EE8B6CA0048EB3B /* PCBC.swift */,\n\t\t\t\t35F3E51B23BF9A6700A024A1 /* OCB.swift */,\n\t\t\t);\n\t\t\tpath = BlockMode;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t75EC52521EE8B6CA0048EB3B /* Foundation */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t75EC52531EE8B6CA0048EB3B /* AES+Foundation.swift */,\n\t\t\t\t75EC52541EE8B6CA0048EB3B /* Blowfish+Foundation.swift */,\n\t\t\t\t75EC52551EE8B6CA0048EB3B /* ChaCha20+Foundation.swift */,\n\t\t\t\t75EC52561EE8B6CA0048EB3B /* Array+Foundation.swift */,\n\t\t\t\t75EC52571EE8B6CA0048EB3B /* Data+Extension.swift */,\n\t\t\t\t75EC52581EE8B6CA0048EB3B /* HMAC+Foundation.swift */,\n\t\t\t\t75EC52591EE8B6CA0048EB3B /* Rabbit+Foundation.swift */,\n\t\t\t\t75EC525A1EE8B6CA0048EB3B /* String+FoundationExtension.swift */,\n\t\t\t\t75EC525B1EE8B6CA0048EB3B /* Utils+Foundation.swift */,\n\t\t\t);\n\t\t\tpath = Foundation;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n\t\t75EC52651EE8B6CA0048EB3B /* PKCS */ = {\n\t\t\tisa = PBXGroup;\n\t\t\tchildren = (\n\t\t\t\t75EC52691EE8B6CA0048EB3B /* PKCS7Padding.swift */,\n\t\t\t\t75EC52661EE8B6CA0048EB3B /* PBKDF1.swift */,\n\t\t\t\t75EC52671EE8B6CA0048EB3B /* PBKDF2.swift */,\n\t\t\t\t7507706E28D61EBA004A44DC /* PKCS1v15.swift */,\n\t\t\t\t75EC52681EE8B6CA0048EB3B /* PKCS5.swift */,\n\t\t\t\t750509981F6BEF2A00394A1B /* PKCS7.swift */,\n\t\t\t);\n\t\t\tpath = PKCS;\n\t\t\tsourceTree = \"<group>\";\n\t\t};\n/* End PBXGroup section */\n\n/* Begin PBXHeadersBuildPhase section */\n\t\t754BE45219693E190098E6F3 /* Headers */ = {\n\t\t\tisa = PBXHeadersBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t75EC527B1EE8B73A0048EB3B /* CryptoSwift.h in Headers */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n/* End PBXHeadersBuildPhase section */\n\n/* Begin PBXNativeTarget section */\n\t\t75211F91207249D8004E41F8 /* CryptoSwift-TestHostApp */ = {\n\t\t\tisa = PBXNativeTarget;\n\t\t\tbuildConfigurationList = 75211FA4207249D8004E41F8 /* Build configuration list for PBXNativeTarget \"CryptoSwift-TestHostApp\" */;\n\t\t\tbuildPhases = (\n\t\t\t\t75211F8E207249D8004E41F8 /* Sources */,\n\t\t\t\t75211F8F207249D8004E41F8 /* Frameworks */,\n\t\t\t\t75211F90207249D8004E41F8 /* Resources */,\n\t\t\t\t7564F0682072ED7000CA5A96 /* Embed Frameworks */,\n\t\t\t);\n\t\t\tbuildRules = (\n\t\t\t);\n\t\t\tdependencies = (\n\t\t\t\t7564F0672072ED7000CA5A96 /* PBXTargetDependency */,\n\t\t\t);\n\t\t\tname = \"CryptoSwift-TestHostApp\";\n\t\t\tproductName = \"CryptoSwift-TestHostApp\";\n\t\t\tproductReference = 75211F92207249D8004E41F8 /* CryptoSwift-TestHostApp.app */;\n\t\t\tproductType = \"com.apple.product-type.application\";\n\t\t};\n\t\t754BE45419693E190098E6F3 /* CryptoSwift */ = {\n\t\t\tisa = PBXNativeTarget;\n\t\t\tbuildConfigurationList = 754BE46B19693E190098E6F3 /* Build configuration list for PBXNativeTarget \"CryptoSwift\" */;\n\t\t\tbuildPhases = (\n\t\t\t\t754BE45219693E190098E6F3 /* Headers */,\n\t\t\t\t754BE45019693E190098E6F3 /* Sources */,\n\t\t\t\t754BE45119693E190098E6F3 /* Frameworks */,\n\t\t\t\t754BE45319693E190098E6F3 /* Resources */,\n\t\t\t\t75B601E0197D69770009B53D /* CopyFiles */,\n\t\t\t);\n\t\t\tbuildRules = (\n\t\t\t);\n\t\t\tdependencies = (\n\t\t\t);\n\t\t\tname = CryptoSwift;\n\t\t\tpackageProductDependencies = (\n\t\t\t);\n\t\t\tproductName = CryptoSwift;\n\t\t\tproductReference = 754BE45519693E190098E6F3 /* CryptoSwift.framework */;\n\t\t\tproductType = \"com.apple.product-type.framework\";\n\t\t};\n\t\t754BE45F19693E190098E6F3 /* CryptoSwiftTests */ = {\n\t\t\tisa = PBXNativeTarget;\n\t\t\tbuildConfigurationList = 754BE46E19693E190098E6F3 /* Build configuration list for PBXNativeTarget \"CryptoSwiftTests\" */;\n\t\t\tbuildPhases = (\n\t\t\t\t754BE45C19693E190098E6F3 /* Sources */,\n\t\t\t\t754BE45D19693E190098E6F3 /* Frameworks */,\n\t\t\t\t754BE45E19693E190098E6F3 /* Resources */,\n\t\t\t);\n\t\t\tbuildRules = (\n\t\t\t);\n\t\t\tdependencies = (\n\t\t\t\t75B601E4197D69EB0009B53D /* PBXTargetDependency */,\n\t\t\t\t75F9482220BDDF9900956311 /* PBXTargetDependency */,\n\t\t\t);\n\t\t\tname = CryptoSwiftTests;\n\t\t\tproductName = Tests;\n\t\t\tproductReference = 754BE46019693E190098E6F3 /* CryptoSwiftTests.xctest */;\n\t\t\tproductType = \"com.apple.product-type.bundle.unit-test\";\n\t\t};\n\t\t7564F04E2072EAEB00CA5A96 /* TestsPerformance-iOS */ = {\n\t\t\tisa = PBXNativeTarget;\n\t\t\tbuildConfigurationList = 7564F05C2072EAEB00CA5A96 /* Build configuration list for PBXNativeTarget \"TestsPerformance-iOS\" */;\n\t\t\tbuildPhases = (\n\t\t\t\t7564F0512072EAEB00CA5A96 /* Sources */,\n\t\t\t\t7564F0592072EAEB00CA5A96 /* Frameworks */,\n\t\t\t\t7564F05B2072EAEB00CA5A96 /* Resources */,\n\t\t\t);\n\t\t\tbuildRules = (\n\t\t\t);\n\t\t\tdependencies = (\n\t\t\t\t7564F04F2072EAEB00CA5A96 /* PBXTargetDependency */,\n\t\t\t\t7564F0622072EB5D00CA5A96 /* PBXTargetDependency */,\n\t\t\t);\n\t\t\tname = \"TestsPerformance-iOS\";\n\t\t\tproductName = TestsPerformance;\n\t\t\tproductReference = 7564F0602072EAEB00CA5A96 /* TestsPerformance-iOS.xctest */;\n\t\t\tproductType = \"com.apple.product-type.bundle.unit-test\";\n\t\t};\n\t\t7595C1492072E48C00EA1A5F /* TestsPerformance-Mac */ = {\n\t\t\tisa = PBXNativeTarget;\n\t\t\tbuildConfigurationList = 7595C1522072E48C00EA1A5F /* Build configuration list for PBXNativeTarget \"TestsPerformance-Mac\" */;\n\t\t\tbuildPhases = (\n\t\t\t\t7595C1462072E48C00EA1A5F /* Sources */,\n\t\t\t\t7595C1472072E48C00EA1A5F /* Frameworks */,\n\t\t\t\t7595C1482072E48C00EA1A5F /* Resources */,\n\t\t\t);\n\t\t\tbuildRules = (\n\t\t\t);\n\t\t\tdependencies = (\n\t\t\t\t7595C15F2072E64000EA1A5F /* PBXTargetDependency */,\n\t\t\t);\n\t\t\tname = \"TestsPerformance-Mac\";\n\t\t\tproductName = TestsPerformance;\n\t\t\tproductReference = 7595C14A2072E48C00EA1A5F /* TestsPerformance-Mac.xctest */;\n\t\t\tproductType = \"com.apple.product-type.bundle.unit-test\";\n\t\t};\n/* End PBXNativeTarget section */\n\n/* Begin PBXProject section */\n\t\t754BE44C19693E190098E6F3 /* Project object */ = {\n\t\t\tisa = PBXProject;\n\t\t\tattributes = {\n\t\t\t\tLastSwiftUpdateCheck = 0930;\n\t\t\t\tLastUpgradeCheck = 1400;\n\t\t\t\tORGANIZATIONNAME = \"Marcin Krzyzanowski\";\n\t\t\t\tTargetAttributes = {\n\t\t\t\t\t75211F91207249D8004E41F8 = {\n\t\t\t\t\t\tCreatedOnToolsVersion = 9.3;\n\t\t\t\t\t\tLastSwiftMigration = 1020;\n\t\t\t\t\t\tProvisioningStyle = Manual;\n\t\t\t\t\t};\n\t\t\t\t\t754BE45419693E190098E6F3 = {\n\t\t\t\t\t\tCreatedOnToolsVersion = 6.0;\n\t\t\t\t\t\tLastSwiftMigration = 1020;\n\t\t\t\t\t\tProvisioningStyle = Manual;\n\t\t\t\t\t};\n\t\t\t\t\t754BE45F19693E190098E6F3 = {\n\t\t\t\t\t\tCreatedOnToolsVersion = 6.0;\n\t\t\t\t\t\tLastSwiftMigration = 1020;\n\t\t\t\t\t\tProvisioningStyle = Manual;\n\t\t\t\t\t};\n\t\t\t\t\t7564F04E2072EAEB00CA5A96 = {\n\t\t\t\t\t\tLastSwiftMigration = 1020;\n\t\t\t\t\t\tProvisioningStyle = Manual;\n\t\t\t\t\t\tTestTargetID = 75211F91207249D8004E41F8;\n\t\t\t\t\t};\n\t\t\t\t\t7595C1492072E48C00EA1A5F = {\n\t\t\t\t\t\tCreatedOnToolsVersion = 9.3;\n\t\t\t\t\t\tLastSwiftMigration = 1020;\n\t\t\t\t\t\tProvisioningStyle = Manual;\n\t\t\t\t\t};\n\t\t\t\t};\n\t\t\t};\n\t\t\tbuildConfigurationList = 754BE44F19693E190098E6F3 /* Build configuration list for PBXProject \"CryptoSwift\" */;\n\t\t\tcompatibilityVersion = \"Xcode 9.3\";\n\t\t\tdevelopmentRegion = en;\n\t\t\thasScannedForEncodings = 0;\n\t\t\tknownRegions = (\n\t\t\t\ten,\n\t\t\t\tBase,\n\t\t\t);\n\t\t\tmainGroup = 754BE44B19693E190098E6F3;\n\t\t\tpackageReferences = (\n\t\t\t);\n\t\t\tproductRefGroup = 754BE45619693E190098E6F3 /* Products */;\n\t\t\tprojectDirPath = \"\";\n\t\t\tprojectRoot = \"\";\n\t\t\ttargets = (\n\t\t\t\t754BE45419693E190098E6F3 /* CryptoSwift */,\n\t\t\t\t75211F91207249D8004E41F8 /* CryptoSwift-TestHostApp */,\n\t\t\t\t754BE45F19693E190098E6F3 /* CryptoSwiftTests */,\n\t\t\t\t7595C1492072E48C00EA1A5F /* TestsPerformance-Mac */,\n\t\t\t\t7564F04E2072EAEB00CA5A96 /* TestsPerformance-iOS */,\n\t\t\t);\n\t\t};\n/* End PBXProject section */\n\n/* Begin PBXResourcesBuildPhase section */\n\t\t75211F90207249D8004E41F8 /* Resources */ = {\n\t\t\tisa = PBXResourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t755BA296235387700039CAB5 /* Default-568h@2x.png in Resources */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t754BE45319693E190098E6F3 /* Resources */ = {\n\t\t\tisa = PBXResourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t754BE45E19693E190098E6F3 /* Resources */ = {\n\t\t\tisa = PBXResourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t7564F05B2072EAEB00CA5A96 /* Resources */ = {\n\t\t\tisa = PBXResourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t7595C1482072E48C00EA1A5F /* Resources */ = {\n\t\t\tisa = PBXResourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n/* End PBXResourcesBuildPhase section */\n\n/* Begin PBXSourcesBuildPhase section */\n\t\t75211F8E207249D8004E41F8 /* Sources */ = {\n\t\t\tisa = PBXSourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t75211F95207249D8004E41F8 /* AppDelegate.swift in Sources */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t754BE45019693E190098E6F3 /* Sources */ = {\n\t\t\tisa = PBXSourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t7507705F28D61E78004A44DC /* RSA.swift in Sources */,\n\t\t\t\t42012783267A6F1C00F82506 /* ISO10126Padding.swift in Sources */,\n\t\t\t\tEC353DB42BECCEFD0026B46B /* BitwiseOps.swift in Sources */,\n\t\t\t\t6AC8940226DB950F00F7E787 /* Multiplication.swift in Sources */,\n\t\t\t\t0AF023D5230F2B0F008E4E68 /* ISO78164Padding.swift in Sources */,\n\t\t\t\tEC353DBA2BECCF5A0026B46B /* IntegerConversion.swift in Sources */,\n\t\t\t\t75EC52861EE8B8170048EB3B /* CFB.swift in Sources */,\n\t\t\t\t75EC52901EE8B81A0048EB3B /* Collection+Extension.swift in Sources */,\n\t\t\t\tEC353DBE2BECCF770026B46B /* SquareRoot.swift in Sources */,\n\t\t\t\tEC353DC02BECCF860026B46B /* StringConversion.swift in Sources */,\n\t\t\t\t0EE73E71204D598100110E11 /* CMAC.swift in Sources */,\n\t\t\t\tEC353DBC2BECCF6A0026B46B /* PrimeTest.swift in Sources */,\n\t\t\t\t7523742D2083C61D0016D662 /* GCM.swift in Sources */,\n\t\t\t\t75F4E436216C98DE00F09710 /* CBCMAC.swift in Sources */,\n\t\t\t\t752BED9F208C135700FC4743 /* AES+Foundation.swift in Sources */,\n\t\t\t\tE6200E141FB9A7AE00258382 /* HKDF.swift in Sources */,\n\t\t\t\t75EC529F1EE8B8230048EB3B /* HMAC.swift in Sources */,\n\t\t\t\t75EC52B91EE8B83D0048EB3B /* ZeroPadding.swift in Sources */,\n\t\t\t\t7507706428D61E8B004A44DC /* DER.swift in Sources */,\n\t\t\t\t7529366A20683DFC00195874 /* AEADChaCha20Poly1305.swift in Sources */,\n\t\t\t\t6AC893FA26DB950F00F7E787 /* Hashable.swift in Sources */,\n\t\t\t\t75EC529E1EE8B8230048EB3B /* Generics.swift in Sources */,\n\t\t\t\t75EC52AA1EE8B83D0048EB3B /* Poly1305.swift in Sources */,\n\t\t\t\t75EC52AC1EE8B83D0048EB3B /* Cryptor.swift in Sources */,\n\t\t\t\t75EC52821EE8B8170048EB3B /* BlockMode.swift in Sources */,\n\t\t\t\t75EC52AE1EE8B83D0048EB3B /* SecureBytes.swift in Sources */,\n\t\t\t\t6AC893FC26DB950F00F7E787 /* Codable.swift in Sources */,\n\t\t\t\t75EC528F1EE8B81A0048EB3B /* Cipher.swift in Sources */,\n\t\t\t\t75B3ED79210FA016005D4ADA /* BlockEncryptor.swift in Sources */,\n\t\t\t\t75EC52A01EE8B8290048EB3B /* Int+Extension.swift in Sources */,\n\t\t\t\t7507706028D61E78004A44DC /* RSA+Signature.swift in Sources */,\n\t\t\t\t75EC52B01EE8B83D0048EB3B /* SHA2.swift in Sources */,\n\t\t\t\t6AC893F626DB950F00F7E787 /* Addition.swift in Sources */,\n\t\t\t\t752BED9D208C120D00FC4743 /* Blowfish+Foundation.swift in Sources */,\n\t\t\t\t75EC52B71EE8B83D0048EB3B /* Updatable.swift in Sources */,\n\t\t\t\t75EC528E1EE8B81A0048EB3B /* Checksum.swift in Sources */,\n\t\t\t\t754310442050111A003FB1DF /* CompactMap.swift in Sources */,\n\t\t\t\t7507706B28D61E97004A44DC /* ASN1Encoder.swift in Sources */,\n\t\t\t\t75EC52811EE8B8130048EB3B /* BlockCipher.swift in Sources */,\n\t\t\t\t75EC52941EE8B81A0048EB3B /* DigestType.swift in Sources */,\n\t\t\t\t75EC529B1EE8B8200048EB3B /* Rabbit+Foundation.swift in Sources */,\n\t\t\t\t6AC893F926DB950F00F7E787 /* Comparable.swift in Sources */,\n\t\t\t\t756A64C62111083B00BE8805 /* StreamEncryptor.swift in Sources */,\n\t\t\t\t6AC8940726DB950F00F7E787 /* Exponentiation.swift in Sources */,\n\t\t\t\t6AC8940026DB950F00F7E787 /* Subtraction.swift in Sources */,\n\t\t\t\t75EC52A61EE8B8390048EB3B /* PBKDF1.swift in Sources */,\n\t\t\t\t75EC52B41EE8B83D0048EB3B /* UInt32+Extension.swift in Sources */,\n\t\t\t\t6AC8940526DB950F00F7E787 /* Strideable.swift in Sources */,\n\t\t\t\t75EC52911EE8B81A0048EB3B /* Cryptors.swift in Sources */,\n\t\t\t\t75EC52881EE8B8170048EB3B /* ECB.swift in Sources */,\n\t\t\t\t75EC52841EE8B8170048EB3B /* CipherModeWorker.swift in Sources */,\n\t\t\t\t75EC52A41EE8B8290048EB3B /* Operators.swift in Sources */,\n\t\t\t\t75EC529A1EE8B8200048EB3B /* HMAC+Foundation.swift in Sources */,\n\t\t\t\t6AC8940826DB950F00F7E787 /* Random.swift in Sources */,\n\t\t\t\t75EC52B21EE8B83D0048EB3B /* String+Extension.swift in Sources */,\n\t\t\t\t750509991F6BEF2A00394A1B /* PKCS7.swift in Sources */,\n\t\t\t\t7507706C28D61E97004A44DC /* ASN1Decoder.swift in Sources */,\n\t\t\t\t75EC52B51EE8B83D0048EB3B /* UInt64+Extension.swift in Sources */,\n\t\t\t\tEC353DB62BECCF3A0026B46B /* DataConversion.swift in Sources */,\n\t\t\t\t7507707128D61ED5004A44DC /* Signature.swift in Sources */,\n\t\t\t\t75EC52AF1EE8B83D0048EB3B /* SHA1.swift in Sources */,\n\t\t\t\t75EC52801EE8B8130048EB3B /* Bit.swift in Sources */,\n\t\t\t\t7507706D28D61E97004A44DC /* ASN1.swift in Sources */,\n\t\t\t\t75EC52971EE8B8200048EB3B /* ChaCha20+Foundation.swift in Sources */,\n\t\t\t\t75F4E434216C93EF00F09710 /* CCM.swift in Sources */,\n\t\t\t\t75EC52871EE8B8170048EB3B /* CTR.swift in Sources */,\n\t\t\t\t6AC893FD26DB950F00F7E787 /* Shifts.swift in Sources */,\n\t\t\t\t75EC52A21EE8B8290048EB3B /* MD5.swift in Sources */,\n\t\t\t\t75EC527C1EE8B8130048EB3B /* AES.swift in Sources */,\n\t\t\t\t752BED9E208C121000FC4743 /* Blowfish.swift in Sources */,\n\t\t\t\t75EC52A91EE8B83D0048EB3B /* PKCS7Padding.swift in Sources */,\n\t\t\t\t75EC52A51EE8B8290048EB3B /* Padding.swift in Sources */,\n\t\t\t\t7507706128D61E78004A44DC /* RSA+Cipher.swift in Sources */,\n\t\t\t\t6AC8940A26DB950F00F7E787 /* BigUInt.swift in Sources */,\n\t\t\t\t75EC527F1EE8B8130048EB3B /* BatchedCollection.swift in Sources */,\n\t\t\t\t75EC52991EE8B8200048EB3B /* Data+Extension.swift in Sources */,\n\t\t\t\t75EC52B61EE8B83D0048EB3B /* UInt8+Extension.swift in Sources */,\n\t\t\t\t75EC52891EE8B8170048EB3B /* OFB.swift in Sources */,\n\t\t\t\t75EC52831EE8B8170048EB3B /* BlockModeOptions.swift in Sources */,\n\t\t\t\t753674072175D012003E32A6 /* StreamDecryptor.swift in Sources */,\n\t\t\t\t6AC8940626DB950F00F7E787 /* BigInt.swift in Sources */,\n\t\t\t\tEC353DC22BECCF8F0026B46B /* WordsAndBits.swift in Sources */,\n\t\t\t\t751EE9781F93996100161FFC /* AES.Cryptors.swift in Sources */,\n\t\t\t\t75EC527D1EE8B8130048EB3B /* Array+Extension.swift in Sources */,\n\t\t\t\t75D7AF38208BFB1600D22BEB /* UInt128.swift in Sources */,\n\t\t\t\t7571938E2816BFE3001C3AC0 /* CS.swift in Sources */,\n\t\t\t\t75EC52B31EE8B83D0048EB3B /* UInt16+Extension.swift in Sources */,\n\t\t\t\t75EC52A81EE8B8390048EB3B /* PKCS5.swift in Sources */,\n\t\t\t\t1467460F2017BB3600DF04ED /* AEAD.swift in Sources */,\n\t\t\t\t35F3E51C23BF9A6700A024A1 /* OCB.swift in Sources */,\n\t\t\t\t6AC8940B26DB950F00F7E787 /* Division.swift in Sources */,\n\t\t\t\t75EC528A1EE8B8170048EB3B /* PCBC.swift in Sources */,\n\t\t\t\t75EC528D1EE8B81A0048EB3B /* ChaCha20.swift in Sources */,\n\t\t\t\t75EC52851EE8B8170048EB3B /* CBC.swift in Sources */,\n\t\t\t\t75EC52A71EE8B8390048EB3B /* PBKDF2.swift in Sources */,\n\t\t\t\t75EC529D1EE8B8200048EB3B /* Utils+Foundation.swift in Sources */,\n\t\t\t\t75EC527E1EE8B8130048EB3B /* Authenticator.swift in Sources */,\n\t\t\t\t7507706A28D61E97004A44DC /* ASN1Scanner.swift in Sources */,\n\t\t\t\t75EC52AB1EE8B83D0048EB3B /* Rabbit.swift in Sources */,\n\t\t\t\t75B3ED77210F9DF7005D4ADA /* BlockDecryptor.swift in Sources */,\n\t\t\t\t7507706F28D61EBA004A44DC /* PKCS1v15.swift in Sources */,\n\t\t\t\t75EC529C1EE8B8200048EB3B /* String+FoundationExtension.swift in Sources */,\n\t\t\t\t75EC52B81EE8B83D0048EB3B /* Utils.swift in Sources */,\n\t\t\t\t75EC52981EE8B8200048EB3B /* Array+Foundation.swift in Sources */,\n\t\t\t\t75EC52B11EE8B83D0048EB3B /* SHA3.swift in Sources */,\n\t\t\t\t75EC52A31EE8B8290048EB3B /* NoPadding.swift in Sources */,\n\t\t\t\tEC353DB82BECCF4B0026B46B /* FloatingPointConversion.swift in Sources */,\n\t\t\t\t6AC893F826DB950F00F7E787 /* GCD.swift in Sources */,\n\t\t\t\t81F279DD2181F58300449EDA /* Scrypt.swift in Sources */,\n\t\t\t\t75EC52931EE8B81A0048EB3B /* Digest.swift in Sources */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t754BE45C19693E190098E6F3 /* Sources */ = {\n\t\t\tisa = PBXSourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t751AA0F3255F4EB600D4719E /* AESOCBTests.swift in Sources */,\n\t\t\t\t75C2E76D1D55F097003D2BCA /* Access.swift in Sources */,\n\t\t\t\t75482EA41CB310B7001F66A5 /* PBKDF.swift in Sources */,\n\t\t\t\t758A94291A65C67400E46135 /* HMACTests.swift in Sources */,\n\t\t\t\t75100F8F19B0BC890005C5F5 /* Poly1305Tests.swift in Sources */,\n\t\t\t\tE6200E171FB9B68C00258382 /* HKDFTests.swift in Sources */,\n\t\t\t\t754BE46819693E190098E6F3 /* DigestTests.swift in Sources */,\n\t\t\t\tE3FD2D531D6B81CE00A9F35F /* Error+Extension.swift in Sources */,\n\t\t\t\t757DA2591A4ED4D7002BA3EF /* ChaCha20Tests.swift in Sources */,\n\t\t\t\t755FB1DA199E347D00475437 /* ExtensionsTest.swift in Sources */,\n\t\t\t\t81F279DF2181F5A000449EDA /* ScryptTests.swift in Sources */,\n\t\t\t\t674A736F1BF5D85B00866C5B /* RabbitTests.swift in Sources */,\n\t\t\t\t0EE73E74204D59C200110E11 /* CMACTests.swift in Sources */,\n\t\t\t\t6A7CDEED26CD1E4C00FFB1AF /* RSATests.swift in Sources */,\n\t\t\t\t750CC3EB1DC0CACE0096BE6E /* BlowfishTests.swift in Sources */,\n\t\t\t\t757DA2531A4ED0A4002BA3EF /* PaddingTests.swift in Sources */,\n\t\t\t\t14156CE52011422400DDCFBC /* ChaCha20Poly1305Tests.swift in Sources */,\n\t\t\t\t757DA2551A4ED408002BA3EF /* AESTests.swift in Sources */,\n\t\t\t\t5431FD5B2B021476001DEE77 /* SignatureVerificationTests.swift in Sources */,\n\t\t\t\t7594CCBC217A76DC0055C95D /* AESCCMTests.swift in Sources */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t7564F0512072EAEB00CA5A96 /* Sources */ = {\n\t\t\tisa = PBXSourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t7564F0522072EAEB00CA5A96 /* PBKDFPerf.swift in Sources */,\n\t\t\t\t7564F0532072EAEB00CA5A96 /* ChaCha20TestsPerf.swift in Sources */,\n\t\t\t\t7564F0542072EAEB00CA5A96 /* RabbitTestsPerf.swift in Sources */,\n\t\t\t\t7564F0552072EAEB00CA5A96 /* ExtensionsTestPerf.swift in Sources */,\n\t\t\t\t7564F0562072EAEB00CA5A96 /* DigestTestsPerf.swift in Sources */,\n\t\t\t\t81F279E22181F5C500449EDA /* ScryptTestsPerf.swift in Sources */,\n\t\t\t\t7564F0582072EAEB00CA5A96 /* AESTestsPerf.swift in Sources */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n\t\t7595C1462072E48C00EA1A5F /* Sources */ = {\n\t\t\tisa = PBXSourcesBuildPhase;\n\t\t\tbuildActionMask = 2147483647;\n\t\t\tfiles = (\n\t\t\t\t7595C15D2072E5B900EA1A5F /* PBKDFPerf.swift in Sources */,\n\t\t\t\t7595C15A2072E5B900EA1A5F /* ChaCha20TestsPerf.swift in Sources */,\n\t\t\t\t7595C15B2072E5B900EA1A5F /* RabbitTestsPerf.swift in Sources */,\n\t\t\t\t7595C15C2072E5B900EA1A5F /* ExtensionsTestPerf.swift in Sources */,\n\t\t\t\t7595C1582072E5B900EA1A5F /* DigestTestsPerf.swift in Sources */,\n\t\t\t\t81F279E12181F5C500449EDA /* ScryptTestsPerf.swift in Sources */,\n\t\t\t\t7595C1592072E5B900EA1A5F /* AESTestsPerf.swift in Sources */,\n\t\t\t);\n\t\t\trunOnlyForDeploymentPostprocessing = 0;\n\t\t};\n/* End PBXSourcesBuildPhase section */\n\n/* Begin PBXTargetDependency section */\n\t\t7564F04F2072EAEB00CA5A96 /* PBXTargetDependency */ = {\n\t\t\tisa = PBXTargetDependency;\n\t\t\ttarget = 754BE45419693E190098E6F3 /* CryptoSwift */;\n\t\t\ttargetProxy = 7564F0502072EAEB00CA5A96 /* PBXContainerItemProxy */;\n\t\t};\n\t\t7564F0622072EB5D00CA5A96 /* PBXTargetDependency */ = {\n\t\t\tisa = PBXTargetDependency;\n\t\t\tplatformFilter = ios;\n\t\t\ttarget = 75211F91207249D8004E41F8 /* CryptoSwift-TestHostApp */;\n\t\t\ttargetProxy = 7564F0612072EB5D00CA5A96 /* PBXContainerItemProxy */;\n\t\t};\n\t\t7564F0672072ED7000CA5A96 /* PBXTargetDependency */ = {\n\t\t\tisa = PBXTargetDependency;\n\t\t\ttarget = 754BE45419693E190098E6F3 /* CryptoSwift */;\n\t\t\ttargetProxy = 7564F0662072ED7000CA5A96 /* PBXContainerItemProxy */;\n\t\t};\n\t\t7595C15F2072E64000EA1A5F /* PBXTargetDependency */ = {\n\t\t\tisa = PBXTargetDependency;\n\t\t\ttarget = 754BE45419693E190098E6F3 /* CryptoSwift */;\n\t\t\ttargetProxy = 7595C15E2072E64000EA1A5F /* PBXContainerItemProxy */;\n\t\t};\n\t\t75B601E4197D69EB0009B53D /* PBXTargetDependency */ = {\n\t\t\tisa = PBXTargetDependency;\n\t\t\ttarget = 754BE45419693E190098E6F3 /* CryptoSwift */;\n\t\t\ttargetProxy = 75B601E3197D69EB0009B53D /* PBXContainerItemProxy */;\n\t\t};\n\t\t75F9482220BDDF9900956311 /* PBXTargetDependency */ = {\n\t\t\tisa = PBXTargetDependency;\n\t\t\tplatformFilter = ios;\n\t\t\ttarget = 75211F91207249D8004E41F8 /* CryptoSwift-TestHostApp */;\n\t\t\ttargetProxy = 75F9482120BDDF9900956311 /* PBXContainerItemProxy */;\n\t\t};\n/* End PBXTargetDependency section */\n\n/* Begin XCBuildConfiguration section */\n\t\t75211FA1207249D8004E41F8 /* Debug */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Debug;\n\t\t};\n\t\t75211FA2207249D8004E41F8 /* Release */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Release;\n\t\t};\n\t\t75211FA3207249D8004E41F8 /* Test */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FA520724A0F004E41F8 /* CryptoSwift-TestHostApp-Test.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Test;\n\t\t};\n\t\t754BE46919693E190098E6F3 /* Debug */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FB020724A10004E41F8 /* Project-Debug.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Debug;\n\t\t};\n\t\t754BE46A19693E190098E6F3 /* Release */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FAA20724A0F004E41F8 /* Project-Release.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Release;\n\t\t};\n\t\t754BE46C19693E190098E6F3 /* Debug */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FAF20724A10004E41F8 /* CryptoSwift-Debug.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Debug;\n\t\t};\n\t\t754BE46D19693E190098E6F3 /* Release */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FAC20724A0F004E41F8 /* CryptoSwift-Release.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Release;\n\t\t};\n\t\t754BE46F19693E190098E6F3 /* Debug */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Debug;\n\t\t};\n\t\t754BE47019693E190098E6F3 /* Release */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Release;\n\t\t};\n\t\t7564F05D2072EAEB00CA5A96 /* Debug */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbuildSettings = {\n\t\t\t\tSDKROOT = iphoneos;\n\t\t\t};\n\t\t\tname = Debug;\n\t\t};\n\t\t7564F05E2072EAEB00CA5A96 /* Release */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbuildSettings = {\n\t\t\t\tSDKROOT = iphoneos;\n\t\t\t};\n\t\t\tname = Release;\n\t\t};\n\t\t7564F05F2072EAEB00CA5A96 /* Test */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FB120724A10004E41F8 /* Tests-Test.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t\tSDKROOT = iphoneos;\n\t\t\t};\n\t\t\tname = Test;\n\t\t};\n\t\t756B66AA1F6AAFDB00DEC41C /* Test */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FB220724A10004E41F8 /* Project-Shared.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Test;\n\t\t};\n\t\t756B66AB1F6AAFDB00DEC41C /* Test */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FB420724A10004E41F8 /* CryptoSwift-Test.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Test;\n\t\t};\n\t\t756B66AC1F6AAFDB00DEC41C /* Test */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FB120724A10004E41F8 /* Tests-Test.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Test;\n\t\t};\n\t\t7595C14F2072E48C00EA1A5F /* Debug */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Debug;\n\t\t};\n\t\t7595C1502072E48C00EA1A5F /* Release */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Release;\n\t\t};\n\t\t7595C1512072E48C00EA1A5F /* Test */ = {\n\t\t\tisa = XCBuildConfiguration;\n\t\t\tbaseConfigurationReference = 75211FB120724A10004E41F8 /* Tests-Test.xcconfig */;\n\t\t\tbuildSettings = {\n\t\t\t};\n\t\t\tname = Test;\n\t\t};\n/* End XCBuildConfiguration section */\n\n/* Begin XCConfigurationList section */\n\t\t75211FA4207249D8004E41F8 /* Build configuration list for PBXNativeTarget \"CryptoSwift-TestHostApp\" */ = {\n\t\t\tisa = XCConfigurationList;\n\t\t\tbuildConfigurations = (\n\t\t\t\t75211FA1207249D8004E41F8 /* Debug */,\n\t\t\t\t75211FA2207249D8004E41F8 /* Release */,\n\t\t\t\t75211FA3207249D8004E41F8 /* Test */,\n\t\t\t);\n\t\t\tdefaultConfigurationIsVisible = 0;\n\t\t\tdefaultConfigurationName = Release;\n\t\t};\n\t\t754BE44F19693E190098E6F3 /* Build configuration list for PBXProject \"CryptoSwift\" */ = {\n\t\t\tisa = XCConfigurationList;\n\t\t\tbuildConfigurations = (\n\t\t\t\t754BE46919693E190098E6F3 /* Debug */,\n\t\t\t\t754BE46A19693E190098E6F3 /* Release */,\n\t\t\t\t756B66AA1F6AAFDB00DEC41C /* Test */,\n\t\t\t);\n\t\t\tdefaultConfigurationIsVisible = 0;\n\t\t\tdefaultConfigurationName = Release;\n\t\t};\n\t\t754BE46B19693E190098E6F3 /* Build configuration list for PBXNativeTarget \"CryptoSwift\" */ = {\n\t\t\tisa = XCConfigurationList;\n\t\t\tbuildConfigurations = (\n\t\t\t\t754BE46C19693E190098E6F3 /* Debug */,\n\t\t\t\t754BE46D19693E190098E6F3 /* Release */,\n\t\t\t\t756B66AB1F6AAFDB00DEC41C /* Test */,\n\t\t\t);\n\t\t\tdefaultConfigurationIsVisible = 0;\n\t\t\tdefaultConfigurationName = Release;\n\t\t};\n\t\t754BE46E19693E190098E6F3 /* Build configuration list for PBXNativeTarget \"CryptoSwiftTests\" */ = {\n\t\t\tisa = XCConfigurationList;\n\t\t\tbuildConfigurations = (\n\t\t\t\t754BE46F19693E190098E6F3 /* Debug */,\n\t\t\t\t754BE47019693E190098E6F3 /* Release */,\n\t\t\t\t756B66AC1F6AAFDB00DEC41C /* Test */,\n\t\t\t);\n\t\t\tdefaultConfigurationIsVisible = 0;\n\t\t\tdefaultConfigurationName = Release;\n\t\t};\n\t\t7564F05C2072EAEB00CA5A96 /* Build configuration list for PBXNativeTarget \"TestsPerformance-iOS\" */ = {\n\t\t\tisa = XCConfigurationList;\n\t\t\tbuildConfigurations = (\n\t\t\t\t7564F05D2072EAEB00CA5A96 /* Debug */,\n\t\t\t\t7564F05E2072EAEB00CA5A96 /* Release */,\n\t\t\t\t7564F05F2072EAEB00CA5A96 /* Test */,\n\t\t\t);\n\t\t\tdefaultConfigurationIsVisible = 0;\n\t\t\tdefaultConfigurationName = Release;\n\t\t};\n\t\t7595C1522072E48C00EA1A5F /* Build configuration list for PBXNativeTarget \"TestsPerformance-Mac\" */ = {\n\t\t\tisa = XCConfigurationList;\n\t\t\tbuildConfigurations = (\n\t\t\t\t7595C14F2072E48C00EA1A5F /* Debug */,\n\t\t\t\t7595C1502072E48C00EA1A5F /* Release */,\n\t\t\t\t7595C1512072E48C00EA1A5F /* Test */,\n\t\t\t);\n\t\t\tdefaultConfigurationIsVisible = 0;\n\t\t\tdefaultConfigurationName = Release;\n\t\t};\n/* End XCConfigurationList section */\n\t};\n\trootObject = 754BE44C19693E190098E6F3 /* Project object */;\n}\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/project.xcworkspace/contents.xcworkspacedata",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<Workspace\n   version = \"1.0\">\n   <FileRef\n      location = \"self:../Tests/CryptoSwiftTests\">\n   </FileRef>\n</Workspace>\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/project.xcworkspace/xcshareddata/CryptoSwift.xcscmblueprint",
    "content": ""
  },
  {
    "path": "CryptoSwift.xcodeproj/project.xcworkspace/xcshareddata/IDEWorkspaceChecks.plist",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n<plist version=\"1.0\">\n<dict>\n\t<key>IDEDidComputeMac32BitWarning</key>\n\t<true/>\n</dict>\n</plist>\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/project.xcworkspace/xcshareddata/WorkspaceSettings.xcsettings",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n<plist version=\"1.0\">\n<dict>\n\t<key>IDEWorkspaceSharedSettings_AutocreateContextsIfNeeded</key>\n\t<false/>\n</dict>\n</plist>\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/xcshareddata/IDETemplateMacros.plist",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n<plist version=\"1.0\">\n<dict>\n\t<key>FILEHEADER</key>\n\t<string>//  CryptoSwift\n//\n//  Copyright (C) 2014-__YEAR__ Marcin Krzyżanowski &lt;marcin@krzyzanowskim.com&gt;\n//  This software is provided &apos;as-is&apos;, without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose,including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//</string>\n</dict>\n</plist>\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/xcshareddata/xcschemes/CryptoSwift-TestHostApp.xcscheme",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<Scheme\n   LastUpgradeVersion = \"1400\"\n   version = \"1.3\">\n   <BuildAction\n      parallelizeBuildables = \"NO\"\n      buildImplicitDependencies = \"YES\">\n      <BuildActionEntries>\n         <BuildActionEntry\n            buildForTesting = \"YES\"\n            buildForRunning = \"YES\"\n            buildForProfiling = \"YES\"\n            buildForArchiving = \"YES\"\n            buildForAnalyzing = \"YES\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"75211F91207249D8004E41F8\"\n               BuildableName = \"CryptoSwift-TestHostApp.app\"\n               BlueprintName = \"CryptoSwift-TestHostApp\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </BuildActionEntry>\n      </BuildActionEntries>\n   </BuildAction>\n   <TestAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\">\n      <MacroExpansion>\n         <BuildableReference\n            BuildableIdentifier = \"primary\"\n            BlueprintIdentifier = \"75211F91207249D8004E41F8\"\n            BuildableName = \"CryptoSwift-TestHostApp.app\"\n            BlueprintName = \"CryptoSwift-TestHostApp\"\n            ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n         </BuildableReference>\n      </MacroExpansion>\n      <Testables>\n      </Testables>\n   </TestAction>\n   <LaunchAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      launchStyle = \"0\"\n      useCustomWorkingDirectory = \"NO\"\n      ignoresPersistentStateOnLaunch = \"NO\"\n      debugDocumentVersioning = \"YES\"\n      debugServiceExtension = \"internal\"\n      allowLocationSimulation = \"YES\">\n      <BuildableProductRunnable\n         runnableDebuggingMode = \"0\">\n         <BuildableReference\n            BuildableIdentifier = \"primary\"\n            BlueprintIdentifier = \"75211F91207249D8004E41F8\"\n            BuildableName = \"CryptoSwift-TestHostApp.app\"\n            BlueprintName = \"CryptoSwift-TestHostApp\"\n            ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n         </BuildableReference>\n      </BuildableProductRunnable>\n   </LaunchAction>\n   <ProfileAction\n      buildConfiguration = \"Release\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\"\n      savedToolIdentifier = \"\"\n      useCustomWorkingDirectory = \"NO\"\n      debugDocumentVersioning = \"YES\">\n      <BuildableProductRunnable\n         runnableDebuggingMode = \"0\">\n         <BuildableReference\n            BuildableIdentifier = \"primary\"\n            BlueprintIdentifier = \"75211F91207249D8004E41F8\"\n            BuildableName = \"CryptoSwift-TestHostApp.app\"\n            BlueprintName = \"CryptoSwift-TestHostApp\"\n            ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n         </BuildableReference>\n      </BuildableProductRunnable>\n   </ProfileAction>\n   <AnalyzeAction\n      buildConfiguration = \"Test\">\n   </AnalyzeAction>\n   <ArchiveAction\n      buildConfiguration = \"Release\"\n      revealArchiveInOrganizer = \"YES\">\n   </ArchiveAction>\n</Scheme>\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/xcshareddata/xcschemes/CryptoSwift.xcscheme",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<Scheme\n   LastUpgradeVersion = \"1400\"\n   version = \"1.3\">\n   <BuildAction\n      parallelizeBuildables = \"YES\"\n      buildImplicitDependencies = \"NO\">\n      <BuildActionEntries>\n         <BuildActionEntry\n            buildForTesting = \"YES\"\n            buildForRunning = \"YES\"\n            buildForProfiling = \"YES\"\n            buildForArchiving = \"YES\"\n            buildForAnalyzing = \"YES\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"754BE45419693E190098E6F3\"\n               BuildableName = \"CryptoSwift.framework\"\n               BlueprintName = \"CryptoSwift\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </BuildActionEntry>\n         <BuildActionEntry\n            buildForTesting = \"YES\"\n            buildForRunning = \"NO\"\n            buildForProfiling = \"NO\"\n            buildForArchiving = \"NO\"\n            buildForAnalyzing = \"NO\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"754BE45F19693E190098E6F3\"\n               BuildableName = \"CryptoSwiftTests.xctest\"\n               BlueprintName = \"CryptoSwiftTests\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </BuildActionEntry>\n         <BuildActionEntry\n            buildForTesting = \"YES\"\n            buildForRunning = \"NO\"\n            buildForProfiling = \"NO\"\n            buildForArchiving = \"NO\"\n            buildForAnalyzing = \"NO\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"7595C1492072E48C00EA1A5F\"\n               BuildableName = \"TestsPerformance-Mac.xctest\"\n               BlueprintName = \"TestsPerformance-Mac\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </BuildActionEntry>\n         <BuildActionEntry\n            buildForTesting = \"YES\"\n            buildForRunning = \"NO\"\n            buildForProfiling = \"NO\"\n            buildForArchiving = \"NO\"\n            buildForAnalyzing = \"NO\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"7564F04E2072EAEB00CA5A96\"\n               BuildableName = \"TestsPerformance-iOS.xctest\"\n               BlueprintName = \"TestsPerformance-iOS\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </BuildActionEntry>\n      </BuildActionEntries>\n   </BuildAction>\n   <TestAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\"\n      disableMainThreadChecker = \"YES\"\n      systemAttachmentLifetime = \"keepNever\"\n      onlyGenerateCoverageForSpecifiedTargets = \"YES\">\n      <MacroExpansion>\n         <BuildableReference\n            BuildableIdentifier = \"primary\"\n            BlueprintIdentifier = \"754BE45419693E190098E6F3\"\n            BuildableName = \"CryptoSwift.framework\"\n            BlueprintName = \"CryptoSwift\"\n            ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n         </BuildableReference>\n      </MacroExpansion>\n      <Testables>\n         <TestableReference\n            skipped = \"NO\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"754BE45F19693E190098E6F3\"\n               BuildableName = \"CryptoSwiftTests.xctest\"\n               BlueprintName = \"CryptoSwiftTests\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </TestableReference>\n      </Testables>\n   </TestAction>\n   <LaunchAction\n      buildConfiguration = \"Debug\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      launchStyle = \"0\"\n      useCustomWorkingDirectory = \"NO\"\n      ignoresPersistentStateOnLaunch = \"NO\"\n      debugDocumentVersioning = \"NO\"\n      debugServiceExtension = \"internal\"\n      allowLocationSimulation = \"NO\">\n      <MacroExpansion>\n         <BuildableReference\n            BuildableIdentifier = \"primary\"\n            BlueprintIdentifier = \"754BE45419693E190098E6F3\"\n            BuildableName = \"CryptoSwift.framework\"\n            BlueprintName = \"CryptoSwift\"\n            ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n         </BuildableReference>\n      </MacroExpansion>\n   </LaunchAction>\n   <ProfileAction\n      buildConfiguration = \"Release\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\"\n      savedToolIdentifier = \"\"\n      useCustomWorkingDirectory = \"NO\"\n      debugDocumentVersioning = \"YES\">\n      <MacroExpansion>\n         <BuildableReference\n            BuildableIdentifier = \"primary\"\n            BlueprintIdentifier = \"754BE45419693E190098E6F3\"\n            BuildableName = \"CryptoSwift.framework\"\n            BlueprintName = \"CryptoSwift\"\n            ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n         </BuildableReference>\n      </MacroExpansion>\n   </ProfileAction>\n   <AnalyzeAction\n      buildConfiguration = \"Release\">\n   </AnalyzeAction>\n   <ArchiveAction\n      buildConfiguration = \"Release\"\n      revealArchiveInOrganizer = \"YES\">\n   </ArchiveAction>\n</Scheme>\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/xcshareddata/xcschemes/Tests.xcscheme",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<Scheme\n   LastUpgradeVersion = \"1400\"\n   version = \"1.3\">\n   <BuildAction\n      parallelizeBuildables = \"NO\"\n      buildImplicitDependencies = \"YES\">\n   </BuildAction>\n   <TestAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\">\n      <Testables>\n         <TestableReference\n            skipped = \"NO\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"754BE45F19693E190098E6F3\"\n               BuildableName = \"CryptoSwiftTests.xctest\"\n               BlueprintName = \"CryptoSwiftTests\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </TestableReference>\n      </Testables>\n   </TestAction>\n   <LaunchAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      launchStyle = \"0\"\n      useCustomWorkingDirectory = \"NO\"\n      ignoresPersistentStateOnLaunch = \"NO\"\n      debugDocumentVersioning = \"YES\"\n      debugServiceExtension = \"internal\"\n      allowLocationSimulation = \"YES\">\n   </LaunchAction>\n   <ProfileAction\n      buildConfiguration = \"Test\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\"\n      savedToolIdentifier = \"\"\n      useCustomWorkingDirectory = \"NO\"\n      debugDocumentVersioning = \"YES\">\n   </ProfileAction>\n   <AnalyzeAction\n      buildConfiguration = \"Test\">\n   </AnalyzeAction>\n   <ArchiveAction\n      buildConfiguration = \"Release\"\n      revealArchiveInOrganizer = \"YES\">\n   </ArchiveAction>\n</Scheme>\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/xcshareddata/xcschemes/TestsPerformance-Mac.xcscheme",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<Scheme\n   LastUpgradeVersion = \"1400\"\n   version = \"1.3\">\n   <BuildAction\n      parallelizeBuildables = \"NO\"\n      buildImplicitDependencies = \"YES\">\n   </BuildAction>\n   <TestAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\">\n      <Testables>\n         <TestableReference\n            skipped = \"NO\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"7595C1492072E48C00EA1A5F\"\n               BuildableName = \"TestsPerformance-Mac.xctest\"\n               BlueprintName = \"TestsPerformance-Mac\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </TestableReference>\n      </Testables>\n   </TestAction>\n   <LaunchAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      launchStyle = \"0\"\n      useCustomWorkingDirectory = \"NO\"\n      ignoresPersistentStateOnLaunch = \"NO\"\n      debugDocumentVersioning = \"YES\"\n      debugServiceExtension = \"internal\"\n      allowLocationSimulation = \"YES\">\n   </LaunchAction>\n   <ProfileAction\n      buildConfiguration = \"Release\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\"\n      savedToolIdentifier = \"\"\n      useCustomWorkingDirectory = \"NO\"\n      debugDocumentVersioning = \"YES\">\n   </ProfileAction>\n   <AnalyzeAction\n      buildConfiguration = \"Test\">\n   </AnalyzeAction>\n   <ArchiveAction\n      buildConfiguration = \"Release\"\n      revealArchiveInOrganizer = \"YES\">\n   </ArchiveAction>\n</Scheme>\n"
  },
  {
    "path": "CryptoSwift.xcodeproj/xcshareddata/xcschemes/TestsPerformance-iOS.xcscheme",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<Scheme\n   LastUpgradeVersion = \"1400\"\n   version = \"1.3\">\n   <BuildAction\n      parallelizeBuildables = \"NO\"\n      buildImplicitDependencies = \"YES\">\n   </BuildAction>\n   <TestAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\">\n      <Testables>\n         <TestableReference\n            skipped = \"NO\">\n            <BuildableReference\n               BuildableIdentifier = \"primary\"\n               BlueprintIdentifier = \"7564F04E2072EAEB00CA5A96\"\n               BuildableName = \"TestsPerformance-iOS.xctest\"\n               BlueprintName = \"TestsPerformance-iOS\"\n               ReferencedContainer = \"container:CryptoSwift.xcodeproj\">\n            </BuildableReference>\n         </TestableReference>\n      </Testables>\n   </TestAction>\n   <LaunchAction\n      buildConfiguration = \"Test\"\n      selectedDebuggerIdentifier = \"Xcode.DebuggerFoundation.Debugger.LLDB\"\n      selectedLauncherIdentifier = \"Xcode.DebuggerFoundation.Launcher.LLDB\"\n      launchStyle = \"0\"\n      useCustomWorkingDirectory = \"NO\"\n      ignoresPersistentStateOnLaunch = \"NO\"\n      debugDocumentVersioning = \"YES\"\n      debugServiceExtension = \"internal\"\n      allowLocationSimulation = \"YES\">\n   </LaunchAction>\n   <ProfileAction\n      buildConfiguration = \"Test\"\n      shouldUseLaunchSchemeArgsEnv = \"YES\"\n      savedToolIdentifier = \"\"\n      useCustomWorkingDirectory = \"NO\"\n      debugDocumentVersioning = \"YES\">\n   </ProfileAction>\n   <AnalyzeAction\n      buildConfiguration = \"Test\">\n   </AnalyzeAction>\n   <ArchiveAction\n      buildConfiguration = \"Release\"\n      revealArchiveInOrganizer = \"YES\">\n   </ArchiveAction>\n</Scheme>\n"
  },
  {
    "path": "Info.plist",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n<plist version=\"1.0\">\n<dict>\n\t<key>CFBundleDevelopmentRegion</key>\n\t<string>en</string>\n\t<key>CFBundleExecutable</key>\n\t<string>${EXECUTABLE_NAME}</string>\n\t<key>CFBundleIdentifier</key>\n\t<string>$(PRODUCT_BUNDLE_IDENTIFIER)</string>\n\t<key>CFBundleInfoDictionaryVersion</key>\n\t<string>6.0</string>\n\t<key>CFBundleName</key>\n\t<string>${PRODUCT_NAME}</string>\n\t<key>CFBundlePackageType</key>\n\t<string>FMWK</string>\n\t<key>CFBundleShortVersionString</key>\n\t<string>$(MARKETING_VERSION)</string>\n\t<key>CFBundleSignature</key>\n\t<string>????</string>\n\t<key>CFBundleVersion</key>\n\t<string>$(CURRENT_PROJECT_VERSION)</string>\n\t<key>NSPrincipalClass</key>\n\t<string></string>\n</dict>\n</plist>\n"
  },
  {
    "path": "LICENSE",
    "content": "Copyright (C) 2014-3099 Marcin Krzyżanowski <marcin.krzyzanowski@gmail.com>\nThis software is provided 'as-is', without any express or implied warranty.\n\nIn no event will the authors be held liable for any damages arising from the use of this software.\n\nPermission is granted to anyone to use this software for any purpose,including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n\n- The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n- Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n- This notice may not be removed or altered from any source or binary distribution.\n- Redistributions of any form whatsoever must retain the following acknowledgment: 'This product includes software developed by the \"Marcin Krzyzanowski\" (http://krzyzanowskim.com/).'\n"
  },
  {
    "path": "Makefile",
    "content": ".PHONY: frameworks\n\nCWD := $(abspath $(patsubst %/,%,$(dir $(abspath $(lastword $(MAKEFILE_LIST))))))\n\nframeworks:\n\t$(CWD)/scripts/build-framework.sh\n\t@echo \"Framework built in $(CWD)/CryptoSwift.xcframework\"\n\nall: frameworks\n"
  },
  {
    "path": "Package.swift",
    "content": "// swift-tools-version:5.6\n\nimport PackageDescription\n\nlet package = Package(\n  name: \"CryptoSwift\",\n  platforms: [\n    .macOS(.v10_13), .macCatalyst(.v13), .iOS(.v11), .tvOS(.v11), .watchOS(.v4), .custom(\"visionos\", versionString: \"1.0\")\n  ],\n  products: [\n    .library(\n      name: \"CryptoSwift\",\n      targets: [\"CryptoSwift\"]\n    )\n  ],\n  targets: [\n    .target(name: \"CryptoSwift\", resources: [.copy(\"PrivacyInfo.xcprivacy\")]),\n    .testTarget(name: \"CryptoSwiftTests\", dependencies: [\"CryptoSwift\"])\n  ],\n  swiftLanguageVersions: [.v5]\n)\n"
  },
  {
    "path": "README.md",
    "content": "[![Platform](https://img.shields.io/badge/Platforms-iOS%20%7C%20Android%20%7C%20macOS%20%7C%20watchOS%20%7C%20tvOS%20%7C%20Linux-4E4E4E.svg?colorA=28a745)](#installation)\n\n[![Swift support](https://img.shields.io/badge/Swift-3.1%20%7C%203.2%20%7C%204.0%20%7C%204.1%20%7C%204.2%20%7C%205.0%20%7C%206.2-lightgrey.svg?colorA=28a745&colorB=4E4E4E)](#swift-versions-support)\n[![Swift Package Manager compatible](https://img.shields.io/badge/SPM-compatible-brightgreen.svg?style=flat&colorA=28a745&&colorB=4E4E4E)](https://github.com/swiftlang/swift-package-manager)\n[![Carthage compatible](https://img.shields.io/badge/Carthage-compatible-brightgreen.svg?style=flat&colorA=28a745&&colorB=4E4E4E)](https://github.com/Carthage/Carthage)\n[![CocoaPods Deprecated](https://img.shields.io/cocoapods/v/CryptoSwift.svg?style=flat&label=CocoaPods&colorA=red&&colorB=4E4E4E)](https://cocoapods.org/pods/CryptoSwift)\n\n# CryptoSwift\n\nCrypto related functions and helpers for [Swift](https://swift.org) implemented in Swift. ([#PureSwift](https://twitter.com/hashtag/pureswift))\n\n**Note**: The `main` branch follows the latest currently released **version of Swift**. If you need an earlier version for an older version of Swift, specify its version in your `Podfile` or use the code on the branch for that version. Older branches are unsupported. Check [versions](#swift-versions-support) for details.\n\n---\n\n[Requirements](#requirements) | [Features](#features) | [Contribution](#contribution) | [Installation](#installation) | [Swift versions](#swift-versions-support) | [How-to](#how-to) | [Author](#author) | [License](#license) | [Changelog](#changelog)\n\n### Support & Sponsors\n\nThe financial sustainability of the project is possible thanks to the ongoing contributions from our [GitHub Sponsors](https://github.com/sponsors/krzyzanowskim)\n\n### Premium Sponsors\n\n  [Emerge Tools](https://www.emergetools.com/) is a suite of revolutionary products designed to supercharge mobile apps and the teams that build them.\n\n  [<img alt=\"www.emergetools.com/\" width=\"200\" src=\"https://github-production-user-asset-6210df.s3.amazonaws.com/758033/256565082-a21f5ac1-ef39-4b56-a8d2-575adeb7fe55.png\" />](https://www.emergetools.com)\n\n## Requirements\nGood mood\n\n## Features\n\n- Easy to use\n- Convenient extensions for String and Data\n- Support for incremental updates (stream, ...)\n- iOS, Android, macOS, AppleTV, watchOS, Linux support\n\n#### Hash (Digest)\n  [MD5](https://tools.ietf.org/html/rfc1321)\n| [SHA1](https://tools.ietf.org/html/rfc3174)\n| [SHA2-224](https://tools.ietf.org/html/rfc6234)\n| [SHA2-256](https://tools.ietf.org/html/rfc6234)\n| [SHA2-384](https://tools.ietf.org/html/rfc6234)\n| [SHA2-512](https://tools.ietf.org/html/rfc6234)\n| [SHA3](https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf)\n\n#### Cyclic Redundancy Check (CRC)\n  [CRC32](https://en.wikipedia.org/wiki/Cyclic_redundancy_check)\n| [CRC32C](https://en.wikipedia.org/wiki/Cyclic_redundancy_check)\n| [CRC16](https://en.wikipedia.org/wiki/Cyclic_redundancy_check)\n\n#### Cipher\n  [AES-128, AES-192, AES-256](http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf)\n| [ChaCha20](http://cr.yp.to/chacha/chacha-20080128.pdf)\n| [XChaCha20](https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha)\n| [Rabbit](https://tools.ietf.org/html/rfc4503)\n| [Blowfish](https://www.schneier.com/academic/blowfish/)\n\n#### RSA (public-key encryption algorithm)\n  [Encryption, Signature](https://github.com/krzyzanowskim/CryptoSwift#rsa)\n\n#### Message authenticators\n  [Poly1305](https://cr.yp.to/mac/poly1305-20050329.pdf)\n| [HMAC (MD5, SHA1, SHA256)](https://www.ietf.org/rfc/rfc2104.txt)\n| [CMAC](https://tools.ietf.org/html/rfc4493)\n| [CBC-MAC](https://en.wikipedia.org/wiki/CBC-MAC)\n\n#### Cipher mode of operation\n- Electronic codebook ([ECB](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_codebook_.28ECB.29))\n- Cipher-block chaining ([CBC](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher-block_chaining_.28CBC.29))\n- Propagating Cipher Block Chaining ([PCBC](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Propagating_Cipher_Block_Chaining_.28PCBC.29))\n- Cipher feedback ([CFB](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Cipher_feedback_.28CFB.29))\n- Output Feedback ([OFB](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Output_Feedback_.28OFB.29))\n- Counter Mode ([CTR](https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Counter_.28CTR.29))\n- Galois/Counter Mode ([GCM](https://csrc.nist.gov/publications/detail/sp/800-38d/final))\n- Counter with Cipher Block Chaining-Message Authentication Code ([CCM](https://csrc.nist.gov/publications/detail/sp/800-38c/final))\n- OCB Authenticated-Encryption Algorithm ([OCB](https://tools.ietf.org/html/rfc7253))\n\n#### Password-Based Key Derivation Function\n- [PBKDF1](https://tools.ietf.org/html/rfc2898#section-5.1) (Password-Based Key Derivation Function 1)\n- [PBKDF2](https://tools.ietf.org/html/rfc2898#section-5.2) (Password-Based Key Derivation Function 2)\n- [HKDF](https://tools.ietf.org/html/rfc5869) (HMAC-based Extract-and-Expand Key Derivation Function)\n- [Scrypt](https://tools.ietf.org/html/rfc7914) (The scrypt Password-Based Key Derivation Function)\n\n#### Data padding\n- [PKCS#5](https://www.rfc-editor.org/rfc/rfc2898.html)\n- [EMSA-PKCS1-v1_5 (Encoding Method for Signature)](https://www.rfc-editor.org/rfc/rfc3447#section-9.2)\n- [EME-PCKS1-v1_5 (Encoding Method for Encryption)](https://www.rfc-editor.org/rfc/rfc3447)\n- [PKCS#7](https://tools.ietf.org/html/rfc5652#section-6.3)\n- [Zero padding](https://en.wikipedia.org/wiki/Padding_(cryptography)#Zero_padding)\n- [ISO78164](https://www.embedx.com/pdfs/ISO_STD_7816/info_isoiec7816-4%7Bed21.0%7Den.pdf)\n- [ISO10126](https://en.wikipedia.org/wiki/Padding_(cryptography)#ISO_10126)\n- No padding\n\n#### Authenticated Encryption with Associated Data (AEAD)\n- [AEAD\\_CHACHA20\\_POLY1305](https://tools.ietf.org/html/rfc7539#section-2.8)\n- [AEAD\\_XCHACHA20\\_POLY1305](https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha#section-2)\n\n## Why\n[Why?](https://github.com/krzyzanowskim/CryptoSwift/discussions/982) [Because I can](https://github.com/krzyzanowskim/CryptoSwift/discussions/982#discussioncomment-3669415).\n\n## How do I get involved?\n\nYou want to help, great! Go ahead and fork our repo, make your changes and send us a pull request.\n\n## Contribution\n\nCheck out [CONTRIBUTING.md](CONTRIBUTING.md) for more information on how to help with CryptoSwift.\n\n- If you found a bug, [open a discussion](https://github.com/krzyzanowskim/CryptoSwift/discussions).\n- If you have a feature request, [open a discussion](https://github.com/krzyzanowskim/CryptoSwift/discussions).\n\n## Installation\n\n### Hardened Runtime (macOS) and Xcode\n\nBinary CryptoSwift.xcframework (Used by Swift Package Manager package integration) won't load properly in your app if the app uses **Sign to Run Locally**  Signing Certificate with Hardened Runtime enabled. It is possible to setup Xcode like this. To solve the problem you have two options:\n- Use proper Signing Certificate, eg. *Development* <- this is the proper action\n- Use `Disable Library Validation` aka `com.apple.security.cs.disable-library-validation` entitlement\n\n#### Xcode Project\n\nTo install CryptoSwift, add it as a submodule to your project (on the top level project directory):\n\n    git submodule add https://github.com/krzyzanowskim/CryptoSwift.git\n\nIt is recommended to enable [Whole-Module Optimization](https://swift.org/blog/whole-module-optimizations/) to gain better performance. Non-optimized build results in significantly worse performance.\n\n#### Swift Package Manager\n\nYou can use [Swift Package Manager](https://swift.org/package-manager/) and specify dependency in `Package.swift` by adding this:\n\n```swift\n.package(url: \"https://github.com/krzyzanowskim/CryptoSwift.git\", from: \"1.9.0\")\n```\n\nSee: [Package.swift - manual](https://blog.krzyzanowskim.com/2016/08/09/package-swift-manual/)\n\nNotice: Swift Package Manager uses debug configuration for debug Xcode build, that may result in significant (up to x10000) worse performance. Performance characteristic is different in Release build. To overcome this problem, consider embed `CryptoSwift.xcframework` described below.\n\n#### Carthage\n\nYou can use [Carthage](https://github.com/Carthage/Carthage).\nSpecify in Cartfile:\n\n```ruby\ngithub \"krzyzanowskim/CryptoSwift\"\n```\n\nRun `carthage` to build the framework and drag the built CryptoSwift.framework into your Xcode project. Follow [build instructions](https://github.com/Carthage/Carthage#getting-started). [Common issues](https://github.com/krzyzanowskim/CryptoSwift/discussions/983#discussioncomment-3669433).\n\n#### CocoaPods\n\n> **Note**: CocoaPods is deprecated and no longer recommended for new projects. Use Swift Package Manager or Carthage instead.\n\nYou can use [CocoaPods](https://cocoapods.org/pods/CryptoSwift).\n\n```ruby\npod 'CryptoSwift', '~> 1.8.4'\n```\n\nBear in mind that CocoaPods will build CryptoSwift without [Whole-Module Optimization](https://swift.org/blog/whole-module-optimizations/) that may impact performance. You can change it manually after installation, or use [cocoapods-wholemodule](https://github.com/jedlewison/cocoapods-wholemodule) plugin.\n\n#### XCFramework\n\nXCFrameworks require Xcode 11 or later and they can be integrated similarly to how we’re used to integrating the `.framework` format.\nPlease use script [scripts/build-framework.sh](scripts/build-framework.sh) to generate binary `CryptoSwift.xcframework` archive that you can use as a dependency in Xcode.\n\nCryptoSwift.xcframework is a Release (Optimized) binary that offer best available Swift code performance.\n\n<img width=\"320\" alt=\"Screen Shot 2020-10-27 at 00 06 32\" src=\"https://user-images.githubusercontent.com/758033/97240586-f0878280-17ee-11eb-9119-e5a960417d04.png\">\n\n#### Embedded Framework\n\nEmbedded frameworks require a minimum deployment target of iOS 11.0 or macOS Sierra (10.13). Drag the `CryptoSwift.xcodeproj` file into your Xcode project, and add appropriate framework as a dependency to your target. Now select your App and choose the General tab for the app target. Find *Embedded Binaries* and press \"+\", then select `CryptoSwift.framework` (iOS, macOS, watchOS or tvOS)\n\n![](https://cloud.githubusercontent.com/assets/758033/10834511/25a26852-7e9a-11e5-8c01-6cc8f1838459.png)\n\nSometimes \"embedded framework\" option is not available. In that case, you have to add new build phase for the target.\n\n![](https://cloud.githubusercontent.com/assets/758033/18415615/d5edabb0-77f8-11e6-8c94-f41d9fc2b8cb.png)\n\n##### iOS, macOS, watchOS, tvOS\n\nIn the project, you'll find [single scheme](https://mxcl.dev/PromiseKit/news/2016/08/Multiplatform-Single-Scheme-Xcode-Projects/) for all platforms:\n- CryptoSwift\n\n#### Swift versions support\n\n- Swift 1.2: branch [swift12](https://github.com/krzyzanowskim/CryptoSwift/tree/swift12) version <= 0.0.13\n- Swift 2.1: branch [swift21](https://github.com/krzyzanowskim/CryptoSwift/tree/swift21) version <= 0.2.3\n- Swift 2.2, 2.3: branch [swift2](https://github.com/krzyzanowskim/CryptoSwift/tree/swift2) version <= 0.5.2\n- Swift 3.1, branch [swift3](https://github.com/krzyzanowskim/CryptoSwift/tree/swift3) version <= 0.6.9\n- Swift 3.2, branch [swift32](https://github.com/krzyzanowskim/CryptoSwift/tree/swift32) version = 0.7.0\n- Swift 4.0, branch [swift4](https://github.com/krzyzanowskim/CryptoSwift/tree/swift4) version <= 0.12.0\n- Swift 4.2, branch [swift42](https://github.com/krzyzanowskim/CryptoSwift/tree/swift42) version <= 0.15.0\n- Swift 5.0, branch [swift5](https://github.com/krzyzanowskim/CryptoSwift/tree/swift5) version <= 1.2.0\n- Swift 5.1, branch [swift51](https://github.com/krzyzanowskim/CryptoSwift/tree/swift51) version <= 1.3.3\n- Swift 5.3, branch [swift53](https://github.com/krzyzanowskim/CryptoSwift/tree/swift53) version <= 1.8.5\n- Swift 6.2 and newer, branch [main](https://github.com/krzyzanowskim/CryptoSwift/tree/main)\n\n## How-to\n\n* [Basics (data types, conversion, ...)](#basics)\n* [Digest (MD5, SHA...)](#calculate-digest)\n* [Message authenticators (HMAC, CMAC...)](#message-authenticators-1)\n* [Password-Based Key Derivation Function (PBKDF2, ...)](#password-based-key-derivation-functions)\n* [HMAC-based Key Derivation Function (HKDF)](#hmac-based-key-derivation-function)\n* [Data Padding](#data-padding)\n* [ChaCha20](#chacha20)\n* [Rabbit](#rabbit)\n* [Blowfish](#blowfish)\n* [AES - Advanced Encryption Standard](#aes)\n* [AES-GCM](#aes-gcm)\n* [Authenticated Encryption with Associated Data (AEAD)](#aead)\n\n##### Basics\n\n```swift\nimport CryptoSwift\n```\n\nCryptoSwift uses array of bytes aka `Array<UInt8>` as a base type for all operations. Every data may be converted to a stream of bytes. You will find convenience functions that accept `String` or `Data`, and it will be internally converted to the array of bytes.\n\n##### Data types conversion\n\nFor your convenience, **CryptoSwift** provides two functions to easily convert an array of bytes to `Data` or `Data` to an array of bytes:\n\nData from bytes:\n\n```swift\nlet data = Data([0x01, 0x02, 0x03])\n```\n\n`Data` to `Array<UInt8>`\n\n```swift\nlet bytes = data.byteArray                // [1,2,3]\n```\n\n[Hexadecimal](https://en.wikipedia.org/wiki/Hexadecimal) encoding:\n\n```swift\nlet bytes = Array<UInt8>(hex: \"0x010203\")  // [1,2,3]\nlet hex   = bytes.toHexString()            // \"010203\"\n```\n\nBuild bytes out of `String`\n```swift\nlet bytes: Array<UInt8> = \"cipherkey\".bytes  // Array(\"cipherkey\".utf8)\n```\n\nAlso... check out helpers that work with **Base64** encoded data:\n```swift\n\"aPf/i9th9iX+vf49eR7PYk2q7S5xmm3jkRLejgzHNJs=\".decryptBase64ToString(cipher)\n\"aPf/i9th9iX+vf49eR7PYk2q7S5xmm3jkRLejgzHNJs=\".decryptBase64(cipher)\nbytes.toBase64()\n```\n\n##### Calculate Digest\n\nHashing a data or array of bytes (aka `Array<UInt8>`)\n```swift\n/* Hash struct usage */\nlet bytes: Array<UInt8> = [0x01, 0x02, 0x03]\nlet digest = input.md5()\nlet digest = Digest.md5(bytes)\n```\n\n```swift\nlet data = Data([0x01, 0x02, 0x03])\n\nlet hash = data.md5()\nlet hash = data.sha1()\nlet hash = data.sha224()\nlet hash = data.sha256()\nlet hash = data.sha384()\nlet hash = data.sha512()\n```\n```swift\ndo {\n    var digest = MD5()\n    let partial1 = try digest.update(withBytes: [0x31, 0x32])\n    let partial2 = try digest.update(withBytes: [0x33])\n    let result = try digest.finish()\n} catch { }\n```\n\nHashing a String and printing result\n\n```swift\nlet hash = \"123\".md5() // \"123\".bytes.md5()\n```\n\n##### Calculate CRC\n\n```swift\nbytes.crc16()\ndata.crc16()\n\nbytes.crc32()\ndata.crc32()\n```\n\n##### Message authenticators\n\n```swift\n// Calculate Message Authentication Code (MAC) for message\nlet key: Array<UInt8> = [1,2,3,4,5,6,7,8,9,10,...]\n\ntry Poly1305(key: key).authenticate(bytes)\ntry HMAC(key: key, variant: .sha256).authenticate(bytes)\ntry CMAC(key: key).authenticate(bytes)\n```\n\n##### Password-Based Key Derivation Functions\n\n```swift\nlet password: Array<UInt8> = Array(\"s33krit\".utf8)\nlet salt: Array<UInt8> = Array(\"nacllcan\".utf8)\n\nlet key = try PKCS5.PBKDF2(password: password, salt: salt, iterations: 4096, keyLength: 32, variant: .sha2(.sha256)).calculate()\n```\n\n```swift\nlet password: Array<UInt8> = Array(\"s33krit\".utf8)\nlet salt: Array<UInt8> = Array(\"nacllcan\".utf8)\n// Scrypt implementation does not implement work parallelization, so `p` parameter will\n// increase the work time even in multicore systems\nlet key = try Scrypt(password: password, salt: salt, dkLen: 64, N: 16384, r: 8, p: 1).calculate()\n```\n\n##### HMAC-based Key Derivation Function\n\n```swift\nlet password: Array<UInt8> = Array(\"s33krit\".utf8)\nlet salt: Array<UInt8> = Array(\"nacllcan\".utf8)\n\nlet key = try HKDF(password: password, salt: salt, variant: .sha256).calculate()\n```\n\n\n##### Data Padding\n\nSome content-encryption algorithms assume the input length is a multiple of `k` octets, where `k` is greater than one. For such algorithms, the input shall be padded.\n\n```swift\nPadding.pkcs7.add(to: bytes, blockSize: AES.blockSize)\n```\n\n#### Working with Ciphers\n##### ChaCha20\n\n```swift\nlet encrypted = try ChaCha20(key: key, iv: iv).encrypt(message)\nlet decrypted = try ChaCha20(key: key, iv: iv).decrypt(encrypted)\n```\n\n##### Rabbit\n\n```swift\nlet encrypted = try Rabbit(key: key, iv: iv).encrypt(message)\nlet decrypted = try Rabbit(key: key, iv: iv).decrypt(encrypted)\n```\n##### Blowfish\n\n```swift\nlet encrypted = try Blowfish(key: key, blockMode: CBC(iv: iv), padding: .pkcs7).encrypt(message)\nlet decrypted = try Blowfish(key: key, blockMode: CBC(iv: iv), padding: .pkcs7).decrypt(encrypted)\n```\n\n##### AES\n\nNotice regarding padding: *Manual padding of data is optional, and CryptoSwift is using PKCS7 padding by default. If you need to manually disable/enable padding, you can do this by setting parameter for __AES__ class*\n\nVariant of AES encryption (AES-128, AES-192, AES-256) depends on given key length:\n\n- AES-128 = 16 bytes\n- AES-192 = 24 bytes\n- AES-256 = 32 bytes\n\nAES-256 example\n\n```swift\nlet encryptedBytes = try AES(key: [1,2,3,...,32], blockMode: CBC(iv: [1,2,3,...,16]), padding: .pkcs7)\n```\n\nFull example:\n\n```swift\nlet password: [UInt8] = Array(\"s33krit\".utf8)\nlet salt: [UInt8] = Array(\"nacllcan\".utf8)\n\n/* Generate a key from a `password`. Optional if you already have a key */\nlet key = try PKCS5.PBKDF2(\n    password: password,\n    salt: salt,\n    iterations: 4096,\n    keyLength: 32, /* AES-256 */\n    variant: .sha256\n).calculate()\n\n/* Generate random IV value. IV is public value. Either need to generate, or get it from elsewhere */\nlet iv = AES.randomIV(AES.blockSize)\n\n/* AES cryptor instance */\nlet aes = try AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7)\n\n/* Encrypt Data */\nlet inputData = Data()\nlet encryptedBytes = try aes.encrypt(inputData.byteArray)\nlet encryptedData = Data(encryptedBytes)\n\n/* Decrypt Data */\nlet decryptedBytes = try aes.decrypt(encryptedData.byteArray)\nlet decryptedData = Data(decryptedBytes)\n```\n\n###### All at once\n```swift\ndo {\n    let aes = try AES(key: \"keykeykeykeykeyk\", iv: \"drowssapdrowssap\") // aes128\n    let ciphertext = try aes.encrypt(Array(\"Nullam quis risus eget urna mollis ornare vel eu leo.\".utf8))\n} catch { }\n```\n\n###### Incremental updates\n\nIncremental operations use instance of Cryptor and encrypt/decrypt one part at a time, this way you can save on memory for large files.\n\n```swift\ndo {\n    var encryptor = try AES(key: \"keykeykeykeykeyk\", iv: \"drowssapdrowssap\").makeEncryptor()\n\n    var ciphertext = Array<UInt8>()\n    // aggregate partial results\n    ciphertext += try encryptor.update(withBytes: Array(\"Nullam quis risus \".utf8))\n    ciphertext += try encryptor.update(withBytes: Array(\"eget urna mollis \".utf8))\n    ciphertext += try encryptor.update(withBytes: Array(\"ornare vel eu leo.\".utf8))\n    // finish at the end\n    ciphertext += try encryptor.finish()\n\n    print(ciphertext.toHexString())\n} catch {\n    print(error)\n}\n```\n\n###### AES Advanced usage\n```swift\nlet input: Array<UInt8> = [0,1,2,3,4,5,6,7,8,9]\n\nlet key: Array<UInt8> = [0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00]\nlet iv: Array<UInt8> = // Random bytes of `AES.blockSize` length\n\ndo {\n    let encrypted = try AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7).encrypt(input)\n    let decrypted = try AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7).decrypt(encrypted)\n} catch {\n    print(error)\n}\n```\n\nAES without data padding\n\n```swift\nlet input: Array<UInt8> = [0,1,2,3,4,5,6,7,8,9]\nlet encrypted: Array<UInt8> = try! AES(key: Array(\"secret0key000000\".utf8), blockMode: CBC(iv: Array(\"0123456789012345\".utf8)), padding: .noPadding).encrypt(input)\n```\n\nUsing convenience extensions\n\n```swift\nlet plain = Data([0x01, 0x02, 0x03])\nlet encrypted = try! plain.encrypt(ChaCha20(key: key, iv: iv))\nlet decrypted = try! encrypted.decrypt(ChaCha20(key: key, iv: iv))\n```\n\n##### AES-GCM\n\nThe result of Galois/Counter Mode (GCM) encryption is ciphertext and **authentication tag**, that is later used to decryption.\n\nencryption\n\n```swift\ndo {\n    // In combined mode, the authentication tag is directly appended to the encrypted message. This is usually what you want.\n    let gcm = GCM(iv: iv, mode: .combined)\n    let aes = try AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try aes.encrypt(plaintext)\n    let tag = gcm.authenticationTag\n} catch {\n    // failed\n}\n```\n\ndecryption\n\n```swift\ndo {\n    // In combined mode, the authentication tag is appended to the encrypted message. This is usually what you want.\n    let gcm = GCM(iv: iv, mode: .combined)\n    let aes = try AES(key: key, blockMode: gcm, padding: .noPadding)\n    return try aes.decrypt(encrypted)\n} catch {\n    // failed\n}\n```\n\n**Note**: GCM instance is not intended to be reused. So you can't use the same `GCM` instance from encoding to also perform decoding.\n\n##### AES-CCM\n\nThe result of Counter with Cipher Block Chaining-Message Authentication Code encryption is ciphertext and **authentication tag**, that is later used to decryption.\n\n```swift\ndo {\n    // The authentication tag is appended to the encrypted message.\n\tlet tagLength = 8\n\tlet ccm = CCM(iv: iv, tagLength: tagLength, messageLength: ciphertext.count - tagLength, additionalAuthenticatedData: data)\n    let aes = try AES(key: key, blockMode: ccm, padding: .noPadding)\n    return try aes.decrypt(encrypted)\n} catch {\n    // failed\n}\n```\n\nCheck documentation or CCM specification for valid parameters for CCM.\n\n##### AEAD\n\n```swift\nlet encrypt = try AEADChaCha20Poly1305.encrypt(plaintext, key: key, iv: nonce, authenticationHeader: header)\nlet decrypt = try AEADChaCha20Poly1305.decrypt(ciphertext, key: key, iv: nonce, authenticationHeader: header, authenticationTag: tagArr: tag)\n```\n\n##### RSA\n\nRSA initialization from parameters\n\n```swift\nlet input: Array<UInt8> = [0,1,2,3,4,5,6,7,8,9]\n\nlet n: Array<UInt8> = // RSA modulus\nlet e: Array<UInt8> = // RSA public exponent\nlet d: Array<UInt8> = // RSA private exponent\n\nlet rsa = RSA(n: n, e: e, d: d)\n\ndo {\n    let encrypted = try rsa.encrypt(input)\n    let decrypted = try rsa.decrypt(encrypted)\n} catch {\n    print(error)\n}\n```\n\nRSA key generation\n\n```swift\nlet rsa = try RSA(keySize: 2048) // This generates a modulus, public exponent and private exponent with the given size\n```\n\nRSA Encryption & Decryption Example\n``` swift\n// Alice Generates a Private Key\nlet alicesPrivateKey = try RSA(keySize: 1024)\n    \n// Alice shares her **public** key with Bob\nlet alicesPublicKeyData = try alicesPrivateKey.publicKeyExternalRepresentation()\n    \n// Bob receives the raw external representation of Alices public key and imports it\nlet bobsImportOfAlicesPublicKey = try RSA(rawRepresentation: alicesPublicKeyData)\n    \n// Bob can now encrypt a message for Alice using her public key\nlet message = \"Hi Alice! This is Bob!\"\nlet privateMessage = try bobsImportOfAlicesPublicKey.encrypt(message.bytes)\n    \n// This results in some encrypted output like this\n// URcRwG6LfH63zOQf2w+HIllPri9Rb6hFlXbi/bh03zPl2MIIiSTjbAPqbVFmoF3RmDzFjIarIS7ZpT57a1F+OFOJjx50WYlng7dioKFS/rsuGHYnMn4csjCRF6TAqvRQcRnBueeINRRA8SLaLHX6sZuQkjIE5AoHJwgavmiv8PY=\n      \n// Bob can now send this encrypted message to Alice without worrying about people being able to read the original contents\n    \n// Alice receives the encrypted message and uses her private key to decrypt the data and recover the original message\nlet originalDecryptedMessage = try alicesPrivateKey.decrypt(privateMessage)\n    \nprint(String(data: Data(originalDecryptedMessage), encoding: .utf8))\n// \"Hi Alice! This is Bob!\"\n```\n\nRSA Signature & Verification Example\n``` swift\n// Alice Generates a Private Key\nlet alicesPrivateKey = try RSA(keySize: 1024)\n    \n// Alice wants to sign a message that she agrees with\nlet messageAliceSupports = \"Hi my name is Alice!\"\nlet alicesSignature = try alicesPrivateKey.sign(messageAliceSupports.bytes)\n    \n// Alice shares her Public key and the signature with Bob\nlet alicesPublicKeyData = try alicesPrivateKey.publicKeyExternalRepresentation()\n    \n// Bob receives the raw external representation of Alices Public key and imports it!\nlet bobsImportOfAlicesPublicKey = try RSA(rawRepresentation: alicesPublicKeyData)\n        \n// Bob can now verify that Alice signed the message using the Private key associated with her shared Public key.\nlet verifiedSignature = try bobsImportOfAlicesPublicKey.verify(signature: alicesSignature, for: \"Hi my name is Alice!\".bytes)\n    \nif verifiedSignature == true {\n  // Bob knows that the signature Alice provided is valid for the message and was signed using the Private key associated with Alices shared Public key.\n} else {\n  // The signature was invalid, so either\n  // - the message Alice signed was different then what we expected.\n  // - or Alice used a Private key that isn't associated with the shared Public key that Bob has.\n}\n```\n\nCryptoSwift RSA Key -> Apple's Security Framework SecKey Example\n``` swift\n/// Starting with a CryptoSwift RSA Key\nlet rsaKey = try RSA(keySize: 1024)\n\n/// Define your Keys attributes\nlet attributes: [String:Any] = [\n  kSecAttrKeyType as String: kSecAttrKeyTypeRSA,\n  kSecAttrKeyClass as String: kSecAttrKeyClassPrivate, // or kSecAttrKeyClassPublic\n  kSecAttrKeySizeInBits as String: 1024, // The appropriate bits\n  kSecAttrIsPermanent as String: false\n]\nvar error:Unmanaged<CFError>? = nil\nguard let rsaSecKey = try SecKeyCreateWithData(rsaKey.externalRepresentation() as CFData, attributes as CFDictionary, &error) else {\n  /// Error constructing SecKey from raw key data\n  return\n}\n\n/// You now have an RSA SecKey for use with Apple's Security framework\n```\n\nApple's Security Framework SecKey -> CryptoSwift RSA Key Example\n``` swift\n/// Starting with a SecKey RSA Key\nlet rsaSecKey:SecKey\n\n/// Copy External Representation\nvar externalRepError:Unmanaged<CFError>?\nguard let cfdata = SecKeyCopyExternalRepresentation(rsaSecKey, &externalRepError) else {\n  /// Failed to copy external representation for RSA SecKey\n  return\n}\n\n/// Instantiate the RSA Key from the raw external representation\nlet rsaKey = try RSA(rawRepresentation: cfdata as Data)\n\n/// You now have a CryptoSwift RSA Key\n```\n\n\n## Author\n\nCryptoSwift is owned and maintained by [Marcin Krzyżanowski](https://www.krzyzanowskim.com)\n\nYou can follow me on Twitter at [@krzyzanowskim](https://x.com/krzyzanowskim) for project updates and releases.\n\n# Cryptography Notice\n\nThis distribution includes cryptographic software. The country in which you currently reside may have restrictions on the import, possession, use, and/or re-export to another country, of encryption software. BEFORE using any encryption software, please check your country's laws, regulations and policies concerning the import, possession, or use, and re-export of encryption software, to see if this is permitted. See https://www.wassenaar.org/ for more information.\n\n## License\n\nCopyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\nThis software is provided 'as-is', without any express or implied warranty.\n\nIn no event will the authors be held liable for any damages arising from the use of this software.\n\nPermission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n\n- The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, **an acknowledgment in the product documentation is required**.\n- Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n- This notice may not be removed or altered from any source or binary distribution.\n- Redistributions of any form whatsoever must retain the following acknowledgment: 'This product includes software developed by the \"Marcin Krzyzanowski\" (https://krzyzanowskim.com/).'\n\n## Changelog\n\nSee [CHANGELOG](./CHANGELOG) file.\n"
  },
  {
    "path": "Sources/CryptoSwift/AEAD/AEAD.swift",
    "content": "//\n//  AEAD.swift\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n//\n\n// https://www.iana.org/assignments/aead-parameters/aead-parameters.xhtml\n\n/// Authenticated Encryption with Associated Data (AEAD)\npublic protocol AEAD {\n  static var kLen: Int { get } // key length\n  static var ivRange: Range<Int> { get } // nonce length\n}\n\nextension AEAD {\n  static func calculateAuthenticationTag(authenticator: Authenticator, cipherText: Array<UInt8>, authenticationHeader: Array<UInt8>) throws -> Array<UInt8> {\n    let headerPadding = ((16 - (authenticationHeader.count & 0xf)) & 0xf)\n    let cipherPadding = ((16 - (cipherText.count & 0xf)) & 0xf)\n\n    var mac = authenticationHeader\n    mac += Array<UInt8>(repeating: 0, count: headerPadding)\n    mac += cipherText\n    mac += Array<UInt8>(repeating: 0, count: cipherPadding)\n    mac += UInt64(bigEndian: UInt64(authenticationHeader.count)).bytes()\n    mac += UInt64(bigEndian: UInt64(cipherText.count)).bytes()\n\n    return try authenticator.authenticate(mac)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/AEAD/AEADChaCha20Poly1305.swift",
    "content": "//\n//  AEADChaCha20Poly1305.swift\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n//\n//  https://tools.ietf.org/html/rfc7539#section-2.8.1\n\n/// AEAD_CHACHA20_POLY1305\npublic final class AEADChaCha20Poly1305: AEAD {\n  public static let kLen = 32 // key length\n  public static var ivRange = Range<Int>(12...12)\n\n  /// Authenticated encryption\n  public static func encrypt(_ plainText: Array<UInt8>, key: Array<UInt8>, iv: Array<UInt8>, authenticationHeader: Array<UInt8>) throws -> (cipherText: Array<UInt8>, authenticationTag: Array<UInt8>) {\n    let cipher = try ChaCha20(key: key, iv: iv)\n    return try self.encrypt(cipher: cipher, plainText, key: key, iv: iv, authenticationHeader: authenticationHeader)\n  }\n\n  public static func encrypt(cipher: Cipher, _ plainText: Array<UInt8>, key: Array<UInt8>, iv: Array<UInt8>, authenticationHeader: Array<UInt8>) throws -> (cipherText: Array<UInt8>, authenticationTag: Array<UInt8>) {\n    var polykey = Array<UInt8>(repeating: 0, count: kLen)\n    var toEncrypt = polykey\n    polykey = try cipher.encrypt(polykey)\n    toEncrypt += polykey\n    toEncrypt += plainText\n\n    let fullCipherText = try cipher.encrypt(toEncrypt)\n    let cipherText = Array(fullCipherText.dropFirst(64))\n\n    let tag = try calculateAuthenticationTag(authenticator: Poly1305(key: polykey), cipherText: cipherText, authenticationHeader: authenticationHeader)\n    return (cipherText, tag)\n  }\n\n  /// Authenticated decryption\n  public static func decrypt(_ cipherText: Array<UInt8>, key: Array<UInt8>, iv: Array<UInt8>, authenticationHeader: Array<UInt8>, authenticationTag: Array<UInt8>) throws -> (plainText: Array<UInt8>, success: Bool) {\n    let cipher = try ChaCha20(key: key, iv: iv)\n    return try self.decrypt(cipher: cipher, cipherText: cipherText, key: key, iv: iv, authenticationHeader: authenticationHeader, authenticationTag: authenticationTag)\n  }\n\n  static func decrypt(cipher: Cipher, cipherText: Array<UInt8>, key: Array<UInt8>, iv: Array<UInt8>, authenticationHeader: Array<UInt8>, authenticationTag: Array<UInt8>) throws -> (plainText: Array<UInt8>, success: Bool) {\n\n    let polykey = try cipher.encrypt(Array<UInt8>(repeating: 0, count: self.kLen))\n    let mac = try calculateAuthenticationTag(authenticator: Poly1305(key: polykey), cipherText: cipherText, authenticationHeader: authenticationHeader)\n    guard mac == authenticationTag else {\n      return (cipherText, false)\n    }\n\n    var toDecrypt = Array<UInt8>(reserveCapacity: cipherText.count + 64)\n    toDecrypt += polykey\n    toDecrypt += polykey\n    toDecrypt += cipherText\n    let fullPlainText = try cipher.decrypt(toDecrypt)\n    let plainText = Array(fullPlainText.dropFirst(64))\n    return (plainText, true)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/AEAD/AEADXChaCha20Poly1305.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\n/// This class implements the XChaCha20-Poly1305 Authenticated Encryption with\n/// Associated Data (AEAD_XCHACHA20_POLY1305) construction, providing both encryption and authentication.\n///\n/// For more information about the XChaCha20-Poly1305 algorithm, refer to the IETF draft: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha\npublic final class AEADXChaCha20Poly1305: AEAD {\n\n  /// The key length (in bytes) required for the XChaCha20 cipher (32 bytes).\n  public static let kLen = 32 // key length\n\n  /// The valid range of initialization vector lengths for the XChaCha20 cipher (12 bytes).\n  public static var ivRange = Range<Int>(12...12)\n\n  /// Encrypts the given plaintext using the XChaCha20 cipher and generates an authentication\n  /// tag using the Poly1305 MAC.\n  ///\n  /// - Parameters:\n  ///   - plainText: The plaintext to be encrypted.\n  ///   - key: The encryption key.\n  ///   - iv: The initialization vector.\n  ///   - authenticationHeader: The authentication header.\n  /// - Returns: A tuple containing the ciphertext and authentication tag.\n  /// - Throws: An error if encryption fails.\n  public static func encrypt(\n    _ plainText: Array<UInt8>,\n    key: Array<UInt8>,\n    iv: Array<UInt8>,\n    authenticationHeader: Array<UInt8>\n  ) throws -> (cipherText: Array<UInt8>, authenticationTag: Array<UInt8>) {\n    try AEADChaCha20Poly1305.encrypt(\n      cipher: XChaCha20(key: key, iv: iv),\n      plainText,\n      key: key,\n      iv: iv,\n      authenticationHeader: authenticationHeader\n    )\n  }\n\n  /// Decrypts the given ciphertext using the XChaCha20 cipher and verifies the authentication\n  /// tag using the Poly1305 MAC.\n  ///\n  /// - Parameters:\n  ///   - cipherText: The ciphertext to be decrypted.\n  ///   - key: The decryption key.\n  ///   - iv: The initialization vector.\n  ///   - authenticationHeader: The authentication header.\n  ///   - authenticationTag: The authentication tag.\n  /// - Returns: A tuple containing the decrypted plaintext and a boolean value indicating\n  ///   the success of the decryption and authentication process.\n  /// - Throws: An error if decryption fails.\n  public static func decrypt(\n    _ cipherText: Array<UInt8>,\n    key: Array<UInt8>,\n    iv: Array<UInt8>,\n    authenticationHeader: Array<UInt8>,\n    authenticationTag: Array<UInt8>\n  ) throws -> (plainText: Array<UInt8>, success: Bool) {\n    try AEADChaCha20Poly1305.decrypt(\n      cipher: XChaCha20(key: key, iv: iv),\n      cipherText: cipherText,\n      key: key,\n      iv: iv,\n      authenticationHeader: authenticationHeader,\n      authenticationTag: authenticationTag\n    )\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/AES.Cryptors.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// MARK: Cryptors\n\nextension AES: Cryptors {\n  @inlinable\n  public func makeEncryptor() throws -> Cryptor & Updatable {\n    let blockSize = blockMode.customBlockSize ?? AES.blockSize\n    let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: encrypt, encryptionOperation: encrypt)\n    if worker is StreamModeWorker {\n      return try StreamEncryptor(blockSize: blockSize, padding: padding, worker)\n    }\n    return try BlockEncryptor(blockSize: blockSize, padding: padding, worker)\n  }\n\n  @inlinable\n  public func makeDecryptor() throws -> Cryptor & Updatable {\n    let blockSize = blockMode.customBlockSize ?? AES.blockSize\n    let cipherOperation: CipherOperationOnBlock = blockMode.options.contains(.useEncryptToDecrypt) == true ? encrypt : decrypt\n    let worker = try blockMode.worker(blockSize: blockSize, cipherOperation: cipherOperation, encryptionOperation: encrypt)\n    if worker is StreamModeWorker {\n      return try StreamDecryptor(blockSize: blockSize, padding: padding, worker)\n    }\n    return try BlockDecryptor(blockSize: blockSize, padding: padding, worker)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/AES.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  Implementation of Gladman algorithm http://www.gladman.me.uk/AES\n//\n\n/// The Advanced Encryption Standard (AES)\npublic final class AES: BlockCipher {\n  public enum Error: Swift.Error {\n    /// Invalid key\n    case invalidKeySize\n    /// Data padding is required\n    case dataPaddingRequired\n    /// Invalid Data\n    case invalidData\n  }\n\n  public enum Variant: Int {\n    case aes128 = 1, aes192, aes256\n\n    var Nk: Int { // Nk words\n      [4, 6, 8][self.rawValue - 1]\n    }\n\n    var Nb: Int { // Nb words\n      4\n    }\n\n    var Nr: Int { // Nr\n      self.Nk + 6\n    }\n  }\n\n  @usableFromInline\n  internal let variantNr: Int\n\n  @usableFromInline\n  internal let variantNb: Int\n\n  @usableFromInline\n  internal let variantNk: Int\n\n  public static let blockSize: Int = 16 // 128 /8\n  public let keySize: Int\n\n  /// AES Variant\n  public let variant: Variant\n\n  // Parameters\n  let key: Key\n\n  @usableFromInline\n  let blockMode: BlockMode\n\n  @usableFromInline\n  let padding: Padding\n\n  //\n  @usableFromInline\n  internal lazy var expandedKey: Array<Array<UInt32>> = self.expandKey(self.key, variant: self.variant)\n\n  @usableFromInline\n  internal lazy var expandedKeyInv: Array<Array<UInt32>> = self.expandKeyInv(self.key, variant: self.variant)\n\n  private lazy var sBoxes: (sBox: Array<UInt32>, invSBox: Array<UInt32>) = self.calculateSBox()\n  private lazy var sBox: Array<UInt32> = self.sBoxes.sBox\n  private lazy var sBoxInv: Array<UInt32> = self.sBoxes.invSBox\n\n  // Parameters for Linear Congruence Generators\n  private static let Rcon: Array<UInt8> = [\n    0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a,\n    0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91, 0x39,\n    0x72, 0xe4, 0xd3, 0xbd, 0x61, 0xc2, 0x9f, 0x25, 0x4a, 0x94, 0x33, 0x66, 0xcc, 0x83, 0x1d, 0x3a,\n    0x74, 0xe8, 0xcb, 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8,\n    0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef,\n    0xc5, 0x91, 0x39, 0x72, 0xe4, 0xd3, 0xbd, 0x61, 0xc2, 0x9f, 0x25, 0x4a, 0x94, 0x33, 0x66, 0xcc,\n    0x83, 0x1d, 0x3a, 0x74, 0xe8, 0xcb, 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20, 0x40, 0x80, 0x1b,\n    0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3,\n    0x7d, 0xfa, 0xef, 0xc5, 0x91, 0x39, 0x72, 0xe4, 0xd3, 0xbd, 0x61, 0xc2, 0x9f, 0x25, 0x4a, 0x94,\n    0x33, 0x66, 0xcc, 0x83, 0x1d, 0x3a, 0x74, 0xe8, 0xcb, 0x8d, 0x01, 0x02, 0x04, 0x08, 0x10, 0x20,\n    0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc, 0x63, 0xc6, 0x97, 0x35,\n    0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91, 0x39, 0x72, 0xe4, 0xd3, 0xbd, 0x61, 0xc2, 0x9f,\n    0x25, 0x4a, 0x94, 0x33, 0x66, 0xcc, 0x83, 0x1d, 0x3a, 0x74, 0xe8, 0xcb, 0x8d, 0x01, 0x02, 0x04,\n    0x08, 0x10, 0x20, 0x40, 0x80, 0x1b, 0x36, 0x6c, 0xd8, 0xab, 0x4d, 0x9a, 0x2f, 0x5e, 0xbc, 0x63,\n    0xc6, 0x97, 0x35, 0x6a, 0xd4, 0xb3, 0x7d, 0xfa, 0xef, 0xc5, 0x91, 0x39, 0x72, 0xe4, 0xd3, 0xbd,\n    0x61, 0xc2, 0x9f, 0x25, 0x4a, 0x94, 0x33, 0x66, 0xcc, 0x83, 0x1d, 0x3a, 0x74, 0xe8, 0xcb, 0x8d\n  ]\n\n  @usableFromInline static let T0: Array<UInt32> = [0xa56363c6, 0x847c7cf8, 0x997777ee, 0x8d7b7bf6, 0xdf2f2ff, 0xbd6b6bd6, 0xb16f6fde, 0x54c5c591, 0x50303060, 0x3010102, 0xa96767ce, 0x7d2b2b56, 0x19fefee7, 0x62d7d7b5, 0xe6abab4d, 0x9a7676ec, 0x45caca8f, 0x9d82821f, 0x40c9c989, 0x877d7dfa, 0x15fafaef, 0xeb5959b2, 0xc947478e, 0xbf0f0fb, 0xecadad41, 0x67d4d4b3, 0xfda2a25f, 0xeaafaf45, 0xbf9c9c23, 0xf7a4a453, 0x967272e4, 0x5bc0c09b, 0xc2b7b775, 0x1cfdfde1, 0xae93933d, 0x6a26264c, 0x5a36366c, 0x413f3f7e, 0x2f7f7f5, 0x4fcccc83, 0x5c343468, 0xf4a5a551, 0x34e5e5d1, 0x8f1f1f9, 0x937171e2, 0x73d8d8ab, 0x53313162, 0x3f15152a, 0xc040408, 0x52c7c795, 0x65232346, 0x5ec3c39d, 0x28181830, 0xa1969637, 0xf05050a, 0xb59a9a2f, 0x907070e, 0x36121224, 0x9b80801b, 0x3de2e2df, 0x26ebebcd, 0x6927274e, 0xcdb2b27f, 0x9f7575ea, 0x1b090912, 0x9e83831d, 0x742c2c58, 0x2e1a1a34, 0x2d1b1b36, 0xb26e6edc, 0xee5a5ab4, 0xfba0a05b, 0xf65252a4, 0x4d3b3b76, 0x61d6d6b7, 0xceb3b37d, 0x7b292952, 0x3ee3e3dd, 0x712f2f5e, 0x97848413, 0xf55353a6, 0x68d1d1b9, 0x0, 0x2cededc1, 0x60202040, 0x1ffcfce3, 0xc8b1b179, 0xed5b5bb6, 0xbe6a6ad4, 0x46cbcb8d, 0xd9bebe67, 0x4b393972, 0xde4a4a94, 0xd44c4c98, 0xe85858b0, 0x4acfcf85, 0x6bd0d0bb, 0x2aefefc5, 0xe5aaaa4f, 0x16fbfbed, 0xc5434386, 0xd74d4d9a, 0x55333366, 0x94858511, 0xcf45458a, 0x10f9f9e9, 0x6020204, 0x817f7ffe, 0xf05050a0, 0x443c3c78, 0xba9f9f25, 0xe3a8a84b, 0xf35151a2, 0xfea3a35d, 0xc0404080, 0x8a8f8f05, 0xad92923f, 0xbc9d9d21, 0x48383870, 0x4f5f5f1, 0xdfbcbc63, 0xc1b6b677, 0x75dadaaf, 0x63212142, 0x30101020, 0x1affffe5, 0xef3f3fd, 0x6dd2d2bf, 0x4ccdcd81, 0x140c0c18, 0x35131326, 0x2fececc3, 0xe15f5fbe, 0xa2979735, 0xcc444488, 0x3917172e, 0x57c4c493, 0xf2a7a755, 0x827e7efc, 0x473d3d7a, 0xac6464c8, 0xe75d5dba, 0x2b191932, 0x957373e6, 0xa06060c0, 0x98818119, 0xd14f4f9e, 0x7fdcdca3, 0x66222244, 0x7e2a2a54, 0xab90903b, 0x8388880b, 0xca46468c, 0x29eeeec7, 0xd3b8b86b, 0x3c141428, 0x79dedea7, 0xe25e5ebc, 0x1d0b0b16, 0x76dbdbad, 0x3be0e0db, 0x56323264, 0x4e3a3a74, 0x1e0a0a14, 0xdb494992, 0xa06060c, 0x6c242448, 0xe45c5cb8, 0x5dc2c29f, 0x6ed3d3bd, 0xefacac43, 0xa66262c4, 0xa8919139, 0xa4959531, 0x37e4e4d3, 0x8b7979f2, 0x32e7e7d5, 0x43c8c88b, 0x5937376e, 0xb76d6dda, 0x8c8d8d01, 0x64d5d5b1, 0xd24e4e9c, 0xe0a9a949, 0xb46c6cd8, 0xfa5656ac, 0x7f4f4f3, 0x25eaeacf, 0xaf6565ca, 0x8e7a7af4, 0xe9aeae47, 0x18080810, 0xd5baba6f, 0x887878f0, 0x6f25254a, 0x722e2e5c, 0x241c1c38, 0xf1a6a657, 0xc7b4b473, 0x51c6c697, 0x23e8e8cb, 0x7cdddda1, 0x9c7474e8, 0x211f1f3e, 0xdd4b4b96, 0xdcbdbd61, 0x868b8b0d, 0x858a8a0f, 0x907070e0, 0x423e3e7c, 0xc4b5b571, 0xaa6666cc, 0xd8484890, 0x5030306, 0x1f6f6f7, 0x120e0e1c, 0xa36161c2, 0x5f35356a, 0xf95757ae, 0xd0b9b969, 0x91868617, 0x58c1c199, 0x271d1d3a, 0xb99e9e27, 0x38e1e1d9, 0x13f8f8eb, 0xb398982b, 0x33111122, 0xbb6969d2, 0x70d9d9a9, 0x898e8e07, 0xa7949433, 0xb69b9b2d, 0x221e1e3c, 0x92878715, 0x20e9e9c9, 0x49cece87, 0xff5555aa, 0x78282850, 0x7adfdfa5, 0x8f8c8c03, 0xf8a1a159, 0x80898909, 0x170d0d1a, 0xdabfbf65, 0x31e6e6d7, 0xc6424284, 0xb86868d0, 0xc3414182, 0xb0999929, 0x772d2d5a, 0x110f0f1e, 0xcbb0b07b, 0xfc5454a8, 0xd6bbbb6d, 0x3a16162c]\n  @usableFromInline static let T0_INV: Array<UInt32> = [0x50a7f451, 0x5365417e, 0xc3a4171a, 0x965e273a, 0xcb6bab3b, 0xf1459d1f, 0xab58faac, 0x9303e34b, 0x55fa3020, 0xf66d76ad, 0x9176cc88, 0x254c02f5, 0xfcd7e54f, 0xd7cb2ac5, 0x80443526, 0x8fa362b5, 0x495ab1de, 0x671bba25, 0x980eea45, 0xe1c0fe5d, 0x2752fc3, 0x12f04c81, 0xa397468d, 0xc6f9d36b, 0xe75f8f03, 0x959c9215, 0xeb7a6dbf, 0xda595295, 0x2d83bed4, 0xd3217458, 0x2969e049, 0x44c8c98e, 0x6a89c275, 0x78798ef4, 0x6b3e5899, 0xdd71b927, 0xb64fe1be, 0x17ad88f0, 0x66ac20c9, 0xb43ace7d, 0x184adf63, 0x82311ae5, 0x60335197, 0x457f5362, 0xe07764b1, 0x84ae6bbb, 0x1ca081fe, 0x942b08f9, 0x58684870, 0x19fd458f, 0x876cde94, 0xb7f87b52, 0x23d373ab, 0xe2024b72, 0x578f1fe3, 0x2aab5566, 0x728ebb2, 0x3c2b52f, 0x9a7bc586, 0xa50837d3, 0xf2872830, 0xb2a5bf23, 0xba6a0302, 0x5c8216ed, 0x2b1ccf8a, 0x92b479a7, 0xf0f207f3, 0xa1e2694e, 0xcdf4da65, 0xd5be0506, 0x1f6234d1, 0x8afea6c4, 0x9d532e34, 0xa055f3a2, 0x32e18a05, 0x75ebf6a4, 0x39ec830b, 0xaaef6040, 0x69f715e, 0x51106ebd, 0xf98a213e, 0x3d06dd96, 0xae053edd, 0x46bde64d, 0xb58d5491, 0x55dc471, 0x6fd40604, 0xff155060, 0x24fb9819, 0x97e9bdd6, 0xcc434089, 0x779ed967, 0xbd42e8b0, 0x888b8907, 0x385b19e7, 0xdbeec879, 0x470a7ca1, 0xe90f427c, 0xc91e84f8, 0x0, 0x83868009, 0x48ed2b32, 0xac70111e, 0x4e725a6c, 0xfbff0efd, 0x5638850f, 0x1ed5ae3d, 0x27392d36, 0x64d90f0a, 0x21a65c68, 0xd1545b9b, 0x3a2e3624, 0xb1670a0c, 0xfe75793, 0xd296eeb4, 0x9e919b1b, 0x4fc5c080, 0xa220dc61, 0x694b775a, 0x161a121c, 0xaba93e2, 0xe52aa0c0, 0x43e0223c, 0x1d171b12, 0xb0d090e, 0xadc78bf2, 0xb9a8b62d, 0xc8a91e14, 0x8519f157, 0x4c0775af, 0xbbdd99ee, 0xfd607fa3, 0x9f2601f7, 0xbcf5725c, 0xc53b6644, 0x347efb5b, 0x7629438b, 0xdcc623cb, 0x68fcedb6, 0x63f1e4b8, 0xcadc31d7, 0x10856342, 0x40229713, 0x2011c684, 0x7d244a85, 0xf83dbbd2, 0x1132f9ae, 0x6da129c7, 0x4b2f9e1d, 0xf330b2dc, 0xec52860d, 0xd0e3c177, 0x6c16b32b, 0x99b970a9, 0xfa489411, 0x2264e947, 0xc48cfca8, 0x1a3ff0a0, 0xd82c7d56, 0xef903322, 0xc74e4987, 0xc1d138d9, 0xfea2ca8c, 0x360bd498, 0xcf81f5a6, 0x28de7aa5, 0x268eb7da, 0xa4bfad3f, 0xe49d3a2c, 0xd927850, 0x9bcc5f6a, 0x62467e54, 0xc2138df6, 0xe8b8d890, 0x5ef7392e, 0xf5afc382, 0xbe805d9f, 0x7c93d069, 0xa92dd56f, 0xb31225cf, 0x3b99acc8, 0xa77d1810, 0x6e639ce8, 0x7bbb3bdb, 0x97826cd, 0xf418596e, 0x1b79aec, 0xa89a4f83, 0x656e95e6, 0x7ee6ffaa, 0x8cfbc21, 0xe6e815ef, 0xd99be7ba, 0xce366f4a, 0xd4099fea, 0xd67cb029, 0xafb2a431, 0x31233f2a, 0x3094a5c6, 0xc066a235, 0x37bc4e74, 0xa6ca82fc, 0xb0d090e0, 0x15d8a733, 0x4a9804f1, 0xf7daec41, 0xe50cd7f, 0x2ff69117, 0x8dd64d76, 0x4db0ef43, 0x544daacc, 0xdf0496e4, 0xe3b5d19e, 0x1b886a4c, 0xb81f2cc1, 0x7f516546, 0x4ea5e9d, 0x5d358c01, 0x737487fa, 0x2e410bfb, 0x5a1d67b3, 0x52d2db92, 0x335610e9, 0x1347d66d, 0x8c61d79a, 0x7a0ca137, 0x8e14f859, 0x893c13eb, 0xee27a9ce, 0x35c961b7, 0xede51ce1, 0x3cb1477a, 0x59dfd29c, 0x3f73f255, 0x79ce1418, 0xbf37c773, 0xeacdf753, 0x5baafd5f, 0x146f3ddf, 0x86db4478, 0x81f3afca, 0x3ec468b9, 0x2c342438, 0x5f40a3c2, 0x72c31d16, 0xc25e2bc, 0x8b493c28, 0x41950dff, 0x7101a839, 0xdeb30c08, 0x9ce4b4d8, 0x90c15664, 0x6184cb7b, 0x70b632d5, 0x745c6c48, 0x4257b8d0]\n  @usableFromInline static let T1: Array<UInt32> = [0x6363c6a5, 0x7c7cf884, 0x7777ee99, 0x7b7bf68d, 0xf2f2ff0d, 0x6b6bd6bd, 0x6f6fdeb1, 0xc5c59154, 0x30306050, 0x1010203, 0x6767cea9, 0x2b2b567d, 0xfefee719, 0xd7d7b562, 0xabab4de6, 0x7676ec9a, 0xcaca8f45, 0x82821f9d, 0xc9c98940, 0x7d7dfa87, 0xfafaef15, 0x5959b2eb, 0x47478ec9, 0xf0f0fb0b, 0xadad41ec, 0xd4d4b367, 0xa2a25ffd, 0xafaf45ea, 0x9c9c23bf, 0xa4a453f7, 0x7272e496, 0xc0c09b5b, 0xb7b775c2, 0xfdfde11c, 0x93933dae, 0x26264c6a, 0x36366c5a, 0x3f3f7e41, 0xf7f7f502, 0xcccc834f, 0x3434685c, 0xa5a551f4, 0xe5e5d134, 0xf1f1f908, 0x7171e293, 0xd8d8ab73, 0x31316253, 0x15152a3f, 0x404080c, 0xc7c79552, 0x23234665, 0xc3c39d5e, 0x18183028, 0x969637a1, 0x5050a0f, 0x9a9a2fb5, 0x7070e09, 0x12122436, 0x80801b9b, 0xe2e2df3d, 0xebebcd26, 0x27274e69, 0xb2b27fcd, 0x7575ea9f, 0x909121b, 0x83831d9e, 0x2c2c5874, 0x1a1a342e, 0x1b1b362d, 0x6e6edcb2, 0x5a5ab4ee, 0xa0a05bfb, 0x5252a4f6, 0x3b3b764d, 0xd6d6b761, 0xb3b37dce, 0x2929527b, 0xe3e3dd3e, 0x2f2f5e71, 0x84841397, 0x5353a6f5, 0xd1d1b968, 0x0, 0xededc12c, 0x20204060, 0xfcfce31f, 0xb1b179c8, 0x5b5bb6ed, 0x6a6ad4be, 0xcbcb8d46, 0xbebe67d9, 0x3939724b, 0x4a4a94de, 0x4c4c98d4, 0x5858b0e8, 0xcfcf854a, 0xd0d0bb6b, 0xefefc52a, 0xaaaa4fe5, 0xfbfbed16, 0x434386c5, 0x4d4d9ad7, 0x33336655, 0x85851194, 0x45458acf, 0xf9f9e910, 0x2020406, 0x7f7ffe81, 0x5050a0f0, 0x3c3c7844, 0x9f9f25ba, 0xa8a84be3, 0x5151a2f3, 0xa3a35dfe, 0x404080c0, 0x8f8f058a, 0x92923fad, 0x9d9d21bc, 0x38387048, 0xf5f5f104, 0xbcbc63df, 0xb6b677c1, 0xdadaaf75, 0x21214263, 0x10102030, 0xffffe51a, 0xf3f3fd0e, 0xd2d2bf6d, 0xcdcd814c, 0xc0c1814, 0x13132635, 0xececc32f, 0x5f5fbee1, 0x979735a2, 0x444488cc, 0x17172e39, 0xc4c49357, 0xa7a755f2, 0x7e7efc82, 0x3d3d7a47, 0x6464c8ac, 0x5d5dbae7, 0x1919322b, 0x7373e695, 0x6060c0a0, 0x81811998, 0x4f4f9ed1, 0xdcdca37f, 0x22224466, 0x2a2a547e, 0x90903bab, 0x88880b83, 0x46468cca, 0xeeeec729, 0xb8b86bd3, 0x1414283c, 0xdedea779, 0x5e5ebce2, 0xb0b161d, 0xdbdbad76, 0xe0e0db3b, 0x32326456, 0x3a3a744e, 0xa0a141e, 0x494992db, 0x6060c0a, 0x2424486c, 0x5c5cb8e4, 0xc2c29f5d, 0xd3d3bd6e, 0xacac43ef, 0x6262c4a6, 0x919139a8, 0x959531a4, 0xe4e4d337, 0x7979f28b, 0xe7e7d532, 0xc8c88b43, 0x37376e59, 0x6d6ddab7, 0x8d8d018c, 0xd5d5b164, 0x4e4e9cd2, 0xa9a949e0, 0x6c6cd8b4, 0x5656acfa, 0xf4f4f307, 0xeaeacf25, 0x6565caaf, 0x7a7af48e, 0xaeae47e9, 0x8081018, 0xbaba6fd5, 0x7878f088, 0x25254a6f, 0x2e2e5c72, 0x1c1c3824, 0xa6a657f1, 0xb4b473c7, 0xc6c69751, 0xe8e8cb23, 0xdddda17c, 0x7474e89c, 0x1f1f3e21, 0x4b4b96dd, 0xbdbd61dc, 0x8b8b0d86, 0x8a8a0f85, 0x7070e090, 0x3e3e7c42, 0xb5b571c4, 0x6666ccaa, 0x484890d8, 0x3030605, 0xf6f6f701, 0xe0e1c12, 0x6161c2a3, 0x35356a5f, 0x5757aef9, 0xb9b969d0, 0x86861791, 0xc1c19958, 0x1d1d3a27, 0x9e9e27b9, 0xe1e1d938, 0xf8f8eb13, 0x98982bb3, 0x11112233, 0x6969d2bb, 0xd9d9a970, 0x8e8e0789, 0x949433a7, 0x9b9b2db6, 0x1e1e3c22, 0x87871592, 0xe9e9c920, 0xcece8749, 0x5555aaff, 0x28285078, 0xdfdfa57a, 0x8c8c038f, 0xa1a159f8, 0x89890980, 0xd0d1a17, 0xbfbf65da, 0xe6e6d731, 0x424284c6, 0x6868d0b8, 0x414182c3, 0x999929b0, 0x2d2d5a77, 0xf0f1e11, 0xb0b07bcb, 0x5454a8fc, 0xbbbb6dd6, 0x16162c3a]\n  @usableFromInline static let T1_INV: Array<UInt32> = [0xa7f45150, 0x65417e53, 0xa4171ac3, 0x5e273a96, 0x6bab3bcb, 0x459d1ff1, 0x58faacab, 0x3e34b93, 0xfa302055, 0x6d76adf6, 0x76cc8891, 0x4c02f525, 0xd7e54ffc, 0xcb2ac5d7, 0x44352680, 0xa362b58f, 0x5ab1de49, 0x1bba2567, 0xeea4598, 0xc0fe5de1, 0x752fc302, 0xf04c8112, 0x97468da3, 0xf9d36bc6, 0x5f8f03e7, 0x9c921595, 0x7a6dbfeb, 0x595295da, 0x83bed42d, 0x217458d3, 0x69e04929, 0xc8c98e44, 0x89c2756a, 0x798ef478, 0x3e58996b, 0x71b927dd, 0x4fe1beb6, 0xad88f017, 0xac20c966, 0x3ace7db4, 0x4adf6318, 0x311ae582, 0x33519760, 0x7f536245, 0x7764b1e0, 0xae6bbb84, 0xa081fe1c, 0x2b08f994, 0x68487058, 0xfd458f19, 0x6cde9487, 0xf87b52b7, 0xd373ab23, 0x24b72e2, 0x8f1fe357, 0xab55662a, 0x28ebb207, 0xc2b52f03, 0x7bc5869a, 0x837d3a5, 0x872830f2, 0xa5bf23b2, 0x6a0302ba, 0x8216ed5c, 0x1ccf8a2b, 0xb479a792, 0xf207f3f0, 0xe2694ea1, 0xf4da65cd, 0xbe0506d5, 0x6234d11f, 0xfea6c48a, 0x532e349d, 0x55f3a2a0, 0xe18a0532, 0xebf6a475, 0xec830b39, 0xef6040aa, 0x9f715e06, 0x106ebd51, 0x8a213ef9, 0x6dd963d, 0x53eddae, 0xbde64d46, 0x8d5491b5, 0x5dc47105, 0xd406046f, 0x155060ff, 0xfb981924, 0xe9bdd697, 0x434089cc, 0x9ed96777, 0x42e8b0bd, 0x8b890788, 0x5b19e738, 0xeec879db, 0xa7ca147, 0xf427ce9, 0x1e84f8c9, 0x0, 0x86800983, 0xed2b3248, 0x70111eac, 0x725a6c4e, 0xff0efdfb, 0x38850f56, 0xd5ae3d1e, 0x392d3627, 0xd90f0a64, 0xa65c6821, 0x545b9bd1, 0x2e36243a, 0x670a0cb1, 0xe757930f, 0x96eeb4d2, 0x919b1b9e, 0xc5c0804f, 0x20dc61a2, 0x4b775a69, 0x1a121c16, 0xba93e20a, 0x2aa0c0e5, 0xe0223c43, 0x171b121d, 0xd090e0b, 0xc78bf2ad, 0xa8b62db9, 0xa91e14c8, 0x19f15785, 0x775af4c, 0xdd99eebb, 0x607fa3fd, 0x2601f79f, 0xf5725cbc, 0x3b6644c5, 0x7efb5b34, 0x29438b76, 0xc623cbdc, 0xfcedb668, 0xf1e4b863, 0xdc31d7ca, 0x85634210, 0x22971340, 0x11c68420, 0x244a857d, 0x3dbbd2f8, 0x32f9ae11, 0xa129c76d, 0x2f9e1d4b, 0x30b2dcf3, 0x52860dec, 0xe3c177d0, 0x16b32b6c, 0xb970a999, 0x489411fa, 0x64e94722, 0x8cfca8c4, 0x3ff0a01a, 0x2c7d56d8, 0x903322ef, 0x4e4987c7, 0xd138d9c1, 0xa2ca8cfe, 0xbd49836, 0x81f5a6cf, 0xde7aa528, 0x8eb7da26, 0xbfad3fa4, 0x9d3a2ce4, 0x9278500d, 0xcc5f6a9b, 0x467e5462, 0x138df6c2, 0xb8d890e8, 0xf7392e5e, 0xafc382f5, 0x805d9fbe, 0x93d0697c, 0x2dd56fa9, 0x1225cfb3, 0x99acc83b, 0x7d1810a7, 0x639ce86e, 0xbb3bdb7b, 0x7826cd09, 0x18596ef4, 0xb79aec01, 0x9a4f83a8, 0x6e95e665, 0xe6ffaa7e, 0xcfbc2108, 0xe815efe6, 0x9be7bad9, 0x366f4ace, 0x99fead4, 0x7cb029d6, 0xb2a431af, 0x233f2a31, 0x94a5c630, 0x66a235c0, 0xbc4e7437, 0xca82fca6, 0xd090e0b0, 0xd8a73315, 0x9804f14a, 0xdaec41f7, 0x50cd7f0e, 0xf691172f, 0xd64d768d, 0xb0ef434d, 0x4daacc54, 0x496e4df, 0xb5d19ee3, 0x886a4c1b, 0x1f2cc1b8, 0x5165467f, 0xea5e9d04, 0x358c015d, 0x7487fa73, 0x410bfb2e, 0x1d67b35a, 0xd2db9252, 0x5610e933, 0x47d66d13, 0x61d79a8c, 0xca1377a, 0x14f8598e, 0x3c13eb89, 0x27a9ceee, 0xc961b735, 0xe51ce1ed, 0xb1477a3c, 0xdfd29c59, 0x73f2553f, 0xce141879, 0x37c773bf, 0xcdf753ea, 0xaafd5f5b, 0x6f3ddf14, 0xdb447886, 0xf3afca81, 0xc468b93e, 0x3424382c, 0x40a3c25f, 0xc31d1672, 0x25e2bc0c, 0x493c288b, 0x950dff41, 0x1a83971, 0xb30c08de, 0xe4b4d89c, 0xc1566490, 0x84cb7b61, 0xb632d570, 0x5c6c4874, 0x57b8d042]\n  @usableFromInline static let T2: Array<UInt32> = [0x63c6a563, 0x7cf8847c, 0x77ee9977, 0x7bf68d7b, 0xf2ff0df2, 0x6bd6bd6b, 0x6fdeb16f, 0xc59154c5, 0x30605030, 0x1020301, 0x67cea967, 0x2b567d2b, 0xfee719fe, 0xd7b562d7, 0xab4de6ab, 0x76ec9a76, 0xca8f45ca, 0x821f9d82, 0xc98940c9, 0x7dfa877d, 0xfaef15fa, 0x59b2eb59, 0x478ec947, 0xf0fb0bf0, 0xad41ecad, 0xd4b367d4, 0xa25ffda2, 0xaf45eaaf, 0x9c23bf9c, 0xa453f7a4, 0x72e49672, 0xc09b5bc0, 0xb775c2b7, 0xfde11cfd, 0x933dae93, 0x264c6a26, 0x366c5a36, 0x3f7e413f, 0xf7f502f7, 0xcc834fcc, 0x34685c34, 0xa551f4a5, 0xe5d134e5, 0xf1f908f1, 0x71e29371, 0xd8ab73d8, 0x31625331, 0x152a3f15, 0x4080c04, 0xc79552c7, 0x23466523, 0xc39d5ec3, 0x18302818, 0x9637a196, 0x50a0f05, 0x9a2fb59a, 0x70e0907, 0x12243612, 0x801b9b80, 0xe2df3de2, 0xebcd26eb, 0x274e6927, 0xb27fcdb2, 0x75ea9f75, 0x9121b09, 0x831d9e83, 0x2c58742c, 0x1a342e1a, 0x1b362d1b, 0x6edcb26e, 0x5ab4ee5a, 0xa05bfba0, 0x52a4f652, 0x3b764d3b, 0xd6b761d6, 0xb37dceb3, 0x29527b29, 0xe3dd3ee3, 0x2f5e712f, 0x84139784, 0x53a6f553, 0xd1b968d1, 0x0, 0xedc12ced, 0x20406020, 0xfce31ffc, 0xb179c8b1, 0x5bb6ed5b, 0x6ad4be6a, 0xcb8d46cb, 0xbe67d9be, 0x39724b39, 0x4a94de4a, 0x4c98d44c, 0x58b0e858, 0xcf854acf, 0xd0bb6bd0, 0xefc52aef, 0xaa4fe5aa, 0xfbed16fb, 0x4386c543, 0x4d9ad74d, 0x33665533, 0x85119485, 0x458acf45, 0xf9e910f9, 0x2040602, 0x7ffe817f, 0x50a0f050, 0x3c78443c, 0x9f25ba9f, 0xa84be3a8, 0x51a2f351, 0xa35dfea3, 0x4080c040, 0x8f058a8f, 0x923fad92, 0x9d21bc9d, 0x38704838, 0xf5f104f5, 0xbc63dfbc, 0xb677c1b6, 0xdaaf75da, 0x21426321, 0x10203010, 0xffe51aff, 0xf3fd0ef3, 0xd2bf6dd2, 0xcd814ccd, 0xc18140c, 0x13263513, 0xecc32fec, 0x5fbee15f, 0x9735a297, 0x4488cc44, 0x172e3917, 0xc49357c4, 0xa755f2a7, 0x7efc827e, 0x3d7a473d, 0x64c8ac64, 0x5dbae75d, 0x19322b19, 0x73e69573, 0x60c0a060, 0x81199881, 0x4f9ed14f, 0xdca37fdc, 0x22446622, 0x2a547e2a, 0x903bab90, 0x880b8388, 0x468cca46, 0xeec729ee, 0xb86bd3b8, 0x14283c14, 0xdea779de, 0x5ebce25e, 0xb161d0b, 0xdbad76db, 0xe0db3be0, 0x32645632, 0x3a744e3a, 0xa141e0a, 0x4992db49, 0x60c0a06, 0x24486c24, 0x5cb8e45c, 0xc29f5dc2, 0xd3bd6ed3, 0xac43efac, 0x62c4a662, 0x9139a891, 0x9531a495, 0xe4d337e4, 0x79f28b79, 0xe7d532e7, 0xc88b43c8, 0x376e5937, 0x6ddab76d, 0x8d018c8d, 0xd5b164d5, 0x4e9cd24e, 0xa949e0a9, 0x6cd8b46c, 0x56acfa56, 0xf4f307f4, 0xeacf25ea, 0x65caaf65, 0x7af48e7a, 0xae47e9ae, 0x8101808, 0xba6fd5ba, 0x78f08878, 0x254a6f25, 0x2e5c722e, 0x1c38241c, 0xa657f1a6, 0xb473c7b4, 0xc69751c6, 0xe8cb23e8, 0xdda17cdd, 0x74e89c74, 0x1f3e211f, 0x4b96dd4b, 0xbd61dcbd, 0x8b0d868b, 0x8a0f858a, 0x70e09070, 0x3e7c423e, 0xb571c4b5, 0x66ccaa66, 0x4890d848, 0x3060503, 0xf6f701f6, 0xe1c120e, 0x61c2a361, 0x356a5f35, 0x57aef957, 0xb969d0b9, 0x86179186, 0xc19958c1, 0x1d3a271d, 0x9e27b99e, 0xe1d938e1, 0xf8eb13f8, 0x982bb398, 0x11223311, 0x69d2bb69, 0xd9a970d9, 0x8e07898e, 0x9433a794, 0x9b2db69b, 0x1e3c221e, 0x87159287, 0xe9c920e9, 0xce8749ce, 0x55aaff55, 0x28507828, 0xdfa57adf, 0x8c038f8c, 0xa159f8a1, 0x89098089, 0xd1a170d, 0xbf65dabf, 0xe6d731e6, 0x4284c642, 0x68d0b868, 0x4182c341, 0x9929b099, 0x2d5a772d, 0xf1e110f, 0xb07bcbb0, 0x54a8fc54, 0xbb6dd6bb, 0x162c3a16]\n  @usableFromInline static let T2_INV: Array<UInt32> = [0xf45150a7, 0x417e5365, 0x171ac3a4, 0x273a965e, 0xab3bcb6b, 0x9d1ff145, 0xfaacab58, 0xe34b9303, 0x302055fa, 0x76adf66d, 0xcc889176, 0x2f5254c, 0xe54ffcd7, 0x2ac5d7cb, 0x35268044, 0x62b58fa3, 0xb1de495a, 0xba25671b, 0xea45980e, 0xfe5de1c0, 0x2fc30275, 0x4c8112f0, 0x468da397, 0xd36bc6f9, 0x8f03e75f, 0x9215959c, 0x6dbfeb7a, 0x5295da59, 0xbed42d83, 0x7458d321, 0xe0492969, 0xc98e44c8, 0xc2756a89, 0x8ef47879, 0x58996b3e, 0xb927dd71, 0xe1beb64f, 0x88f017ad, 0x20c966ac, 0xce7db43a, 0xdf63184a, 0x1ae58231, 0x51976033, 0x5362457f, 0x64b1e077, 0x6bbb84ae, 0x81fe1ca0, 0x8f9942b, 0x48705868, 0x458f19fd, 0xde94876c, 0x7b52b7f8, 0x73ab23d3, 0x4b72e202, 0x1fe3578f, 0x55662aab, 0xebb20728, 0xb52f03c2, 0xc5869a7b, 0x37d3a508, 0x2830f287, 0xbf23b2a5, 0x302ba6a, 0x16ed5c82, 0xcf8a2b1c, 0x79a792b4, 0x7f3f0f2, 0x694ea1e2, 0xda65cdf4, 0x506d5be, 0x34d11f62, 0xa6c48afe, 0x2e349d53, 0xf3a2a055, 0x8a0532e1, 0xf6a475eb, 0x830b39ec, 0x6040aaef, 0x715e069f, 0x6ebd5110, 0x213ef98a, 0xdd963d06, 0x3eddae05, 0xe64d46bd, 0x5491b58d, 0xc471055d, 0x6046fd4, 0x5060ff15, 0x981924fb, 0xbdd697e9, 0x4089cc43, 0xd967779e, 0xe8b0bd42, 0x8907888b, 0x19e7385b, 0xc879dbee, 0x7ca1470a, 0x427ce90f, 0x84f8c91e, 0x0, 0x80098386, 0x2b3248ed, 0x111eac70, 0x5a6c4e72, 0xefdfbff, 0x850f5638, 0xae3d1ed5, 0x2d362739, 0xf0a64d9, 0x5c6821a6, 0x5b9bd154, 0x36243a2e, 0xa0cb167, 0x57930fe7, 0xeeb4d296, 0x9b1b9e91, 0xc0804fc5, 0xdc61a220, 0x775a694b, 0x121c161a, 0x93e20aba, 0xa0c0e52a, 0x223c43e0, 0x1b121d17, 0x90e0b0d, 0x8bf2adc7, 0xb62db9a8, 0x1e14c8a9, 0xf1578519, 0x75af4c07, 0x99eebbdd, 0x7fa3fd60, 0x1f79f26, 0x725cbcf5, 0x6644c53b, 0xfb5b347e, 0x438b7629, 0x23cbdcc6, 0xedb668fc, 0xe4b863f1, 0x31d7cadc, 0x63421085, 0x97134022, 0xc6842011, 0x4a857d24, 0xbbd2f83d, 0xf9ae1132, 0x29c76da1, 0x9e1d4b2f, 0xb2dcf330, 0x860dec52, 0xc177d0e3, 0xb32b6c16, 0x70a999b9, 0x9411fa48, 0xe9472264, 0xfca8c48c, 0xf0a01a3f, 0x7d56d82c, 0x3322ef90, 0x4987c74e, 0x38d9c1d1, 0xca8cfea2, 0xd498360b, 0xf5a6cf81, 0x7aa528de, 0xb7da268e, 0xad3fa4bf, 0x3a2ce49d, 0x78500d92, 0x5f6a9bcc, 0x7e546246, 0x8df6c213, 0xd890e8b8, 0x392e5ef7, 0xc382f5af, 0x5d9fbe80, 0xd0697c93, 0xd56fa92d, 0x25cfb312, 0xacc83b99, 0x1810a77d, 0x9ce86e63, 0x3bdb7bbb, 0x26cd0978, 0x596ef418, 0x9aec01b7, 0x4f83a89a, 0x95e6656e, 0xffaa7ee6, 0xbc2108cf, 0x15efe6e8, 0xe7bad99b, 0x6f4ace36, 0x9fead409, 0xb029d67c, 0xa431afb2, 0x3f2a3123, 0xa5c63094, 0xa235c066, 0x4e7437bc, 0x82fca6ca, 0x90e0b0d0, 0xa73315d8, 0x4f14a98, 0xec41f7da, 0xcd7f0e50, 0x91172ff6, 0x4d768dd6, 0xef434db0, 0xaacc544d, 0x96e4df04, 0xd19ee3b5, 0x6a4c1b88, 0x2cc1b81f, 0x65467f51, 0x5e9d04ea, 0x8c015d35, 0x87fa7374, 0xbfb2e41, 0x67b35a1d, 0xdb9252d2, 0x10e93356, 0xd66d1347, 0xd79a8c61, 0xa1377a0c, 0xf8598e14, 0x13eb893c, 0xa9ceee27, 0x61b735c9, 0x1ce1ede5, 0x477a3cb1, 0xd29c59df, 0xf2553f73, 0x141879ce, 0xc773bf37, 0xf753eacd, 0xfd5f5baa, 0x3ddf146f, 0x447886db, 0xafca81f3, 0x68b93ec4, 0x24382c34, 0xa3c25f40, 0x1d1672c3, 0xe2bc0c25, 0x3c288b49, 0xdff4195, 0xa8397101, 0xc08deb3, 0xb4d89ce4, 0x566490c1, 0xcb7b6184, 0x32d570b6, 0x6c48745c, 0xb8d04257]\n  @usableFromInline static let T3: Array<UInt32> = [0xc6a56363, 0xf8847c7c, 0xee997777, 0xf68d7b7b, 0xff0df2f2, 0xd6bd6b6b, 0xdeb16f6f, 0x9154c5c5, 0x60503030, 0x2030101, 0xcea96767, 0x567d2b2b, 0xe719fefe, 0xb562d7d7, 0x4de6abab, 0xec9a7676, 0x8f45caca, 0x1f9d8282, 0x8940c9c9, 0xfa877d7d, 0xef15fafa, 0xb2eb5959, 0x8ec94747, 0xfb0bf0f0, 0x41ecadad, 0xb367d4d4, 0x5ffda2a2, 0x45eaafaf, 0x23bf9c9c, 0x53f7a4a4, 0xe4967272, 0x9b5bc0c0, 0x75c2b7b7, 0xe11cfdfd, 0x3dae9393, 0x4c6a2626, 0x6c5a3636, 0x7e413f3f, 0xf502f7f7, 0x834fcccc, 0x685c3434, 0x51f4a5a5, 0xd134e5e5, 0xf908f1f1, 0xe2937171, 0xab73d8d8, 0x62533131, 0x2a3f1515, 0x80c0404, 0x9552c7c7, 0x46652323, 0x9d5ec3c3, 0x30281818, 0x37a19696, 0xa0f0505, 0x2fb59a9a, 0xe090707, 0x24361212, 0x1b9b8080, 0xdf3de2e2, 0xcd26ebeb, 0x4e692727, 0x7fcdb2b2, 0xea9f7575, 0x121b0909, 0x1d9e8383, 0x58742c2c, 0x342e1a1a, 0x362d1b1b, 0xdcb26e6e, 0xb4ee5a5a, 0x5bfba0a0, 0xa4f65252, 0x764d3b3b, 0xb761d6d6, 0x7dceb3b3, 0x527b2929, 0xdd3ee3e3, 0x5e712f2f, 0x13978484, 0xa6f55353, 0xb968d1d1, 0x0, 0xc12ceded, 0x40602020, 0xe31ffcfc, 0x79c8b1b1, 0xb6ed5b5b, 0xd4be6a6a, 0x8d46cbcb, 0x67d9bebe, 0x724b3939, 0x94de4a4a, 0x98d44c4c, 0xb0e85858, 0x854acfcf, 0xbb6bd0d0, 0xc52aefef, 0x4fe5aaaa, 0xed16fbfb, 0x86c54343, 0x9ad74d4d, 0x66553333, 0x11948585, 0x8acf4545, 0xe910f9f9, 0x4060202, 0xfe817f7f, 0xa0f05050, 0x78443c3c, 0x25ba9f9f, 0x4be3a8a8, 0xa2f35151, 0x5dfea3a3, 0x80c04040, 0x58a8f8f, 0x3fad9292, 0x21bc9d9d, 0x70483838, 0xf104f5f5, 0x63dfbcbc, 0x77c1b6b6, 0xaf75dada, 0x42632121, 0x20301010, 0xe51affff, 0xfd0ef3f3, 0xbf6dd2d2, 0x814ccdcd, 0x18140c0c, 0x26351313, 0xc32fecec, 0xbee15f5f, 0x35a29797, 0x88cc4444, 0x2e391717, 0x9357c4c4, 0x55f2a7a7, 0xfc827e7e, 0x7a473d3d, 0xc8ac6464, 0xbae75d5d, 0x322b1919, 0xe6957373, 0xc0a06060, 0x19988181, 0x9ed14f4f, 0xa37fdcdc, 0x44662222, 0x547e2a2a, 0x3bab9090, 0xb838888, 0x8cca4646, 0xc729eeee, 0x6bd3b8b8, 0x283c1414, 0xa779dede, 0xbce25e5e, 0x161d0b0b, 0xad76dbdb, 0xdb3be0e0, 0x64563232, 0x744e3a3a, 0x141e0a0a, 0x92db4949, 0xc0a0606, 0x486c2424, 0xb8e45c5c, 0x9f5dc2c2, 0xbd6ed3d3, 0x43efacac, 0xc4a66262, 0x39a89191, 0x31a49595, 0xd337e4e4, 0xf28b7979, 0xd532e7e7, 0x8b43c8c8, 0x6e593737, 0xdab76d6d, 0x18c8d8d, 0xb164d5d5, 0x9cd24e4e, 0x49e0a9a9, 0xd8b46c6c, 0xacfa5656, 0xf307f4f4, 0xcf25eaea, 0xcaaf6565, 0xf48e7a7a, 0x47e9aeae, 0x10180808, 0x6fd5baba, 0xf0887878, 0x4a6f2525, 0x5c722e2e, 0x38241c1c, 0x57f1a6a6, 0x73c7b4b4, 0x9751c6c6, 0xcb23e8e8, 0xa17cdddd, 0xe89c7474, 0x3e211f1f, 0x96dd4b4b, 0x61dcbdbd, 0xd868b8b, 0xf858a8a, 0xe0907070, 0x7c423e3e, 0x71c4b5b5, 0xccaa6666, 0x90d84848, 0x6050303, 0xf701f6f6, 0x1c120e0e, 0xc2a36161, 0x6a5f3535, 0xaef95757, 0x69d0b9b9, 0x17918686, 0x9958c1c1, 0x3a271d1d, 0x27b99e9e, 0xd938e1e1, 0xeb13f8f8, 0x2bb39898, 0x22331111, 0xd2bb6969, 0xa970d9d9, 0x7898e8e, 0x33a79494, 0x2db69b9b, 0x3c221e1e, 0x15928787, 0xc920e9e9, 0x8749cece, 0xaaff5555, 0x50782828, 0xa57adfdf, 0x38f8c8c, 0x59f8a1a1, 0x9808989, 0x1a170d0d, 0x65dabfbf, 0xd731e6e6, 0x84c64242, 0xd0b86868, 0x82c34141, 0x29b09999, 0x5a772d2d, 0x1e110f0f, 0x7bcbb0b0, 0xa8fc5454, 0x6dd6bbbb, 0x2c3a1616]\n  @usableFromInline static let T3_INV: Array<UInt32> = [0x5150a7f4, 0x7e536541, 0x1ac3a417, 0x3a965e27, 0x3bcb6bab, 0x1ff1459d, 0xacab58fa, 0x4b9303e3, 0x2055fa30, 0xadf66d76, 0x889176cc, 0xf5254c02, 0x4ffcd7e5, 0xc5d7cb2a, 0x26804435, 0xb58fa362, 0xde495ab1, 0x25671bba, 0x45980eea, 0x5de1c0fe, 0xc302752f, 0x8112f04c, 0x8da39746, 0x6bc6f9d3, 0x3e75f8f, 0x15959c92, 0xbfeb7a6d, 0x95da5952, 0xd42d83be, 0x58d32174, 0x492969e0, 0x8e44c8c9, 0x756a89c2, 0xf478798e, 0x996b3e58, 0x27dd71b9, 0xbeb64fe1, 0xf017ad88, 0xc966ac20, 0x7db43ace, 0x63184adf, 0xe582311a, 0x97603351, 0x62457f53, 0xb1e07764, 0xbb84ae6b, 0xfe1ca081, 0xf9942b08, 0x70586848, 0x8f19fd45, 0x94876cde, 0x52b7f87b, 0xab23d373, 0x72e2024b, 0xe3578f1f, 0x662aab55, 0xb20728eb, 0x2f03c2b5, 0x869a7bc5, 0xd3a50837, 0x30f28728, 0x23b2a5bf, 0x2ba6a03, 0xed5c8216, 0x8a2b1ccf, 0xa792b479, 0xf3f0f207, 0x4ea1e269, 0x65cdf4da, 0x6d5be05, 0xd11f6234, 0xc48afea6, 0x349d532e, 0xa2a055f3, 0x532e18a, 0xa475ebf6, 0xb39ec83, 0x40aaef60, 0x5e069f71, 0xbd51106e, 0x3ef98a21, 0x963d06dd, 0xddae053e, 0x4d46bde6, 0x91b58d54, 0x71055dc4, 0x46fd406, 0x60ff1550, 0x1924fb98, 0xd697e9bd, 0x89cc4340, 0x67779ed9, 0xb0bd42e8, 0x7888b89, 0xe7385b19, 0x79dbeec8, 0xa1470a7c, 0x7ce90f42, 0xf8c91e84, 0x0, 0x9838680, 0x3248ed2b, 0x1eac7011, 0x6c4e725a, 0xfdfbff0e, 0xf563885, 0x3d1ed5ae, 0x3627392d, 0xa64d90f, 0x6821a65c, 0x9bd1545b, 0x243a2e36, 0xcb1670a, 0x930fe757, 0xb4d296ee, 0x1b9e919b, 0x804fc5c0, 0x61a220dc, 0x5a694b77, 0x1c161a12, 0xe20aba93, 0xc0e52aa0, 0x3c43e022, 0x121d171b, 0xe0b0d09, 0xf2adc78b, 0x2db9a8b6, 0x14c8a91e, 0x578519f1, 0xaf4c0775, 0xeebbdd99, 0xa3fd607f, 0xf79f2601, 0x5cbcf572, 0x44c53b66, 0x5b347efb, 0x8b762943, 0xcbdcc623, 0xb668fced, 0xb863f1e4, 0xd7cadc31, 0x42108563, 0x13402297, 0x842011c6, 0x857d244a, 0xd2f83dbb, 0xae1132f9, 0xc76da129, 0x1d4b2f9e, 0xdcf330b2, 0xdec5286, 0x77d0e3c1, 0x2b6c16b3, 0xa999b970, 0x11fa4894, 0x472264e9, 0xa8c48cfc, 0xa01a3ff0, 0x56d82c7d, 0x22ef9033, 0x87c74e49, 0xd9c1d138, 0x8cfea2ca, 0x98360bd4, 0xa6cf81f5, 0xa528de7a, 0xda268eb7, 0x3fa4bfad, 0x2ce49d3a, 0x500d9278, 0x6a9bcc5f, 0x5462467e, 0xf6c2138d, 0x90e8b8d8, 0x2e5ef739, 0x82f5afc3, 0x9fbe805d, 0x697c93d0, 0x6fa92dd5, 0xcfb31225, 0xc83b99ac, 0x10a77d18, 0xe86e639c, 0xdb7bbb3b, 0xcd097826, 0x6ef41859, 0xec01b79a, 0x83a89a4f, 0xe6656e95, 0xaa7ee6ff, 0x2108cfbc, 0xefe6e815, 0xbad99be7, 0x4ace366f, 0xead4099f, 0x29d67cb0, 0x31afb2a4, 0x2a31233f, 0xc63094a5, 0x35c066a2, 0x7437bc4e, 0xfca6ca82, 0xe0b0d090, 0x3315d8a7, 0xf14a9804, 0x41f7daec, 0x7f0e50cd, 0x172ff691, 0x768dd64d, 0x434db0ef, 0xcc544daa, 0xe4df0496, 0x9ee3b5d1, 0x4c1b886a, 0xc1b81f2c, 0x467f5165, 0x9d04ea5e, 0x15d358c, 0xfa737487, 0xfb2e410b, 0xb35a1d67, 0x9252d2db, 0xe9335610, 0x6d1347d6, 0x9a8c61d7, 0x377a0ca1, 0x598e14f8, 0xeb893c13, 0xceee27a9, 0xb735c961, 0xe1ede51c, 0x7a3cb147, 0x9c59dfd2, 0x553f73f2, 0x1879ce14, 0x73bf37c7, 0x53eacdf7, 0x5f5baafd, 0xdf146f3d, 0x7886db44, 0xca81f3af, 0xb93ec468, 0x382c3424, 0xc25f40a3, 0x1672c31d, 0xbc0c25e2, 0x288b493c, 0xff41950d, 0x397101a8, 0x8deb30c, 0xd89ce4b4, 0x6490c156, 0x7b6184cb, 0xd570b632, 0x48745c6c, 0xd04257b8]\n  @usableFromInline static let U1: Array<UInt32> = [0x0, 0xb0d090e, 0x161a121c, 0x1d171b12, 0x2c342438, 0x27392d36, 0x3a2e3624, 0x31233f2a, 0x58684870, 0x5365417e, 0x4e725a6c, 0x457f5362, 0x745c6c48, 0x7f516546, 0x62467e54, 0x694b775a, 0xb0d090e0, 0xbbdd99ee, 0xa6ca82fc, 0xadc78bf2, 0x9ce4b4d8, 0x97e9bdd6, 0x8afea6c4, 0x81f3afca, 0xe8b8d890, 0xe3b5d19e, 0xfea2ca8c, 0xf5afc382, 0xc48cfca8, 0xcf81f5a6, 0xd296eeb4, 0xd99be7ba, 0x7bbb3bdb, 0x70b632d5, 0x6da129c7, 0x66ac20c9, 0x578f1fe3, 0x5c8216ed, 0x41950dff, 0x4a9804f1, 0x23d373ab, 0x28de7aa5, 0x35c961b7, 0x3ec468b9, 0xfe75793, 0x4ea5e9d, 0x19fd458f, 0x12f04c81, 0xcb6bab3b, 0xc066a235, 0xdd71b927, 0xd67cb029, 0xe75f8f03, 0xec52860d, 0xf1459d1f, 0xfa489411, 0x9303e34b, 0x980eea45, 0x8519f157, 0x8e14f859, 0xbf37c773, 0xb43ace7d, 0xa92dd56f, 0xa220dc61, 0xf66d76ad, 0xfd607fa3, 0xe07764b1, 0xeb7a6dbf, 0xda595295, 0xd1545b9b, 0xcc434089, 0xc74e4987, 0xae053edd, 0xa50837d3, 0xb81f2cc1, 0xb31225cf, 0x82311ae5, 0x893c13eb, 0x942b08f9, 0x9f2601f7, 0x46bde64d, 0x4db0ef43, 0x50a7f451, 0x5baafd5f, 0x6a89c275, 0x6184cb7b, 0x7c93d069, 0x779ed967, 0x1ed5ae3d, 0x15d8a733, 0x8cfbc21, 0x3c2b52f, 0x32e18a05, 0x39ec830b, 0x24fb9819, 0x2ff69117, 0x8dd64d76, 0x86db4478, 0x9bcc5f6a, 0x90c15664, 0xa1e2694e, 0xaaef6040, 0xb7f87b52, 0xbcf5725c, 0xd5be0506, 0xdeb30c08, 0xc3a4171a, 0xc8a91e14, 0xf98a213e, 0xf2872830, 0xef903322, 0xe49d3a2c, 0x3d06dd96, 0x360bd498, 0x2b1ccf8a, 0x2011c684, 0x1132f9ae, 0x1a3ff0a0, 0x728ebb2, 0xc25e2bc, 0x656e95e6, 0x6e639ce8, 0x737487fa, 0x78798ef4, 0x495ab1de, 0x4257b8d0, 0x5f40a3c2, 0x544daacc, 0xf7daec41, 0xfcd7e54f, 0xe1c0fe5d, 0xeacdf753, 0xdbeec879, 0xd0e3c177, 0xcdf4da65, 0xc6f9d36b, 0xafb2a431, 0xa4bfad3f, 0xb9a8b62d, 0xb2a5bf23, 0x83868009, 0x888b8907, 0x959c9215, 0x9e919b1b, 0x470a7ca1, 0x4c0775af, 0x51106ebd, 0x5a1d67b3, 0x6b3e5899, 0x60335197, 0x7d244a85, 0x7629438b, 0x1f6234d1, 0x146f3ddf, 0x97826cd, 0x2752fc3, 0x335610e9, 0x385b19e7, 0x254c02f5, 0x2e410bfb, 0x8c61d79a, 0x876cde94, 0x9a7bc586, 0x9176cc88, 0xa055f3a2, 0xab58faac, 0xb64fe1be, 0xbd42e8b0, 0xd4099fea, 0xdf0496e4, 0xc2138df6, 0xc91e84f8, 0xf83dbbd2, 0xf330b2dc, 0xee27a9ce, 0xe52aa0c0, 0x3cb1477a, 0x37bc4e74, 0x2aab5566, 0x21a65c68, 0x10856342, 0x1b886a4c, 0x69f715e, 0xd927850, 0x64d90f0a, 0x6fd40604, 0x72c31d16, 0x79ce1418, 0x48ed2b32, 0x43e0223c, 0x5ef7392e, 0x55fa3020, 0x1b79aec, 0xaba93e2, 0x17ad88f0, 0x1ca081fe, 0x2d83bed4, 0x268eb7da, 0x3b99acc8, 0x3094a5c6, 0x59dfd29c, 0x52d2db92, 0x4fc5c080, 0x44c8c98e, 0x75ebf6a4, 0x7ee6ffaa, 0x63f1e4b8, 0x68fcedb6, 0xb1670a0c, 0xba6a0302, 0xa77d1810, 0xac70111e, 0x9d532e34, 0x965e273a, 0x8b493c28, 0x80443526, 0xe90f427c, 0xe2024b72, 0xff155060, 0xf418596e, 0xc53b6644, 0xce366f4a, 0xd3217458, 0xd82c7d56, 0x7a0ca137, 0x7101a839, 0x6c16b32b, 0x671bba25, 0x5638850f, 0x5d358c01, 0x40229713, 0x4b2f9e1d, 0x2264e947, 0x2969e049, 0x347efb5b, 0x3f73f255, 0xe50cd7f, 0x55dc471, 0x184adf63, 0x1347d66d, 0xcadc31d7, 0xc1d138d9, 0xdcc623cb, 0xd7cb2ac5, 0xe6e815ef, 0xede51ce1, 0xf0f207f3, 0xfbff0efd, 0x92b479a7, 0x99b970a9, 0x84ae6bbb, 0x8fa362b5, 0xbe805d9f, 0xb58d5491, 0xa89a4f83, 0xa397468d]\n  @usableFromInline static let U2: Array<UInt32> = [0x0, 0xd090e0b, 0x1a121c16, 0x171b121d, 0x3424382c, 0x392d3627, 0x2e36243a, 0x233f2a31, 0x68487058, 0x65417e53, 0x725a6c4e, 0x7f536245, 0x5c6c4874, 0x5165467f, 0x467e5462, 0x4b775a69, 0xd090e0b0, 0xdd99eebb, 0xca82fca6, 0xc78bf2ad, 0xe4b4d89c, 0xe9bdd697, 0xfea6c48a, 0xf3afca81, 0xb8d890e8, 0xb5d19ee3, 0xa2ca8cfe, 0xafc382f5, 0x8cfca8c4, 0x81f5a6cf, 0x96eeb4d2, 0x9be7bad9, 0xbb3bdb7b, 0xb632d570, 0xa129c76d, 0xac20c966, 0x8f1fe357, 0x8216ed5c, 0x950dff41, 0x9804f14a, 0xd373ab23, 0xde7aa528, 0xc961b735, 0xc468b93e, 0xe757930f, 0xea5e9d04, 0xfd458f19, 0xf04c8112, 0x6bab3bcb, 0x66a235c0, 0x71b927dd, 0x7cb029d6, 0x5f8f03e7, 0x52860dec, 0x459d1ff1, 0x489411fa, 0x3e34b93, 0xeea4598, 0x19f15785, 0x14f8598e, 0x37c773bf, 0x3ace7db4, 0x2dd56fa9, 0x20dc61a2, 0x6d76adf6, 0x607fa3fd, 0x7764b1e0, 0x7a6dbfeb, 0x595295da, 0x545b9bd1, 0x434089cc, 0x4e4987c7, 0x53eddae, 0x837d3a5, 0x1f2cc1b8, 0x1225cfb3, 0x311ae582, 0x3c13eb89, 0x2b08f994, 0x2601f79f, 0xbde64d46, 0xb0ef434d, 0xa7f45150, 0xaafd5f5b, 0x89c2756a, 0x84cb7b61, 0x93d0697c, 0x9ed96777, 0xd5ae3d1e, 0xd8a73315, 0xcfbc2108, 0xc2b52f03, 0xe18a0532, 0xec830b39, 0xfb981924, 0xf691172f, 0xd64d768d, 0xdb447886, 0xcc5f6a9b, 0xc1566490, 0xe2694ea1, 0xef6040aa, 0xf87b52b7, 0xf5725cbc, 0xbe0506d5, 0xb30c08de, 0xa4171ac3, 0xa91e14c8, 0x8a213ef9, 0x872830f2, 0x903322ef, 0x9d3a2ce4, 0x6dd963d, 0xbd49836, 0x1ccf8a2b, 0x11c68420, 0x32f9ae11, 0x3ff0a01a, 0x28ebb207, 0x25e2bc0c, 0x6e95e665, 0x639ce86e, 0x7487fa73, 0x798ef478, 0x5ab1de49, 0x57b8d042, 0x40a3c25f, 0x4daacc54, 0xdaec41f7, 0xd7e54ffc, 0xc0fe5de1, 0xcdf753ea, 0xeec879db, 0xe3c177d0, 0xf4da65cd, 0xf9d36bc6, 0xb2a431af, 0xbfad3fa4, 0xa8b62db9, 0xa5bf23b2, 0x86800983, 0x8b890788, 0x9c921595, 0x919b1b9e, 0xa7ca147, 0x775af4c, 0x106ebd51, 0x1d67b35a, 0x3e58996b, 0x33519760, 0x244a857d, 0x29438b76, 0x6234d11f, 0x6f3ddf14, 0x7826cd09, 0x752fc302, 0x5610e933, 0x5b19e738, 0x4c02f525, 0x410bfb2e, 0x61d79a8c, 0x6cde9487, 0x7bc5869a, 0x76cc8891, 0x55f3a2a0, 0x58faacab, 0x4fe1beb6, 0x42e8b0bd, 0x99fead4, 0x496e4df, 0x138df6c2, 0x1e84f8c9, 0x3dbbd2f8, 0x30b2dcf3, 0x27a9ceee, 0x2aa0c0e5, 0xb1477a3c, 0xbc4e7437, 0xab55662a, 0xa65c6821, 0x85634210, 0x886a4c1b, 0x9f715e06, 0x9278500d, 0xd90f0a64, 0xd406046f, 0xc31d1672, 0xce141879, 0xed2b3248, 0xe0223c43, 0xf7392e5e, 0xfa302055, 0xb79aec01, 0xba93e20a, 0xad88f017, 0xa081fe1c, 0x83bed42d, 0x8eb7da26, 0x99acc83b, 0x94a5c630, 0xdfd29c59, 0xd2db9252, 0xc5c0804f, 0xc8c98e44, 0xebf6a475, 0xe6ffaa7e, 0xf1e4b863, 0xfcedb668, 0x670a0cb1, 0x6a0302ba, 0x7d1810a7, 0x70111eac, 0x532e349d, 0x5e273a96, 0x493c288b, 0x44352680, 0xf427ce9, 0x24b72e2, 0x155060ff, 0x18596ef4, 0x3b6644c5, 0x366f4ace, 0x217458d3, 0x2c7d56d8, 0xca1377a, 0x1a83971, 0x16b32b6c, 0x1bba2567, 0x38850f56, 0x358c015d, 0x22971340, 0x2f9e1d4b, 0x64e94722, 0x69e04929, 0x7efb5b34, 0x73f2553f, 0x50cd7f0e, 0x5dc47105, 0x4adf6318, 0x47d66d13, 0xdc31d7ca, 0xd138d9c1, 0xc623cbdc, 0xcb2ac5d7, 0xe815efe6, 0xe51ce1ed, 0xf207f3f0, 0xff0efdfb, 0xb479a792, 0xb970a999, 0xae6bbb84, 0xa362b58f, 0x805d9fbe, 0x8d5491b5, 0x9a4f83a8, 0x97468da3]\n  @usableFromInline static let U3: Array<UInt32> = [0x0, 0x90e0b0d, 0x121c161a, 0x1b121d17, 0x24382c34, 0x2d362739, 0x36243a2e, 0x3f2a3123, 0x48705868, 0x417e5365, 0x5a6c4e72, 0x5362457f, 0x6c48745c, 0x65467f51, 0x7e546246, 0x775a694b, 0x90e0b0d0, 0x99eebbdd, 0x82fca6ca, 0x8bf2adc7, 0xb4d89ce4, 0xbdd697e9, 0xa6c48afe, 0xafca81f3, 0xd890e8b8, 0xd19ee3b5, 0xca8cfea2, 0xc382f5af, 0xfca8c48c, 0xf5a6cf81, 0xeeb4d296, 0xe7bad99b, 0x3bdb7bbb, 0x32d570b6, 0x29c76da1, 0x20c966ac, 0x1fe3578f, 0x16ed5c82, 0xdff4195, 0x4f14a98, 0x73ab23d3, 0x7aa528de, 0x61b735c9, 0x68b93ec4, 0x57930fe7, 0x5e9d04ea, 0x458f19fd, 0x4c8112f0, 0xab3bcb6b, 0xa235c066, 0xb927dd71, 0xb029d67c, 0x8f03e75f, 0x860dec52, 0x9d1ff145, 0x9411fa48, 0xe34b9303, 0xea45980e, 0xf1578519, 0xf8598e14, 0xc773bf37, 0xce7db43a, 0xd56fa92d, 0xdc61a220, 0x76adf66d, 0x7fa3fd60, 0x64b1e077, 0x6dbfeb7a, 0x5295da59, 0x5b9bd154, 0x4089cc43, 0x4987c74e, 0x3eddae05, 0x37d3a508, 0x2cc1b81f, 0x25cfb312, 0x1ae58231, 0x13eb893c, 0x8f9942b, 0x1f79f26, 0xe64d46bd, 0xef434db0, 0xf45150a7, 0xfd5f5baa, 0xc2756a89, 0xcb7b6184, 0xd0697c93, 0xd967779e, 0xae3d1ed5, 0xa73315d8, 0xbc2108cf, 0xb52f03c2, 0x8a0532e1, 0x830b39ec, 0x981924fb, 0x91172ff6, 0x4d768dd6, 0x447886db, 0x5f6a9bcc, 0x566490c1, 0x694ea1e2, 0x6040aaef, 0x7b52b7f8, 0x725cbcf5, 0x506d5be, 0xc08deb3, 0x171ac3a4, 0x1e14c8a9, 0x213ef98a, 0x2830f287, 0x3322ef90, 0x3a2ce49d, 0xdd963d06, 0xd498360b, 0xcf8a2b1c, 0xc6842011, 0xf9ae1132, 0xf0a01a3f, 0xebb20728, 0xe2bc0c25, 0x95e6656e, 0x9ce86e63, 0x87fa7374, 0x8ef47879, 0xb1de495a, 0xb8d04257, 0xa3c25f40, 0xaacc544d, 0xec41f7da, 0xe54ffcd7, 0xfe5de1c0, 0xf753eacd, 0xc879dbee, 0xc177d0e3, 0xda65cdf4, 0xd36bc6f9, 0xa431afb2, 0xad3fa4bf, 0xb62db9a8, 0xbf23b2a5, 0x80098386, 0x8907888b, 0x9215959c, 0x9b1b9e91, 0x7ca1470a, 0x75af4c07, 0x6ebd5110, 0x67b35a1d, 0x58996b3e, 0x51976033, 0x4a857d24, 0x438b7629, 0x34d11f62, 0x3ddf146f, 0x26cd0978, 0x2fc30275, 0x10e93356, 0x19e7385b, 0x2f5254c, 0xbfb2e41, 0xd79a8c61, 0xde94876c, 0xc5869a7b, 0xcc889176, 0xf3a2a055, 0xfaacab58, 0xe1beb64f, 0xe8b0bd42, 0x9fead409, 0x96e4df04, 0x8df6c213, 0x84f8c91e, 0xbbd2f83d, 0xb2dcf330, 0xa9ceee27, 0xa0c0e52a, 0x477a3cb1, 0x4e7437bc, 0x55662aab, 0x5c6821a6, 0x63421085, 0x6a4c1b88, 0x715e069f, 0x78500d92, 0xf0a64d9, 0x6046fd4, 0x1d1672c3, 0x141879ce, 0x2b3248ed, 0x223c43e0, 0x392e5ef7, 0x302055fa, 0x9aec01b7, 0x93e20aba, 0x88f017ad, 0x81fe1ca0, 0xbed42d83, 0xb7da268e, 0xacc83b99, 0xa5c63094, 0xd29c59df, 0xdb9252d2, 0xc0804fc5, 0xc98e44c8, 0xf6a475eb, 0xffaa7ee6, 0xe4b863f1, 0xedb668fc, 0xa0cb167, 0x302ba6a, 0x1810a77d, 0x111eac70, 0x2e349d53, 0x273a965e, 0x3c288b49, 0x35268044, 0x427ce90f, 0x4b72e202, 0x5060ff15, 0x596ef418, 0x6644c53b, 0x6f4ace36, 0x7458d321, 0x7d56d82c, 0xa1377a0c, 0xa8397101, 0xb32b6c16, 0xba25671b, 0x850f5638, 0x8c015d35, 0x97134022, 0x9e1d4b2f, 0xe9472264, 0xe0492969, 0xfb5b347e, 0xf2553f73, 0xcd7f0e50, 0xc471055d, 0xdf63184a, 0xd66d1347, 0x31d7cadc, 0x38d9c1d1, 0x23cbdcc6, 0x2ac5d7cb, 0x15efe6e8, 0x1ce1ede5, 0x7f3f0f2, 0xefdfbff, 0x79a792b4, 0x70a999b9, 0x6bbb84ae, 0x62b58fa3, 0x5d9fbe80, 0x5491b58d, 0x4f83a89a, 0x468da397]\n  @usableFromInline static let U4: Array<UInt32> = [0x0, 0xe0b0d09, 0x1c161a12, 0x121d171b, 0x382c3424, 0x3627392d, 0x243a2e36, 0x2a31233f, 0x70586848, 0x7e536541, 0x6c4e725a, 0x62457f53, 0x48745c6c, 0x467f5165, 0x5462467e, 0x5a694b77, 0xe0b0d090, 0xeebbdd99, 0xfca6ca82, 0xf2adc78b, 0xd89ce4b4, 0xd697e9bd, 0xc48afea6, 0xca81f3af, 0x90e8b8d8, 0x9ee3b5d1, 0x8cfea2ca, 0x82f5afc3, 0xa8c48cfc, 0xa6cf81f5, 0xb4d296ee, 0xbad99be7, 0xdb7bbb3b, 0xd570b632, 0xc76da129, 0xc966ac20, 0xe3578f1f, 0xed5c8216, 0xff41950d, 0xf14a9804, 0xab23d373, 0xa528de7a, 0xb735c961, 0xb93ec468, 0x930fe757, 0x9d04ea5e, 0x8f19fd45, 0x8112f04c, 0x3bcb6bab, 0x35c066a2, 0x27dd71b9, 0x29d67cb0, 0x3e75f8f, 0xdec5286, 0x1ff1459d, 0x11fa4894, 0x4b9303e3, 0x45980eea, 0x578519f1, 0x598e14f8, 0x73bf37c7, 0x7db43ace, 0x6fa92dd5, 0x61a220dc, 0xadf66d76, 0xa3fd607f, 0xb1e07764, 0xbfeb7a6d, 0x95da5952, 0x9bd1545b, 0x89cc4340, 0x87c74e49, 0xddae053e, 0xd3a50837, 0xc1b81f2c, 0xcfb31225, 0xe582311a, 0xeb893c13, 0xf9942b08, 0xf79f2601, 0x4d46bde6, 0x434db0ef, 0x5150a7f4, 0x5f5baafd, 0x756a89c2, 0x7b6184cb, 0x697c93d0, 0x67779ed9, 0x3d1ed5ae, 0x3315d8a7, 0x2108cfbc, 0x2f03c2b5, 0x532e18a, 0xb39ec83, 0x1924fb98, 0x172ff691, 0x768dd64d, 0x7886db44, 0x6a9bcc5f, 0x6490c156, 0x4ea1e269, 0x40aaef60, 0x52b7f87b, 0x5cbcf572, 0x6d5be05, 0x8deb30c, 0x1ac3a417, 0x14c8a91e, 0x3ef98a21, 0x30f28728, 0x22ef9033, 0x2ce49d3a, 0x963d06dd, 0x98360bd4, 0x8a2b1ccf, 0x842011c6, 0xae1132f9, 0xa01a3ff0, 0xb20728eb, 0xbc0c25e2, 0xe6656e95, 0xe86e639c, 0xfa737487, 0xf478798e, 0xde495ab1, 0xd04257b8, 0xc25f40a3, 0xcc544daa, 0x41f7daec, 0x4ffcd7e5, 0x5de1c0fe, 0x53eacdf7, 0x79dbeec8, 0x77d0e3c1, 0x65cdf4da, 0x6bc6f9d3, 0x31afb2a4, 0x3fa4bfad, 0x2db9a8b6, 0x23b2a5bf, 0x9838680, 0x7888b89, 0x15959c92, 0x1b9e919b, 0xa1470a7c, 0xaf4c0775, 0xbd51106e, 0xb35a1d67, 0x996b3e58, 0x97603351, 0x857d244a, 0x8b762943, 0xd11f6234, 0xdf146f3d, 0xcd097826, 0xc302752f, 0xe9335610, 0xe7385b19, 0xf5254c02, 0xfb2e410b, 0x9a8c61d7, 0x94876cde, 0x869a7bc5, 0x889176cc, 0xa2a055f3, 0xacab58fa, 0xbeb64fe1, 0xb0bd42e8, 0xead4099f, 0xe4df0496, 0xf6c2138d, 0xf8c91e84, 0xd2f83dbb, 0xdcf330b2, 0xceee27a9, 0xc0e52aa0, 0x7a3cb147, 0x7437bc4e, 0x662aab55, 0x6821a65c, 0x42108563, 0x4c1b886a, 0x5e069f71, 0x500d9278, 0xa64d90f, 0x46fd406, 0x1672c31d, 0x1879ce14, 0x3248ed2b, 0x3c43e022, 0x2e5ef739, 0x2055fa30, 0xec01b79a, 0xe20aba93, 0xf017ad88, 0xfe1ca081, 0xd42d83be, 0xda268eb7, 0xc83b99ac, 0xc63094a5, 0x9c59dfd2, 0x9252d2db, 0x804fc5c0, 0x8e44c8c9, 0xa475ebf6, 0xaa7ee6ff, 0xb863f1e4, 0xb668fced, 0xcb1670a, 0x2ba6a03, 0x10a77d18, 0x1eac7011, 0x349d532e, 0x3a965e27, 0x288b493c, 0x26804435, 0x7ce90f42, 0x72e2024b, 0x60ff1550, 0x6ef41859, 0x44c53b66, 0x4ace366f, 0x58d32174, 0x56d82c7d, 0x377a0ca1, 0x397101a8, 0x2b6c16b3, 0x25671bba, 0xf563885, 0x15d358c, 0x13402297, 0x1d4b2f9e, 0x472264e9, 0x492969e0, 0x5b347efb, 0x553f73f2, 0x7f0e50cd, 0x71055dc4, 0x63184adf, 0x6d1347d6, 0xd7cadc31, 0xd9c1d138, 0xcbdcc623, 0xc5d7cb2a, 0xefe6e815, 0xe1ede51c, 0xf3f0f207, 0xfdfbff0e, 0xa792b479, 0xa999b970, 0xbb84ae6b, 0xb58fa362, 0x9fbe805d, 0x91b58d54, 0x83a89a4f, 0x8da39746]\n\n  /// Initialize AES with variant calculated out of key length:\n  /// - 16 bytes (AES-128)\n  /// - 24 bytes (AES-192)\n  /// - 32 bytes (AES-256)\n  ///\n  /// - parameter key:       Key. Length of the key decides on AES variant.\n  /// - parameter iv:        Initialization Vector (Optional for some blockMode values)\n  /// - parameter blockMode: Cipher mode of operation\n  /// - parameter padding:   Padding method. .pkcs7, .noPadding, .zeroPadding, ...\n  ///\n  /// - throws: AES.Error\n  ///\n  /// - returns: Instance\n  public init(key: Array<UInt8>, blockMode: BlockMode, padding: Padding = .pkcs7) throws {\n    self.key = Key(bytes: key)\n    self.blockMode = blockMode\n    self.padding = padding\n    self.keySize = self.key.count\n\n    // Validate key size\n    switch self.keySize * 8 {\n      case 128:\n        self.variant = .aes128\n      case 192:\n        self.variant = .aes192\n      case 256:\n        self.variant = .aes256\n      default:\n        throw Error.invalidKeySize\n    }\n\n    self.variantNb = self.variant.Nb\n    self.variantNk = self.variant.Nk\n    self.variantNr = self.variant.Nr\n  }\n\n  @inlinable\n  internal func encrypt(block: ArraySlice<UInt8>) -> Array<UInt8>? {\n    if self.blockMode.options.contains(.paddingRequired) && block.count != AES.blockSize {\n      return Array(block)\n    }\n\n    let rounds = self.variantNr\n    let rk = self.expandedKey\n\n    let b00 = UInt32(block[block.startIndex.advanced(by: 0)])\n    let b01 = UInt32(block[block.startIndex.advanced(by: 1)]) << 8\n    let b02 = UInt32(block[block.startIndex.advanced(by: 2)]) << 16\n    let b03 = UInt32(block[block.startIndex.advanced(by: 3)]) << 24\n    var b0 = b00 | b01 | b02 | b03\n\n    let b10 = UInt32(block[block.startIndex.advanced(by: 4)])\n    let b11 = UInt32(block[block.startIndex.advanced(by: 5)]) << 8\n    let b12 = UInt32(block[block.startIndex.advanced(by: 6)]) << 16\n    let b13 = UInt32(block[block.startIndex.advanced(by: 7)]) << 24\n    var b1 = b10 | b11 | b12 | b13\n\n    let b20 = UInt32(block[block.startIndex.advanced(by: 8)])\n    let b21 = UInt32(block[block.startIndex.advanced(by: 9)]) << 8\n    let b22 = UInt32(block[block.startIndex.advanced(by: 10)]) << 16\n    let b23 = UInt32(block[block.startIndex.advanced(by: 11)]) << 24\n    var b2 = b20 | b21 | b22 | b23\n\n    let b30 = UInt32(block[block.startIndex.advanced(by: 12)])\n    let b31 = UInt32(block[block.startIndex.advanced(by: 13)]) << 8\n    let b32 = UInt32(block[block.startIndex.advanced(by: 14)]) << 16\n    let b33 = UInt32(block[block.startIndex.advanced(by: 15)]) << 24\n    var b3 = b30 | b31 | b32 | b33\n\n    let tLength = 4\n    let t = UnsafeMutablePointer<UInt32>.allocate(capacity: tLength)\n    t.initialize(repeating: 0, count: tLength)\n    defer {\n      t.deinitialize(count: tLength)\n      t.deallocate()\n    }\n\n    for r in 0..<rounds - 1 {\n      t[0] = b0 ^ rk[r][0]\n      t[1] = b1 ^ rk[r][1]\n      t[2] = b2 ^ rk[r][2]\n      t[3] = b3 ^ rk[r][3]\n\n      let lb00 = AES.T0[Int(t[0] & 0xff)]\n      let lb01 = AES.T1[Int((t[1] >> 8) & 0xff)]\n      let lb02 = AES.T2[Int((t[2] >> 16) & 0xff)]\n      let lb03 = AES.T3[Int(t[3] >> 24)]\n      b0 = lb00 ^ lb01 ^ lb02 ^ lb03\n\n      let lb10 = AES.T0[Int(t[1] & 0xff)]\n      let lb11 = AES.T1[Int((t[2] >> 8) & 0xff)]\n      let lb12 = AES.T2[Int((t[3] >> 16) & 0xff)]\n      let lb13 = AES.T3[Int(t[0] >> 24)]\n      b1 = lb10 ^ lb11 ^ lb12 ^ lb13\n\n      let lb20 = AES.T0[Int(t[2] & 0xff)]\n      let lb21 = AES.T1[Int((t[3] >> 8) & 0xff)]\n      let lb22 = AES.T2[Int((t[0] >> 16) & 0xff)]\n      let lb23 = AES.T3[Int(t[1] >> 24)]\n      b2 = lb20 ^ lb21 ^ lb22 ^ lb23\n\n      let lb30 = AES.T0[Int(t[3] & 0xff)]\n      let lb31 = AES.T1[Int((t[0] >> 8) & 0xff)]\n      let lb32 = AES.T2[Int((t[1] >> 16) & 0xff)]\n      let lb33 = AES.T3[Int(t[2] >> 24)]\n      b3 = lb30 ^ lb31 ^ lb32 ^ lb33\n    }\n\n    // last round\n    let r = rounds - 1\n\n    t[0] = b0 ^ rk[r][0]\n    t[1] = b1 ^ rk[r][1]\n    t[2] = b2 ^ rk[r][2]\n    t[3] = b3 ^ rk[r][3]\n\n    // rounds\n    b0 = F1(t[0], t[1], t[2], t[3]) ^ rk[rounds][0]\n    b1 = F1(t[1], t[2], t[3], t[0]) ^ rk[rounds][1]\n    b2 = F1(t[2], t[3], t[0], t[1]) ^ rk[rounds][2]\n    b3 = F1(t[3], t[0], t[1], t[2]) ^ rk[rounds][3]\n\n    let encrypted: Array<UInt8> = [\n      UInt8(b0 & 0xff), UInt8((b0 >> 8) & 0xff), UInt8((b0 >> 16) & 0xff), UInt8((b0 >> 24) & 0xff),\n      UInt8(b1 & 0xff), UInt8((b1 >> 8) & 0xff), UInt8((b1 >> 16) & 0xff), UInt8((b1 >> 24) & 0xff),\n      UInt8(b2 & 0xff), UInt8((b2 >> 8) & 0xff), UInt8((b2 >> 16) & 0xff), UInt8((b2 >> 24) & 0xff),\n      UInt8(b3 & 0xff), UInt8((b3 >> 8) & 0xff), UInt8((b3 >> 16) & 0xff), UInt8((b3 >> 24) & 0xff)\n    ]\n    return encrypted\n  }\n\n  @usableFromInline\n  internal func decrypt(block: ArraySlice<UInt8>) -> Array<UInt8>? {\n    if self.blockMode.options.contains(.paddingRequired) && block.count != AES.blockSize {\n      return Array(block)\n    }\n\n    let rounds = self.variantNr\n    let rk = self.expandedKeyInv\n\n    // Save milliseconds by not using `block.toUInt32Array()`\n    let b00 = UInt32(block[block.startIndex.advanced(by: 0)])\n    let b01 = UInt32(block[block.startIndex.advanced(by: 1)]) << 8\n    let b02 = UInt32(block[block.startIndex.advanced(by: 2)]) << 16\n    let b03 = UInt32(block[block.startIndex.advanced(by: 3)]) << 24\n    var b0 = b00 | b01 | b02 | b03\n\n    let b10 = UInt32(block[block.startIndex.advanced(by: 4)])\n    let b11 = UInt32(block[block.startIndex.advanced(by: 5)]) << 8\n    let b12 = UInt32(block[block.startIndex.advanced(by: 6)]) << 16\n    let b13 = UInt32(block[block.startIndex.advanced(by: 7)]) << 24\n    var b1 = b10 | b11 | b12 | b13\n\n    let b20 = UInt32(block[block.startIndex.advanced(by: 8)])\n    let b21 = UInt32(block[block.startIndex.advanced(by: 9)]) << 8\n    let b22 = UInt32(block[block.startIndex.advanced(by: 10)]) << 16\n    let b23 = UInt32(block[block.startIndex.advanced(by: 11)]) << 24\n    var b2 = b20 | b21 | b22 | b23\n\n    let b30 = UInt32(block[block.startIndex.advanced(by: 12)])\n    let b31 = UInt32(block[block.startIndex.advanced(by: 13)]) << 8\n    let b32 = UInt32(block[block.startIndex.advanced(by: 14)]) << 16\n    let b33 = UInt32(block[block.startIndex.advanced(by: 15)]) << 24\n    var b3 = b30 | b31 | b32 | b33\n\n    let tLength = 4\n    let t = UnsafeMutablePointer<UInt32>.allocate(capacity: tLength)\n    t.initialize(repeating: 0, count: tLength)\n    defer {\n      t.deinitialize(count: tLength)\n      t.deallocate()\n    }\n\n    for r in (2...rounds).reversed() {\n      t[0] = b0 ^ rk[r][0]\n      t[1] = b1 ^ rk[r][1]\n      t[2] = b2 ^ rk[r][2]\n      t[3] = b3 ^ rk[r][3]\n\n      let b00 = AES.T0_INV[Int(t[0] & 0xff)]\n      let b01 = AES.T1_INV[Int((t[3] >> 8) & 0xff)]\n      let b02 = AES.T2_INV[Int((t[2] >> 16) & 0xff)]\n      let b03 = AES.T3_INV[Int(t[1] >> 24)]\n      b0 = b00 ^ b01 ^ b02 ^ b03\n\n      let b10 = AES.T0_INV[Int(t[1] & 0xff)]\n      let b11 = AES.T1_INV[Int((t[0] >> 8) & 0xff)]\n      let b12 = AES.T2_INV[Int((t[3] >> 16) & 0xff)]\n      let b13 = AES.T3_INV[Int(t[2] >> 24)]\n      b1 = b10 ^ b11 ^ b12 ^ b13\n\n      let b20 = AES.T0_INV[Int(t[2] & 0xff)]\n      let b21 = AES.T1_INV[Int((t[1] >> 8) & 0xff)]\n      let b22 = AES.T2_INV[Int((t[0] >> 16) & 0xff)]\n      let b23 = AES.T3_INV[Int(t[3] >> 24)]\n      b2 = b20 ^ b21 ^ b22 ^ b23\n\n      let b30 = AES.T0_INV[Int(t[3] & 0xff)]\n      let b31 = AES.T1_INV[Int((t[2] >> 8) & 0xff)]\n      let b32 = AES.T2_INV[Int((t[1] >> 16) & 0xff)]\n      let b33 = AES.T3_INV[Int(t[0] >> 24)]\n      b3 = b30 ^ b31 ^ b32 ^ b33\n    }\n\n    // last round\n    t[0] = b0 ^ rk[1][0]\n    t[1] = b1 ^ rk[1][1]\n    t[2] = b2 ^ rk[1][2]\n    t[3] = b3 ^ rk[1][3]\n\n    // rounds\n\n    let lb00 = self.sBoxInv[Int(B0(t[0]))]\n    let lb01 = (sBoxInv[Int(B1(t[3]))] << 8)\n    let lb02 = (sBoxInv[Int(B2(t[2]))] << 16)\n    let lb03 = (sBoxInv[Int(B3(t[1]))] << 24)\n    b0 = lb00 | lb01 | lb02 | lb03 ^ rk[0][0]\n\n    let lb10 = self.sBoxInv[Int(B0(t[1]))]\n    let lb11 = (sBoxInv[Int(B1(t[0]))] << 8)\n    let lb12 = (sBoxInv[Int(B2(t[3]))] << 16)\n    let lb13 = (sBoxInv[Int(B3(t[2]))] << 24)\n    b1 = lb10 | lb11 | lb12 | lb13 ^ rk[0][1]\n\n    let lb20 = self.sBoxInv[Int(B0(t[2]))]\n    let lb21 = (sBoxInv[Int(B1(t[1]))] << 8)\n    let lb22 = (sBoxInv[Int(B2(t[0]))] << 16)\n    let lb23 = (sBoxInv[Int(B3(t[3]))] << 24)\n    b2 = lb20 | lb21 | lb22 | lb23 ^ rk[0][2]\n\n    let lb30 = self.sBoxInv[Int(B0(t[3]))]\n    let lb31 = (sBoxInv[Int(B1(t[2]))] << 8)\n    let lb32 = (sBoxInv[Int(B2(t[1]))] << 16)\n    let lb33 = (sBoxInv[Int(B3(t[0]))] << 24)\n    b3 = lb30 | lb31 | lb32 | lb33 ^ rk[0][3]\n\n    let result: Array<UInt8> = [\n      UInt8(b0 & 0xff), UInt8((b0 >> 8) & 0xff), UInt8((b0 >> 16) & 0xff), UInt8((b0 >> 24) & 0xff),\n      UInt8(b1 & 0xff), UInt8((b1 >> 8) & 0xff), UInt8((b1 >> 16) & 0xff), UInt8((b1 >> 24) & 0xff),\n      UInt8(b2 & 0xff), UInt8((b2 >> 8) & 0xff), UInt8((b2 >> 16) & 0xff), UInt8((b2 >> 24) & 0xff),\n      UInt8(b3 & 0xff), UInt8((b3 >> 8) & 0xff), UInt8((b3 >> 16) & 0xff), UInt8((b3 >> 24) & 0xff)\n    ]\n    return result\n  }\n}\n\nextension AES {\n  private func expandKeyInv(_ key: Key, variant: Variant) -> Array<Array<UInt32>> {\n    let rounds = self.variantNr\n    var rk2: Array<Array<UInt32>> = self.expandKey(key, variant: variant)\n\n    for r in 1..<rounds {\n      for i in 0..<4 {\n        let w = rk2[r][i]\n        let u1 = AES.U1[Int(B0(w))]\n        let u2 = AES.U2[Int(B1(w))]\n        let u3 = AES.U3[Int(B2(w))]\n        let u4 = AES.U4[Int(B3(w))]\n        rk2[r][i] = u1 ^ u2 ^ u3 ^ u4\n      }\n    }\n\n    return rk2\n  }\n\n  private func expandKey(_ key: Key, variant _: Variant) -> Array<Array<UInt32>> {\n    func convertExpandedKey(_ expanded: Array<UInt8>) -> Array<Array<UInt32>> {\n      expanded.batched(by: 4).map({ UInt32(bytes: $0.reversed()) }).batched(by: 4).map { Array($0) }\n    }\n\n    /*\n     * Function used in the Key Expansion routine that takes a four-byte\n     * input word and applies an S-box to each of the four bytes to\n     * produce an output word.\n     */\n    func subWord(_ word: Array<UInt8>) -> Array<UInt8> {\n      precondition(word.count == 4)\n\n      var result = word\n      for i in 0..<4 {\n        result[i] = UInt8(self.sBox[Int(word[i])])\n      }\n      return result\n    }\n\n    @inline(__always)\n    func subWordInPlace(_ word: inout Array<UInt8>) {\n      precondition(word.count == 4)\n      word[0] = UInt8(self.sBox[Int(word[0])])\n      word[1] = UInt8(self.sBox[Int(word[1])])\n      word[2] = UInt8(self.sBox[Int(word[2])])\n      word[3] = UInt8(self.sBox[Int(word[3])])\n    }\n\n    let wLength = self.variantNb * (self.variantNr + 1) * 4\n    let w = UnsafeMutablePointer<UInt8>.allocate(capacity: wLength)\n    w.initialize(repeating: 0, count: wLength)\n    defer {\n      w.deinitialize(count: wLength)\n      w.deallocate()\n    }\n\n    for i in 0..<self.variantNk {\n      for wordIdx in 0..<4 {\n        w[(4 * i) + wordIdx] = key[(4 * i) + wordIdx]\n      }\n    }\n\n    var tmp: Array<UInt8>\n\n    for i in self.variantNk..<self.variantNb * (self.variantNr + 1) {\n      tmp = Array<UInt8>(repeating: 0, count: 4)\n\n      for wordIdx in 0..<4 {\n        tmp[wordIdx] = w[4 * (i - 1) + wordIdx]\n      }\n      if (i % self.variantNk) == 0 {\n        tmp = subWord(rotateLeft(UInt32(bytes: tmp), by: 8).bytes(totalBytes: 4))\n        tmp[0] = tmp.first! ^ AES.Rcon[i / variantNk]\n      } else if self.variantNk > 6 && (i % self.variantNk) == 4 {\n        subWordInPlace(&tmp)\n      }\n\n      // xor array of bytes\n      for wordIdx in 0..<4 {\n        w[4 * i + wordIdx] = w[4 * (i - variantNk) + wordIdx] ^ tmp[wordIdx]\n      }\n    }\n    return convertExpandedKey(Array(UnsafeBufferPointer(start: w, count: wLength)))\n  }\n\n  @inline(__always)\n  private func B0(_ x: UInt32) -> UInt32 {\n    x & 0xff\n  }\n\n  @inline(__always)\n  private func B1(_ x: UInt32) -> UInt32 {\n    (x >> 8) & 0xff\n  }\n\n  @inline(__always)\n  private func B2(_ x: UInt32) -> UInt32 {\n    (x >> 16) & 0xff\n  }\n\n  @inline(__always)\n  private func B3(_ x: UInt32) -> UInt32 {\n    (x >> 24) & 0xff\n  }\n\n  @inline(__always) @usableFromInline\n  internal func F1(_ x0: UInt32, _ x1: UInt32, _ x2: UInt32, _ x3: UInt32) -> UInt32 {\n    var result: UInt32 = 0\n    result |= UInt32(self.B1(AES.T0[Int(x0 & 255)]))\n    result |= UInt32(self.B1(AES.T0[Int((x1 >> 8) & 255)])) << 8\n    result |= UInt32(self.B1(AES.T0[Int((x2 >> 16) & 255)])) << 16\n    result |= UInt32(self.B1(AES.T0[Int(x3 >> 24)])) << 24\n    return result\n  }\n\n  private func calculateSBox() -> (sBox: Array<UInt32>, invSBox: Array<UInt32>) {\n    let sboxLength = 256\n    let sbox = UnsafeMutablePointer<UInt32>.allocate(capacity: sboxLength)\n    let invsbox = UnsafeMutablePointer<UInt32>.allocate(capacity: sboxLength)\n    sbox.initialize(repeating: 0, count: sboxLength)\n    invsbox.initialize(repeating: 0, count: sboxLength)\n    defer {\n      sbox.deinitialize(count: sboxLength)\n      sbox.deallocate()\n      invsbox.deinitialize(count: sboxLength)\n      invsbox.deallocate()\n    }\n\n    sbox[0] = 0x63\n\n    var p: UInt8 = 1, q: UInt8 = 1\n\n    repeat {\n      p = p ^ (UInt8(truncatingIfNeeded: Int(p) << 1) ^ ((p & 0x80) == 0x80 ? 0x1b : 0))\n      q ^= q << 1\n      q ^= q << 2\n      q ^= q << 4\n      q ^= (q & 0x80) == 0x80 ? 0x09 : 0\n\n      let s = 0x63 ^ q ^ rotateLeft(q, by: 1) ^ rotateLeft(q, by: 2) ^ rotateLeft(q, by: 3) ^ rotateLeft(q, by: 4)\n\n      sbox[Int(p)] = UInt32(s)\n      invsbox[Int(s)] = UInt32(p)\n    } while p != 1\n\n    return (sBox: Array(UnsafeBufferPointer(start: sbox, count: sboxLength)), invSBox: Array(UnsafeBufferPointer(start: invsbox, count: sboxLength)))\n  }\n}\n\n// MARK: Cipher\n\nextension AES: Cipher {\n  @inlinable\n  public func encrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    let blockSize = self.blockMode.customBlockSize ?? AES.blockSize\n    let chunks = bytes.batched(by: blockSize)\n\n    var oneTimeCryptor = try makeEncryptor()\n    var out = Array<UInt8>(reserveCapacity: bytes.count)\n    for chunk in chunks {\n      out += try oneTimeCryptor.update(withBytes: chunk, isLast: false)\n    }\n    // Padding may be added at the very end\n    out += try oneTimeCryptor.finish()\n\n    if self.blockMode.options.contains(.paddingRequired) && (out.count % AES.blockSize != 0) {\n      throw Error.dataPaddingRequired\n    }\n\n    return out\n  }\n\n  @inlinable\n  public func decrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    if self.blockMode.options.contains(.paddingRequired) && (bytes.count % AES.blockSize != 0) {\n      throw Error.dataPaddingRequired\n    }\n\n    var oneTimeCryptor = try makeDecryptor()\n    let chunks = bytes.batched(by: AES.blockSize)\n    if chunks.isEmpty {\n      throw Error.invalidData\n    }\n\n    var out = Array<UInt8>(reserveCapacity: bytes.count)\n\n    var lastIdx = chunks.startIndex\n    chunks.indices.formIndex(&lastIdx, offsetBy: chunks.count - 1)\n\n    // To properly remove padding, `isLast` has to be known when called with the last chunk of ciphertext\n    // Last chunk of ciphertext may contains padded data so next call to update(..) won't be able to remove it\n    for idx in chunks.indices {\n      out += try oneTimeCryptor.update(withBytes: chunks[idx], isLast: idx == lastIdx)\n    }\n    return out\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/ASN1/ASN1.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n//  ASN1 Code inspired by Asn1Parser.swift from SwiftyRSA\n\nimport Foundation\n\n/// A Partial ASN.1 (Abstract Syntax Notation 1) Encoder & Decoder Implementation.\n///\n/// - Note: This implementation is limited to a few core types and is not an exhaustive / complete ASN1 implementation\n/// - Warning: This implementation has been developed for encoding and decoding DER & PEM files specifically. If you're using this Encoder/Decoder on other ASN1 structures, make sure you test the expected behavior appropriately.\nenum ASN1 {\n  internal enum IDENTIFIERS: UInt8, Equatable {\n    case SEQUENCE = 0x30\n    case INTERGER = 0x02\n    case OBJECTID = 0x06\n    case NULL = 0x05\n    case BITSTRING = 0x03\n    case OCTETSTRING = 0x04\n\n    static func == (lhs: UInt8, rhs: IDENTIFIERS) -> Bool {\n      lhs == rhs.rawValue\n    }\n\n    var bytes: [UInt8] {\n      switch self {\n        case .NULL:\n          return [self.rawValue, 0x00]\n        default:\n          return [self.rawValue]\n      }\n    }\n  }\n\n  /// An ASN1 node\n  internal enum Node: CustomStringConvertible {\n    /// An array of more `ASN1.Node`s\n    case sequence(nodes: [Node])\n    /// An integer\n    /// - Note: This ASN1 Encoder makes no assumptions about the sign and bit order of the integers passed in. The conversion from Integer to Data is your responsibility.\n    case integer(data: Data)\n    /// An objectIdentifier\n    case objectIdentifier(data: Data)\n    /// A null object\n    case null\n    /// A bitString\n    case bitString(data: Data)\n    /// An octetString\n    case octetString(data: Data)\n\n    var description: String {\n      ASN1.printNode(self, level: 0)\n    }\n  }\n\n  internal static func printNode(_ node: ASN1.Node, level: Int) -> String {\n    var str: [String] = []\n    let prefix = String(repeating: \"\\t\", count: level)\n    switch node {\n      case .integer(let int):\n        str.append(\"\\(prefix)Integer: \\(int.toHexString())\")\n      case .bitString(let bs):\n        str.append(\"\\(prefix)BitString: \\(bs.toHexString())\")\n      case .null:\n        str.append(\"\\(prefix)NULL\")\n      case .objectIdentifier(let oid):\n        str.append(\"\\(prefix)ObjectID: \\(oid.toHexString())\")\n      case .octetString(let os):\n        str.append(\"\\(prefix)OctetString: \\(os.toHexString())\")\n      case .sequence(let nodes):\n        str.append(\"\\(prefix)Sequence:\")\n        nodes.forEach { str.append(printNode($0, level: level + 1)) }\n    }\n    return str.joined(separator: \"\\n\")\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/ASN1/ASN1Decoder.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n//  ASN1 Code inspired by Asn1Parser.swift from SwiftyRSA\n\nimport Foundation\n\nextension ASN1 {\n  /// A simple ASN1 parser that will recursively iterate over a root node and return a Node tree.\n  /// The root node can be any of the supported nodes described in `Node`. If the parser encounters a sequence\n  /// it will recursively parse its children.\n  enum Decoder {\n\n    enum DecodingError: Error {\n      case noType\n      case invalidType(value: UInt8)\n    }\n\n    /// Parses ASN1 data and returns its root node.\n    ///\n    /// - Parameter data: ASN1 data to parse\n    /// - Returns: Root ASN1 Node\n    /// - Throws: A DecodingError if anything goes wrong, or if an unknown node was encountered\n    static func decode(data: Data) throws -> Node {\n      let scanner = ASN1.Scanner(data: data)\n      let node = try decodeNode(scanner: scanner)\n      return node\n    }\n\n    /// Parses an ASN1 given an existing scanner.\n    /// @warning: this will modify the state (ie: position) of the provided scanner.\n    ///\n    /// - Parameter scanner: Scanner to use to consume the data\n    /// - Returns: Parsed node\n    /// - Throws: A DecodingError if anything goes wrong, or if an unknown node was encountered\n    private static func decodeNode(scanner: ASN1.Scanner) throws -> Node {\n\n      let firstByte = try scanner.consume(length: 1).firstByte\n\n      switch firstByte {\n        case IDENTIFIERS.SEQUENCE.rawValue:\n          let length = try scanner.consumeLength()\n          let data = try scanner.consume(length: length)\n          let nodes = try decodeSequence(data: data)\n          return .sequence(nodes: nodes)\n\n        case IDENTIFIERS.INTERGER.rawValue:\n          let length = try scanner.consumeLength()\n          let data = try scanner.consume(length: length)\n          return .integer(data: data)\n\n        case IDENTIFIERS.OBJECTID.rawValue:\n          let length = try scanner.consumeLength()\n          let data = try scanner.consume(length: length)\n          return .objectIdentifier(data: data)\n\n        case IDENTIFIERS.NULL.rawValue:\n          _ = try scanner.consume(length: 1)\n          return .null\n\n        case IDENTIFIERS.BITSTRING.rawValue:\n          let length = try scanner.consumeLength()\n\n          // There's an extra byte (0x00) after the bit string length in all the keys I've encountered.\n          // I couldn't find a specification that referenced this extra byte, but let's consume it and discard it.\n          _ = try scanner.consume(length: 1)\n\n          let data = try scanner.consume(length: length - 1)\n          return .bitString(data: data)\n\n        case IDENTIFIERS.OCTETSTRING.rawValue:\n          let length = try scanner.consumeLength()\n          let data = try scanner.consume(length: length)\n          return .octetString(data: data)\n\n        default:\n          throw DecodingError.invalidType(value: firstByte)\n      }\n    }\n\n    /// Parses an ASN1 sequence and returns its child nodes\n    ///\n    /// - Parameter data: ASN1 data\n    /// - Returns: A list of ASN1 nodes\n    /// - Throws: A DecodingError if anything goes wrong, or if an unknown node was encountered\n    private static func decodeSequence(data: Data) throws -> [Node] {\n      let scanner = ASN1.Scanner(data: data)\n      var nodes: [Node] = []\n      while !scanner.isComplete {\n        let node = try decodeNode(scanner: scanner)\n        nodes.append(node)\n      }\n      return nodes\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/ASN1/ASN1Encoder.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n//  ASN1 Code inspired by Asn1Parser.swift from SwiftyRSA\n\nimport Foundation\n\nextension ASN1 {\n  enum Encoder {\n    /// Encodes an ASN1Node into it's byte representation\n    ///\n    /// - Parameter node: The Node to encode\n    /// - Returns: The encoded bytes as a UInt8 array\n    ///\n    /// - Warning: This ASN.1 encoder has only been tested to work on certain ASN.1 data structures such as DER and PEM files. Before using this encoder for another application, ensure you test it's behavior accordingly.\n    /// - Warning: This encoder makes no assumptions regarding Integer bit layout and signage. The proper serialization of Integers is left up to the user.\n    public static func encode(_ node: ASN1.Node) -> [UInt8] {\n      switch node {\n        case .integer(let integer):\n          return IDENTIFIERS.INTERGER.bytes + self.asn1LengthPrefixed(integer.byteArray)\n        case .bitString(let bits):\n          return IDENTIFIERS.BITSTRING.bytes + self.asn1LengthPrefixed([0x00] + bits.byteArray)\n        case .octetString(let octet):\n          return IDENTIFIERS.OCTETSTRING.bytes + self.asn1LengthPrefixed(octet.byteArray)\n        case .null:\n          return IDENTIFIERS.NULL.bytes\n        case .objectIdentifier(let oid):\n          return IDENTIFIERS.OBJECTID.bytes + self.asn1LengthPrefixed(oid.byteArray)\n        case .sequence(let nodes):\n          return IDENTIFIERS.SEQUENCE.bytes + self.asn1LengthPrefixed( nodes.reduce(into: Array<UInt8>(), { partialResult, node in\n            partialResult += encode(node)\n          }))\n      }\n    }\n\n    /// Calculates and returns the ASN.1 length Prefix for a chunk of data\n    ///\n    /// - Parameter bytes: The bytes to be length prefixed\n    /// - Returns: The ASN.1 length Prefix for this chuck of data (excluding the passed in data)\n    private static func asn1LengthPrefix(_ bytes: [UInt8]) -> [UInt8] {\n      if bytes.count >= 0x80 {\n        var lengthAsBytes = withUnsafeBytes(of: bytes.count.bigEndian, Array<UInt8>.init)\n        while lengthAsBytes.first == 0 { lengthAsBytes.removeFirst() }\n        return [0x80 + UInt8(lengthAsBytes.count)] + lengthAsBytes\n      } else {\n        return [UInt8(bytes.count)]\n      }\n    }\n\n    /// Prefixes the provided bytes with the appropriate ASN.1 length prefix\n    ///\n    /// - Parameter bytes: The bytes to be length prefixed\n    /// - Returns: The provided bytes with the appropriate ASN.1 length prefix prepended\n    private static func asn1LengthPrefixed(_ bytes: [UInt8]) -> [UInt8] {\n      self.asn1LengthPrefix(bytes) + bytes\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/ASN1/ASN1Scanner.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n//  ASN1 Scanner code is from Asn1Parser.swift from SwiftyRSA\n\nimport Foundation\n\nextension ASN1 {\n  /// Simple data scanner that consumes bytes from a raw data and keeps an updated position.\n  internal class Scanner {\n\n    enum ScannerError: Error {\n      case outOfBounds\n    }\n\n    let data: Data\n    var index: Int = 0\n\n    /// Returns whether there is no more data to consume\n    var isComplete: Bool {\n      return self.index >= self.data.count\n    }\n\n    /// Creates a scanner with provided data\n    ///\n    /// - Parameter data: Data to consume\n    init(data: Data) {\n      self.data = data\n    }\n\n    /// Consumes data of provided length and returns it\n    ///\n    /// - Parameter length: length of the data to consume\n    /// - Returns: data consumed\n    /// - Throws: ScannerError.outOfBounds error if asked to consume too many bytes\n    func consume(length: Int) throws -> Data {\n\n      guard length > 0 else {\n        return Data()\n      }\n\n      guard self.index + length <= self.data.count else {\n        throw ScannerError.outOfBounds\n      }\n\n      let subdata = self.data.subdata(in: self.index..<self.index + length)\n      self.index += length\n      return subdata\n    }\n\n    /// Consumes a primitive, definite ASN1 length and returns its value.\n    ///\n    /// See http://luca.ntop.org/Teaching/Appunti/asn1.html,\n    ///\n    /// - Short form. One octet. Bit 8 has value \"0\" and bits 7-1 give the length.\n    /// - Long form. Two to 127 octets. Bit 8 of first octet has value \"1\" and\n    ///   bits 7-1 give the number of additional length octets.\n    ///   Second and following octets give the length, base 256, most significant digit first.\n    ///\n    /// - Returns: Length that was consumed\n    /// - Throws: ScannerError.outOfBounds error if asked to consume too many bytes\n    func consumeLength() throws -> Int {\n\n      let lengthByte = try consume(length: 1).firstByte\n\n      // If the first byte's value is less than 0x80, it directly contains the length\n      // so we can return it\n      guard lengthByte >= 0x80 else {\n        return Int(lengthByte)\n      }\n\n      // If the first byte's value is more than 0x80, it indicates how many following bytes\n      // will describe the length. For instance, 0x85 indicates that 0x85 - 0x80 = 0x05 = 5\n      // bytes will describe the length, so we need to read the 5 next bytes and get their integer\n      // value to determine the length.\n      let nextByteCount = lengthByte - 0x80\n      let length = try consume(length: Int(nextByteCount))\n\n      return length.integer\n    }\n  }\n}\n\ninternal extension Data {\n\n  /// Returns the first byte of the current data\n  var firstByte: UInt8 {\n    var byte: UInt8 = 0\n    copyBytes(to: &byte, count: MemoryLayout<UInt8>.size)\n    return byte\n  }\n\n  /// Returns the integer value of the current data.\n  /// - Warning: This only supports data up to 4 bytes, as we can only extract 32-bit integers.\n  var integer: Int {\n\n    guard count > 0 else {\n      return 0\n    }\n\n    var int: UInt32 = 0\n    var offset: Int32 = Int32(count - 1)\n    forEach { byte in\n      let byte32 = UInt32(byte)\n      let shifted = byte32 << (UInt32(offset) * 8)\n      int = int | shifted\n      offset -= 1\n    }\n\n    return Int(int)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Array+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nextension Array {\n  @inlinable\n  init(reserveCapacity: Int) {\n    self = Array<Element>()\n    self.reserveCapacity(reserveCapacity)\n  }\n\n  @inlinable\n  var slice: ArraySlice<Element> {\n    self[self.startIndex ..< self.endIndex]\n  }\n  \n  @inlinable\n  subscript (safe index: Index) -> Element? {\n    return indices.contains(index) ? self[index] : nil\n  }\n}\n\nextension Array where Element == UInt8 {\n  public init(hex: String) {\n    self.init(reserveCapacity: hex.unicodeScalars.lazy.underestimatedCount)\n    var buffer: UInt8?\n    var skip = hex.hasPrefix(\"0x\") ? 2 : 0\n    for char in hex.unicodeScalars.lazy {\n      guard skip == 0 else {\n        skip -= 1\n        continue\n      }\n      guard char.value >= 48 && char.value <= 102 else {\n        removeAll()\n        return\n      }\n      let v: UInt8\n      let c: UInt8 = UInt8(char.value)\n      switch c {\n        case let c where c <= 57:\n          v = c - 48\n        case let c where c >= 65 && c <= 70:\n          v = c - 55\n        case let c where c >= 97:\n          v = c - 87\n        default:\n          removeAll()\n          return\n      }\n      if let b = buffer {\n        append(b << 4 | v)\n        buffer = nil\n      } else {\n        buffer = v\n      }\n    }\n    if let b = buffer {\n      append(b)\n    }\n  }\n\n  public func toHexString() -> String {\n    `lazy`.reduce(into: \"\") {\n      var s = String($1, radix: 16)\n      if s.count == 1 {\n        s = \"0\" + s\n      }\n      $0 += s\n    }\n  }\n}\n\nextension Array where Element == UInt8 {\n  /// split in chunks with given chunk size\n  @available(*, deprecated)\n  public func chunks(size chunksize: Int) -> Array<Array<Element>> {\n    var words = Array<Array<Element>>()\n    words.reserveCapacity(count / chunksize)\n    for idx in stride(from: chunksize, through: count, by: chunksize) {\n      words.append(Array(self[idx - chunksize ..< idx])) // slow for large table\n    }\n    let remainder = suffix(count % chunksize)\n    if !remainder.isEmpty {\n      words.append(Array(remainder))\n    }\n    return words\n  }\n\n  public func md5() -> [Element] {\n    Digest.md5(self)\n  }\n\n  public func sha1() -> [Element] {\n    Digest.sha1(self)\n  }\n\n  public func sha224() -> [Element] {\n    Digest.sha224(self)\n  }\n\n  public func sha256() -> [Element] {\n    Digest.sha256(self)\n  }\n\n  public func sha384() -> [Element] {\n    Digest.sha384(self)\n  }\n\n  public func sha512() -> [Element] {\n    Digest.sha512(self)\n  }\n\n  public func sha2(_ variant: SHA2.Variant) -> [Element] {\n    Digest.sha2(self, variant: variant)\n  }\n\n  public func sha3(_ variant: SHA3.Variant) -> [Element] {\n    Digest.sha3(self, variant: variant)\n  }\n\n  public func crc32(seed: UInt32? = nil, reflect: Bool = true) -> UInt32 {\n    Checksum.crc32(self, seed: seed, reflect: reflect)\n  }\n\n  public func crc32c(seed: UInt32? = nil, reflect: Bool = true) -> UInt32 {\n    Checksum.crc32c(self, seed: seed, reflect: reflect)\n  }\n\n  public func crc16(seed: UInt16? = nil) -> UInt16 {\n    Checksum.crc16(self, seed: seed)\n  }\n\n  public func encrypt(cipher: Cipher) throws -> [Element] {\n    try cipher.encrypt(self.slice)\n  }\n\n  public func decrypt(cipher: Cipher) throws -> [Element] {\n    try cipher.decrypt(self.slice)\n  }\n\n  public func authenticate<A: Authenticator>(with authenticator: A) throws -> [Element] {\n    try authenticator.authenticate(self)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Authenticator.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/// Message authentication code.\npublic protocol Authenticator {\n  /// Calculate Message Authentication Code (MAC) for message.\n  func authenticate(_ bytes: Array<UInt8>) throws -> Array<UInt8>\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BatchedCollection.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n@usableFromInline\nstruct BatchedCollectionIndex<Base: Collection> {\n  let range: Range<Base.Index>\n}\n\nextension BatchedCollectionIndex: Comparable {\n  @usableFromInline\n  static func == <BaseCollection>(lhs: BatchedCollectionIndex<BaseCollection>, rhs: BatchedCollectionIndex<BaseCollection>) -> Bool {\n    lhs.range.lowerBound == rhs.range.lowerBound\n  }\n\n  @usableFromInline\n  static func < <BaseCollection>(lhs: BatchedCollectionIndex<BaseCollection>, rhs: BatchedCollectionIndex<BaseCollection>) -> Bool {\n    lhs.range.lowerBound < rhs.range.lowerBound\n  }\n}\n\nprotocol BatchedCollectionType: Collection {\n  associatedtype Base: Collection\n}\n\n@usableFromInline\nstruct BatchedCollection<Base: Collection>: Collection {\n  let base: Base\n  let size: Int\n\n  @usableFromInline\n  init(base: Base, size: Int) {\n    self.base = base\n    self.size = size\n  }\n\n  @usableFromInline\n  typealias Index = BatchedCollectionIndex<Base>\n\n  private func nextBreak(after idx: Base.Index) -> Base.Index {\n    self.base.index(idx, offsetBy: self.size, limitedBy: self.base.endIndex) ?? self.base.endIndex\n  }\n\n  @usableFromInline\n  var startIndex: Index {\n    Index(range: self.base.startIndex..<self.nextBreak(after: self.base.startIndex))\n  }\n\n  @usableFromInline\n  var endIndex: Index {\n    Index(range: self.base.endIndex..<self.base.endIndex)\n  }\n\n  @usableFromInline\n  func index(after idx: Index) -> Index {\n    Index(range: idx.range.upperBound..<self.nextBreak(after: idx.range.upperBound))\n  }\n\n  @usableFromInline\n  subscript(idx: Index) -> Base.SubSequence {\n    self.base[idx.range]\n  }\n}\n\nextension Collection {\n  @inlinable\n  func batched(by size: Int) -> BatchedCollection<Self> {\n    BatchedCollection(base: self, size: size)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Bit.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic enum Bit: Int {\n  case zero\n  case one\n}\n\nextension Bit {\n  @inlinable\n  func inverted() -> Bit {\n    self == .zero ? .one : .zero\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockCipher.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nprotocol BlockCipher: Cipher {\n  static var blockSize: Int { get }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockDecryptor.swift",
    "content": "//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic class BlockDecryptor: Cryptor, Updatable {\n\n  public enum Error: Swift.Error {\n    case unsupported\n  }\n\n  @usableFromInline\n  let blockSize: Int\n\n  @usableFromInline\n  let padding: Padding\n\n  @usableFromInline\n  var worker: CipherModeWorker\n\n  @usableFromInline\n  var accumulated = Array<UInt8>()\n\n  @usableFromInline\n  init(blockSize: Int, padding: Padding, _ worker: CipherModeWorker) throws {\n    self.blockSize = blockSize\n    self.padding = padding\n    self.worker = worker\n  }\n\n  @inlinable\n  public func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = false) throws -> Array<UInt8> {\n    self.accumulated += bytes\n\n    // If a worker (eg GCM) can combine ciphertext + tag\n    // we need to remove tag from the ciphertext.\n    if !isLast && self.accumulated.count < self.blockSize + self.worker.additionalBufferSize {\n      return []\n    }\n\n    let accumulatedWithoutSuffix: Array<UInt8>\n    if self.worker.additionalBufferSize > 0 {\n      // FIXME: how slow is that?\n      accumulatedWithoutSuffix = Array(self.accumulated.prefix(self.accumulated.count - self.worker.additionalBufferSize))\n    } else {\n      accumulatedWithoutSuffix = self.accumulated\n    }\n\n    var processedBytesCount = 0\n    var plaintext = Array<UInt8>(reserveCapacity: accumulatedWithoutSuffix.count)\n    // Processing in a block-size manner. It's good for block modes, but bad for stream modes.\n    for var chunk in accumulatedWithoutSuffix.batched(by: self.blockSize) {\n      if isLast || (accumulatedWithoutSuffix.count - processedBytesCount) >= blockSize {\n        let isLastChunk = processedBytesCount + chunk.count == accumulatedWithoutSuffix.count\n\n        if isLast, isLastChunk, var finalizingWorker = worker as? FinalizingDecryptModeWorker {\n          chunk = try finalizingWorker.willDecryptLast(bytes: chunk + accumulated.suffix(worker.additionalBufferSize)) // tag size\n        }\n\n        if !chunk.isEmpty {\n          plaintext += worker.decrypt(block: chunk)\n        }\n\n        if isLast, isLastChunk, var finalizingWorker = worker as? FinalizingDecryptModeWorker {\n          plaintext = Array(try finalizingWorker.didDecryptLast(bytes: plaintext.slice))\n        }\n\n        processedBytesCount += chunk.count\n      }\n    }\n    accumulated.removeFirst(processedBytesCount) // super-slow\n\n    if isLast {\n      if accumulatedWithoutSuffix.isEmpty, var finalizingWorker = worker as? FinalizingDecryptModeWorker {\n        try finalizingWorker.willDecryptLast(bytes: self.accumulated.suffix(self.worker.additionalBufferSize))\n        plaintext = Array(try finalizingWorker.didDecryptLast(bytes: plaintext.slice))\n      }\n      plaintext = self.padding.remove(from: plaintext, blockSize: self.blockSize)\n    }\n\n    return plaintext\n  }\n\n  public func seek(to position: Int) throws {\n    guard var worker = self.worker as? SeekableModeWorker else {\n      throw Error.unsupported\n    }\n\n    try worker.seek(to: position)\n    self.worker = worker\n\n    accumulated = []\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockEncryptor.swift",
    "content": "//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n@usableFromInline\nfinal class BlockEncryptor: Cryptor, Updatable {\n\n  public enum Error: Swift.Error {\n    case unsupported\n  }\n\n  private let blockSize: Int\n  private var worker: CipherModeWorker\n  private let padding: Padding\n  // Accumulated bytes. Not all processed bytes.\n  private var accumulated = Array<UInt8>(reserveCapacity: 16)\n\n  private var lastBlockRemainder = 0\n\n  @usableFromInline\n  init(blockSize: Int, padding: Padding, _ worker: CipherModeWorker) throws {\n    self.blockSize = blockSize\n    self.padding = padding\n    self.worker = worker\n  }\n\n  // MARK: Updatable\n\n  public func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool) throws -> Array<UInt8> {\n    self.accumulated += bytes\n\n    if isLast {\n      self.accumulated = self.padding.add(to: self.accumulated, blockSize: self.blockSize)\n    }\n\n    var encrypted = Array<UInt8>(reserveCapacity: accumulated.count)\n    for chunk in self.accumulated.batched(by: self.blockSize) {\n      if isLast || chunk.count == self.blockSize {\n        encrypted += self.worker.encrypt(block: chunk)\n      }\n    }\n\n    // Stream encrypts all, so it removes all elements\n    self.accumulated.removeFirst(encrypted.count)\n\n    if var finalizingWorker = worker as? FinalizingEncryptModeWorker, isLast == true {\n      encrypted = Array(try finalizingWorker.finalize(encrypt: encrypted.slice))\n    }\n\n    return encrypted\n  }\n\n  @usableFromInline\n  func seek(to: Int) throws {\n    throw Error.unsupported\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/BlockMode.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic typealias CipherOperationOnBlock = (_ block: ArraySlice<UInt8>) -> Array<UInt8>?\n\npublic protocol BlockMode {\n  var options: BlockModeOption { get }\n  //TODO: doesn't have to be public\n  @inlinable func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker\n\n  var customBlockSize: Int? { get }\n}\n\ntypealias StreamMode = BlockMode\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/BlockModeOptions.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic struct BlockModeOption: OptionSet {\n  public let rawValue: Int\n\n  public init(rawValue: Int) {\n    self.rawValue = rawValue\n  }\n\n  @usableFromInline\n  static let none = BlockModeOption(rawValue: 1 << 0)\n\n  @usableFromInline\n  static let initializationVectorRequired = BlockModeOption(rawValue: 1 << 1)\n\n  @usableFromInline\n  static let paddingRequired = BlockModeOption(rawValue: 1 << 2)\n\n  @usableFromInline\n  static let useEncryptToDecrypt = BlockModeOption(rawValue: 1 << 3)\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/CBC.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  Cipher-block chaining (CBC)\n//\n\npublic struct CBC: BlockMode {\n  public enum Error: Swift.Error {\n    /// Invalid IV\n    case invalidInitializationVector\n  }\n\n  public let options: BlockModeOption = [.initializationVectorRequired, .paddingRequired]\n  \n  private let iv: Array<UInt8>\n\n  public let customBlockSize: Int? = nil\n\n  public init(iv: Array<UInt8>) {\n    self.iv = iv\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    if self.iv.count != blockSize {\n      throw Error.invalidInitializationVector\n    }\n\n    return CBCModeWorker(blockSize: blockSize, iv: self.iv.slice, cipherOperation: cipherOperation)\n  }\n}\n\nstruct CBCModeWorker: BlockModeWorker {\n  let cipherOperation: CipherOperationOnBlock\n  var blockSize: Int\n  let additionalBufferSize: Int = 0\n  private let iv: ArraySlice<UInt8>\n  private var prev: ArraySlice<UInt8>?\n\n  @inlinable\n  init(blockSize: Int, iv: ArraySlice<UInt8>, cipherOperation: @escaping CipherOperationOnBlock) {\n    self.blockSize = blockSize\n    self.iv = iv\n    self.cipherOperation = cipherOperation\n  }\n\n  @inlinable\n  mutating func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    guard let ciphertext = cipherOperation(xor(prev ?? iv, plaintext)) else {\n      return Array(plaintext)\n    }\n    self.prev = ciphertext.slice\n    return ciphertext\n  }\n\n  @inlinable\n  mutating func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    guard let plaintext = cipherOperation(ciphertext) else {\n      return Array(ciphertext)\n    }\n    let result: Array<UInt8> = xor(prev ?? self.iv, plaintext)\n    self.prev = ciphertext\n    return result\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/CCM.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// CCM mode combines the well known CBC-MAC with the well known counter mode of encryption.\n// https://tools.ietf.org/html/rfc3610\n// https://csrc.nist.gov/publications/detail/sp/800-38c/final\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(ucrt)\nimport ucrt\n#elseif canImport(WASILibc)\nimport WASILibc\n#endif\n\n/// Counter with Cipher Block Chaining-Message Authentication Code\npublic struct CCM: StreamMode {\n  public enum Error: Swift.Error {\n    /// Invalid IV\n    case invalidInitializationVector\n    case invalidParameter\n    case fail\n  }\n\n  public let options: BlockModeOption = [.initializationVectorRequired, .useEncryptToDecrypt]\n  private let nonce: Array<UInt8>\n  private let additionalAuthenticatedData: Array<UInt8>?\n  private let tagLength: Int\n  private let messageLength: Int // total message length. need to know in advance\n  public let customBlockSize: Int? = nil\n\n  // `authenticationTag` nil for encryption, known tag for decryption\n  /// For encryption, the value is set at the end of the encryption.\n  /// For decryption, this is a known Tag to validate against.\n  public var authenticationTag: Array<UInt8>?\n\n  /// Initialize CCM\n  ///\n  /// - Parameters:\n  ///   - iv: Initialization vector. Nonce. Valid length between 7 and 13 bytes.\n  ///   - tagLength: Authentication tag length, in bytes. Value of {4, 6, 8, 10, 12, 14, 16}.\n  ///   - messageLength: Plaintext message length (excluding tag if attached). Length have to be provided in advance.\n  ///   - additionalAuthenticatedData: Additional authenticated data.\n  public init(iv: Array<UInt8>, tagLength: Int, messageLength: Int, additionalAuthenticatedData: Array<UInt8>? = nil) {\n    self.nonce = iv\n    self.tagLength = tagLength\n    self.additionalAuthenticatedData = additionalAuthenticatedData\n    self.messageLength = messageLength // - tagLength\n  }\n\n  /// Initialize CCM\n  ///\n  /// - Parameters:\n  ///   - iv: Initialization vector. Nonce. Valid length between 7 and 13 bytes.\n  ///   - tagLength: Authentication tag length, in bytes. Value of {4, 6, 8, 10, 12, 14, 16}.\n  ///   - messageLength: Plaintext message length (excluding tag if attached). Length have to be provided in advance.\n  ///   - authenticationTag: Authentication Tag value if not concatenated to ciphertext.\n  ///   - additionalAuthenticatedData: Additional authenticated data.\n  public init(iv: Array<UInt8>, tagLength: Int, messageLength: Int, authenticationTag: Array<UInt8>, additionalAuthenticatedData: Array<UInt8>? = nil) {\n    self.init(iv: iv, tagLength: tagLength, messageLength: messageLength, additionalAuthenticatedData: additionalAuthenticatedData)\n    self.authenticationTag = authenticationTag\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    if self.nonce.isEmpty {\n      throw Error.invalidInitializationVector\n    }\n\n    return CCMModeWorker(blockSize: blockSize, nonce: self.nonce.slice, messageLength: self.messageLength, additionalAuthenticatedData: self.additionalAuthenticatedData, tagLength: self.tagLength, cipherOperation: cipherOperation)\n  }\n}\n\nclass CCMModeWorker: StreamModeWorker, SeekableModeWorker, CounterModeWorker, FinalizingEncryptModeWorker, FinalizingDecryptModeWorker {\n  typealias Counter = Int\n  var counter = 0\n\n  let cipherOperation: CipherOperationOnBlock\n  let blockSize: Int\n  private let tagLength: Int\n  private let messageLength: Int // total message length. need to know in advance\n  private let q: UInt8\n\n  let additionalBufferSize: Int\n  private var keystreamPosIdx = 0\n  private let nonce: Array<UInt8>\n  private var last_y: ArraySlice<UInt8> = []\n  private var keystream: Array<UInt8> = []\n  // Known Tag used to validate during decryption\n  private var expectedTag: Array<UInt8>?\n\n  public enum Error: Swift.Error {\n    case invalidParameter\n  }\n\n  init(blockSize: Int, nonce: ArraySlice<UInt8>, messageLength: Int, additionalAuthenticatedData: [UInt8]?, expectedTag: Array<UInt8>? = nil, tagLength: Int, cipherOperation: @escaping CipherOperationOnBlock) {\n    self.blockSize = 16 // CCM is defined for 128 block size\n    self.tagLength = tagLength\n    self.additionalBufferSize = tagLength\n    self.messageLength = messageLength\n    self.expectedTag = expectedTag\n    self.cipherOperation = cipherOperation\n    self.nonce = Array(nonce)\n    self.q = UInt8(15 - nonce.count) // n = 15-q\n\n    let hasAssociatedData = additionalAuthenticatedData != nil && !additionalAuthenticatedData!.isEmpty\n    self.processControlInformation(nonce: self.nonce, tagLength: tagLength, hasAssociatedData: hasAssociatedData)\n\n    if let aad = additionalAuthenticatedData, hasAssociatedData {\n      self.process(aad: aad)\n    }\n  }\n\n  // For the very first time setup new IV (aka y0) from the block0\n  private func processControlInformation(nonce: [UInt8], tagLength: Int, hasAssociatedData: Bool) {\n    let block0 = try! format(nonce: nonce, Q: UInt32(self.messageLength), q: self.q, t: UInt8(tagLength), hasAssociatedData: hasAssociatedData).slice\n    let y0 = self.cipherOperation(block0)!.slice\n    self.last_y = y0\n  }\n\n  private func process(aad: [UInt8]) {\n    let encodedAAD = format(aad: aad)\n\n    for block_i in encodedAAD.batched(by: 16) {\n      let y_i = self.cipherOperation(xor(block_i, self.last_y))!.slice\n      self.last_y = y_i\n    }\n  }\n\n  private func S(i: Int) throws -> [UInt8] {\n    let ctr = try format(counter: i, nonce: nonce, q: q)\n    return self.cipherOperation(ctr.slice)!\n  }\n\n  @inlinable\n  func seek(to position: Int) throws {\n    self.counter = position\n    self.keystream = try self.S(i: position)\n    let offset = position % self.blockSize\n    self.keystreamPosIdx = offset\n  }\n\n  func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    var result = Array<UInt8>(reserveCapacity: plaintext.count)\n\n    var processed = 0\n    while processed < plaintext.count {\n      // Need a full block here to update keystream and do CBC\n      if self.keystream.isEmpty || self.keystreamPosIdx == self.blockSize {\n        // y[i], where i is the counter. Can encrypt 1 block at a time\n        self.counter += 1\n        guard let S = try? S(i: counter) else { return Array(plaintext) }\n        let plaintextP = addPadding(Array(plaintext), blockSize: blockSize)\n        guard let y = cipherOperation(xor(last_y, plaintextP)) else { return Array(plaintext) }\n        self.last_y = y.slice\n\n        self.keystream = S\n        self.keystreamPosIdx = 0\n      }\n\n      let xored: Array<UInt8> = xor(plaintext[plaintext.startIndex.advanced(by: processed)...], keystream[keystreamPosIdx...])\n      keystreamPosIdx += xored.count\n      processed += xored.count\n      result += xored\n    }\n    return result\n  }\n\n  @inlinable\n  func finalize(encrypt ciphertext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // concatenate T at the end\n    guard let S0 = try? S(i: 0) else { return ciphertext }\n\n    let computedTag = xor(last_y.prefix(self.tagLength), S0) as ArraySlice<UInt8>\n    return ciphertext + computedTag\n  }\n\n  // Decryption is stream\n  // CBC is block\n  private var accumulatedPlaintext: [UInt8] = []\n\n  func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    var output = Array<UInt8>(reserveCapacity: ciphertext.count)\n\n    do {\n      var currentCounter = self.counter\n      var processed = 0\n      while processed < ciphertext.count {\n        // Need a full block here to update keystream and do CBC\n        // New keystream for a new block\n        if self.keystream.isEmpty || self.keystreamPosIdx == self.blockSize {\n          currentCounter += 1\n          guard let S = try? S(i: currentCounter) else { return Array(ciphertext) }\n          self.keystream = S\n          self.keystreamPosIdx = 0\n        }\n\n        let xored: Array<UInt8> = xor(ciphertext[ciphertext.startIndex.advanced(by: processed)...], keystream[keystreamPosIdx...]) // plaintext\n        keystreamPosIdx += xored.count\n        processed += xored.count\n        output += xored\n        self.counter = currentCounter\n      }\n    }\n\n    // Accumulate plaintext for the MAC calculations at the end.\n    // It would be good to process it together though, here.\n    self.accumulatedPlaintext += output\n\n    // Shouldn't return plaintext until validate tag.\n    // With incremental update, can't validate tag until all block are processed.\n    return output\n  }\n\n  @inlinable\n  func finalize(decrypt plaintext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // concatenate T at the end\n    let computedTag = Array(last_y.prefix(self.tagLength))\n    guard let expectedTag = self.expectedTag, expectedTag == computedTag else {\n      throw CCM.Error.fail\n    }\n\n    return plaintext\n  }\n\n  @discardableResult\n  func willDecryptLast(bytes ciphertext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // get tag of additionalBufferSize size\n    // `ciphertext` contains at least additionalBufferSize bytes\n    // overwrite expectedTag property used later for verification\n    guard let S0 = try? S(i: 0) else { return ciphertext }\n    self.expectedTag = xor(ciphertext.suffix(self.tagLength), S0) as [UInt8]\n    return ciphertext[ciphertext.startIndex..<ciphertext.endIndex.advanced(by: -Swift.min(tagLength, ciphertext.count))]\n  }\n\n  @inlinable\n  func didDecryptLast(bytes plaintext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n\n    // Calculate Tag, from the last CBC block, for accumulated plaintext.\n    var processed = 0\n    for block in self.accumulatedPlaintext.batched(by: self.blockSize) {\n      let blockP = addPadding(Array(block), blockSize: blockSize)\n      guard let y = cipherOperation(xor(last_y, blockP)) else { return plaintext }\n      self.last_y = y.slice\n      processed += block.count\n    }\n    self.accumulatedPlaintext.removeFirst(processed)\n    return plaintext\n  }\n}\n\n// Q - octet length of P\n// q - octet length of Q. Maximum length (in octets) of payload. An element of {2,3,4,5,6,7,8}\n// t - octet length of T (MAC length). An element of {4,6,8,10,12,14,16}\nprivate func format(nonce N: [UInt8], Q: UInt32, q: UInt8, t: UInt8, hasAssociatedData: Bool) throws -> [UInt8] {\n  var flags0: UInt8 = 0\n\n  if hasAssociatedData {\n    // 7 bit\n    flags0 |= (1 << 6)\n  }\n\n  // 6,5,4 bit is t in 3 bits\n  flags0 |= (((t - 2) / 2) & 0x07) << 3\n\n  // 3,2,1 bit is q in 3 bits\n  flags0 |= ((q - 1) & 0x07) << 0\n\n  var block0: [UInt8] = Array<UInt8>(repeating: 0, count: 16)\n  block0[0] = flags0\n\n  // N in 1...(15-q) octets, n = 15-q\n  // n is an element of {7,8,9,10,11,12,13}\n  let n = 15 - Int(q)\n  guard (n + Int(q)) == 15 else {\n    // n+q == 15\n    throw CCMModeWorker.Error.invalidParameter\n  }\n  block0[1...n] = N[0...(n - 1)]\n\n  // Q in (16-q)...15 octets\n  block0[(16 - Int(q))...15] = Q.bytes(totalBytes: Int(q)).slice\n\n  return block0\n}\n\n/// Formatting of the Counter Blocks. Ctr[i]\n/// The counter generation function.\n/// Q - octet length of P\n/// q - octet length of Q. Maximum length (in octets) of payload. An element of {2,3,4,5,6,7,8}\nprivate func format(counter i: Int, nonce N: [UInt8], q: UInt8) throws -> [UInt8] {\n  var flags0: UInt8 = 0\n\n  // bit 8,7 is Reserved\n  // bit 4,5,6 shall be set to 0\n  // 3,2,1 bit is q in 3 bits\n  flags0 |= ((q - 1) & 0x07) << 0\n\n  var block = Array<UInt8>(repeating: 0, count: 16) // block[0]\n  block[0] = flags0\n\n  // N in 1...(15-q) octets, n = 15-q\n  // n is an element of {7,8,9,10,11,12,13}\n  let n = 15 - Int(q)\n  guard (n + Int(q)) == 15 else {\n    // n+q == 15\n    throw CCMModeWorker.Error.invalidParameter\n  }\n  block[1...n] = N[0...(n - 1)]\n\n  // [i]8q in (16-q)...15 octets\n  block[(16 - Int(q))...15] = i.bytes(totalBytes: Int(q)).slice\n\n  return block\n}\n\n/// Resulting can be partitioned into 16-octet blocks\nprivate func format(aad: [UInt8]) -> [UInt8] {\n  let a = aad.count\n\n  switch Double(a) {\n    case 0..<65280: // 2^16-2^8\n      // [a]16\n      return addPadding(a.bytes(totalBytes: 2) + aad, blockSize: 16)\n    case 65280..<4_294_967_296: // 2^32\n      // [a]32\n      return addPadding([0xFF, 0xFE] + a.bytes(totalBytes: 4) + aad, blockSize: 16)\n    case 4_294_967_296..<pow(2, 64): // 2^64\n      // [a]64\n      return addPadding([0xFF, 0xFF] + a.bytes(totalBytes: 8) + aad, blockSize: 16)\n    default:\n      // Reserved\n      return addPadding(aad, blockSize: 16)\n  }\n}\n\n// If data is not a multiple of block size bytes long then the remainder is zero padded\n// Note: It's similar to ZeroPadding, but it's not the same.\nprivate func addPadding(_ bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n  if bytes.isEmpty {\n    return Array<UInt8>(repeating: 0, count: blockSize)\n  }\n\n  let remainder = bytes.count % blockSize\n  if remainder == 0 {\n    return bytes\n  }\n\n  let paddingCount = blockSize - remainder\n  if paddingCount > 0 {\n    return bytes + Array<UInt8>(repeating: 0, count: paddingCount)\n  }\n  return bytes\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/CFB.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  Cipher feedback (CFB)\n//\n\npublic struct CFB: BlockMode {\n  public enum Error: Swift.Error {\n    /// Invalid IV\n    case invalidInitializationVector\n  }\n    \n  public enum SegmentSize: Int {\n    case cfb8 = 1 // Encrypt byte per byte\n    case cfb128 = 16 // Encrypt 16 bytes per 16 bytes (default)\n  }\n\n  public let options: BlockModeOption = [.initializationVectorRequired, .useEncryptToDecrypt]\n  private let iv: Array<UInt8>\n  private let segmentSize: SegmentSize\n  public let customBlockSize: Int?\n\n  public init(iv: Array<UInt8>, segmentSize: SegmentSize = .cfb128) {\n    self.iv = iv\n    self.segmentSize = segmentSize\n    self.customBlockSize = segmentSize.rawValue\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    if !(self.iv.count == blockSize || (segmentSize == .cfb8 && self.iv.count == AES.blockSize)) {\n      throw Error.invalidInitializationVector\n    }\n\n    return CFBModeWorker(blockSize: blockSize, iv: self.iv.slice, segmentSize: segmentSize, cipherOperation: cipherOperation)\n  }\n}\n\nstruct CFBModeWorker: BlockModeWorker {\n  let cipherOperation: CipherOperationOnBlock\n  let blockSize: Int\n  let additionalBufferSize: Int = 0\n  private let iv: ArraySlice<UInt8>\n  private let segmentSize: CFB.SegmentSize\n  private var prev: ArraySlice<UInt8>?\n\n  init(blockSize: Int, iv: ArraySlice<UInt8>, segmentSize: CFB.SegmentSize, cipherOperation: @escaping CipherOperationOnBlock) {\n    self.blockSize = blockSize\n    self.iv = iv\n    self.segmentSize = segmentSize\n    self.cipherOperation = cipherOperation\n  }\n\n  @inlinable\n  mutating func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    switch segmentSize {\n    case .cfb128:\n      guard let ciphertext = cipherOperation(prev ?? iv) else {\n        return Array(plaintext)\n      }\n      self.prev = xor(plaintext, ciphertext.slice)\n      return Array(self.prev ?? [])\n    case .cfb8:\n      guard let ciphertext = cipherOperation(prev ?? iv) else {\n        return Array(plaintext)\n      }\n      let result = [Array(plaintext)[0] ^ Array(ciphertext)[0]]\n      self.prev = Array((prev ?? iv).dropFirst()) + [result[0]]\n      return result\n    }\n  }\n\n  @inlinable\n  mutating func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    switch segmentSize {\n    case .cfb128:\n      guard let plaintext = cipherOperation(prev ?? iv) else {\n        return Array(ciphertext)\n      }\n      let result: Array<UInt8> = xor(plaintext, ciphertext)\n      prev = ciphertext\n      return result\n    case .cfb8:\n      guard let plaintext = cipherOperation(prev ?? iv) else {\n        return Array(ciphertext)\n      }\n      self.prev = Array((prev ?? iv).dropFirst()) + [Array(ciphertext)[0]]\n      return [Array(ciphertext)[0] ^ Array(plaintext)[0]]\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/CTR.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  Counter (CTR)\n\npublic struct CTR: StreamMode {\n  public enum Error: Swift.Error {\n    /// Invalid IV\n    case invalidInitializationVector\n  }\n\n  public let options: BlockModeOption = [.initializationVectorRequired, .useEncryptToDecrypt]\n  private let iv: Array<UInt8>\n  private let counter: Int\n  public let customBlockSize: Int? = nil\n\n  public init(iv: Array<UInt8>, counter: Int = 0) {\n    self.iv = iv\n    self.counter = counter\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    if self.iv.count != blockSize {\n      throw Error.invalidInitializationVector\n    }\n\n    return CTRModeWorker(blockSize: blockSize, iv: self.iv.slice, counter: self.counter, cipherOperation: cipherOperation)\n  }\n}\n\n////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////\n\nstruct CTRModeWorker: StreamModeWorker, SeekableModeWorker, CounterModeWorker {\n  typealias Counter = CTRCounter\n\n  final class CTRCounter {\n    private let constPrefix: Array<UInt8>\n    private var value: UInt64\n    //TODO: make it an updatable value, computing is too slow\n    var bytes: Array<UInt8> {\n      self.constPrefix + self.value.bytes()\n    }\n\n    @inlinable\n    init(_ initialValue: Array<UInt8>) {\n      let halfIndex = initialValue.startIndex.advanced(by: initialValue.count / 2)\n      self.constPrefix = Array(initialValue[initialValue.startIndex..<halfIndex])\n\n      let suffixBytes = Array(initialValue[halfIndex...])\n      value = UInt64(bytes: suffixBytes)\n    }\n\n    convenience init(nonce: Array<UInt8>, startAt index: Int) {\n      self.init(buildCounterValue(nonce, counter: UInt64(index)))\n    }\n\n    static func += (lhs: CTRCounter, rhs: Int) {\n      lhs.value += UInt64(rhs)\n    }\n  }\n\n  let cipherOperation: CipherOperationOnBlock\n  let additionalBufferSize: Int = 0\n  let iv: Array<UInt8>\n  var counter: CTRCounter\n\n  private let blockSize: Int\n\n  // The same keystream is used for the block length plaintext\n  // As new data is added, keystream suffix is used to xor operation.\n  private var keystream: Array<UInt8>\n  private var keystreamPosIdx = 0\n\n  init(blockSize: Int, iv: ArraySlice<UInt8>, counter: Int, cipherOperation: @escaping CipherOperationOnBlock) {\n    self.cipherOperation = cipherOperation\n    self.blockSize = blockSize\n    self.iv = Array(iv)\n\n    // the first keystream is calculated from the nonce = initial value of counter\n    self.counter = CTRCounter(nonce: Array(iv), startAt: counter)\n    self.keystream = Array(cipherOperation(self.counter.bytes.slice)!)\n  }\n\n  @inlinable\n  mutating func seek(to position: Int) throws {\n    let offset = position % self.blockSize\n    self.counter = CTRCounter(nonce: self.iv, startAt: position / self.blockSize)\n    self.keystream = Array(self.cipherOperation(self.counter.bytes.slice)!)\n    self.keystreamPosIdx = offset\n  }\n\n  // plaintext is at most blockSize long\n  @inlinable\n  mutating func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    var result = Array<UInt8>(reserveCapacity: plaintext.count)\n\n    var processed = 0\n    while processed < plaintext.count {\n      // Update keystream\n      if self.keystreamPosIdx == self.blockSize {\n        self.counter += 1\n        self.keystream = Array(self.cipherOperation(self.counter.bytes.slice)!)\n        self.keystreamPosIdx = 0\n      }\n\n      let xored: Array<UInt8> = xor(plaintext[plaintext.startIndex.advanced(by: processed)...], keystream[keystreamPosIdx...])\n      keystreamPosIdx += xored.count\n      processed += xored.count\n      result += xored\n    }\n\n    return result\n  }\n\n  mutating func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    self.encrypt(block: ciphertext)\n  }\n}\n\nprivate func buildCounterValue(_ iv: Array<UInt8>, counter: UInt64) -> Array<UInt8> {\n  let noncePartLen = iv.count / 2\n  let noncePrefix = iv[iv.startIndex..<iv.startIndex.advanced(by: noncePartLen)]\n  let nonceSuffix = iv[iv.startIndex.advanced(by: noncePartLen)..<iv.startIndex.advanced(by: iv.count)]\n  let c = UInt64(bytes: nonceSuffix) + counter\n  return noncePrefix + c.bytes()\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/CipherModeWorker.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic protocol CipherModeWorker {\n  var cipherOperation: CipherOperationOnBlock { get }\n\n  // Additional space needed when incrementally process data\n  // eg. for GCM combined mode\n  var additionalBufferSize: Int { get }\n\n  @inlinable\n  mutating func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8>\n\n  @inlinable\n  mutating func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8>\n}\n\n/// Block workers use `BlockEncryptor`\npublic protocol BlockModeWorker: CipherModeWorker {\n  var blockSize: Int { get }\n}\n\npublic protocol CounterModeWorker: CipherModeWorker {\n  associatedtype Counter\n  var counter: Counter { get set }\n}\n\npublic protocol SeekableModeWorker: CipherModeWorker {\n  mutating func seek(to position: Int) throws\n}\n\n/// Stream workers use `StreamEncryptor`\npublic protocol StreamModeWorker: CipherModeWorker {\n}\n\npublic protocol FinalizingEncryptModeWorker: CipherModeWorker {\n  // Any final calculations, eg. calculate tag\n  // Called after the last block is encrypted\n  mutating func finalize(encrypt ciphertext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8>\n}\n\npublic protocol FinalizingDecryptModeWorker: CipherModeWorker {\n  // Called before decryption, hence input is ciphertext.\n  // ciphertext is either a last block, or a tag (for stream workers)\n  @discardableResult\n  mutating func willDecryptLast(bytes ciphertext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8>\n  // Called after decryption, hence input is ciphertext\n  mutating func didDecryptLast(bytes plaintext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8>\n  // Any final calculations, eg. calculate tag\n  // Called after the last block is encrypted\n  mutating func finalize(decrypt plaintext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8>\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/ECB.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  Electronic codebook (ECB)\n//\n\npublic struct ECB: BlockMode {\n  public let options: BlockModeOption = .paddingRequired\n  public let customBlockSize: Int? = nil\n\n  public init() {\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    ECBModeWorker(blockSize: blockSize, cipherOperation: cipherOperation)\n  }\n}\n\nstruct ECBModeWorker: BlockModeWorker {\n  typealias Element = Array<UInt8>\n  let cipherOperation: CipherOperationOnBlock\n  let blockSize: Int\n  let additionalBufferSize: Int = 0\n\n  init(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock) {\n    self.blockSize = blockSize\n    self.cipherOperation = cipherOperation\n  }\n\n  @inlinable\n  mutating func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    guard let ciphertext = cipherOperation(plaintext) else {\n      return Array(plaintext)\n    }\n    return ciphertext\n  }\n\n  mutating func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    self.encrypt(block: ciphertext)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/GCM.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  Galois/Counter Mode (GCM)\n//  https://csrc.nist.gov/publications/detail/sp/800-38d/final\n//  ref: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.694.695&rep=rep1&type=pdf\n//\n\npublic final class GCM: BlockMode {\n  public enum Mode {\n    /// In combined mode, the authentication tag is directly appended to the encrypted message. This is usually what you want.\n    case combined\n    /// Some applications may need to store the authentication tag and the encrypted message at different locations.\n    case detached\n  }\n\n  public let options: BlockModeOption = [.initializationVectorRequired, .useEncryptToDecrypt]\n\n  public enum Error: Swift.Error {\n    /// Invalid IV\n    case invalidInitializationVector\n    /// Special symbol FAIL that indicates that the inputs are not authentic.\n    case fail\n  }\n\n  private let iv: Array<UInt8>\n  private let additionalAuthenticatedData: Array<UInt8>?\n  private let mode: Mode\n  public let customBlockSize: Int? = nil\n\n  /// Length of authentication tag, in bytes.\n  /// For encryption, the value is given as init parameter.\n  /// For decryption, the length of given authentication tag is used.\n  private let tagLength: Int\n\n  // `authenticationTag` nil for encryption, known tag for decryption\n  /// For encryption, the value is set at the end of the encryption.\n  /// For decryption, this is a known Tag to validate against.\n  public var authenticationTag: Array<UInt8>?\n\n  // encrypt\n  /// Possible tag lengths: 4,8,12,13,14,15,16\n  public init(iv: Array<UInt8>, additionalAuthenticatedData: Array<UInt8>? = nil, tagLength: Int = 16, mode: Mode = .detached) {\n    self.iv = iv\n    self.additionalAuthenticatedData = additionalAuthenticatedData\n    self.mode = mode\n    self.tagLength = tagLength\n  }\n\n  // decrypt\n  public convenience init(iv: Array<UInt8>, authenticationTag: Array<UInt8>, additionalAuthenticatedData: Array<UInt8>? = nil, mode: Mode = .detached) {\n    self.init(iv: iv, additionalAuthenticatedData: additionalAuthenticatedData, tagLength: authenticationTag.count, mode: mode)\n    self.authenticationTag = authenticationTag\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    if self.iv.isEmpty {\n      throw Error.invalidInitializationVector\n    }\n\n    let worker = GCMModeWorker(iv: iv.slice, aad: self.additionalAuthenticatedData?.slice, expectedTag: self.authenticationTag, tagLength: self.tagLength, mode: self.mode, cipherOperation: cipherOperation)\n    worker.didCalculateTag = { [weak self] tag in\n      self?.authenticationTag = tag\n    }\n    return worker\n  }\n}\n\n// MARK: - Worker\n\nfinal class GCMModeWorker: BlockModeWorker, FinalizingEncryptModeWorker, FinalizingDecryptModeWorker {\n  let cipherOperation: CipherOperationOnBlock\n\n  // Callback called when authenticationTag is ready\n  var didCalculateTag: ((Array<UInt8>) -> Void)?\n\n  private let tagLength: Int\n  // GCM nonce is 96-bits by default. It's the most effective length for the IV\n  private static let nonceSize = 12\n\n  // GCM is designed for 128-bit ciphers like AES (but not really for Blowfish). 64-bit mode is not implemented.\n  let blockSize = 16 // 128 bit\n  let additionalBufferSize: Int\n  private let iv: ArraySlice<UInt8>\n  private let mode: GCM.Mode\n  private var counter: UInt128\n  private let eky0: UInt128 // move to GF?\n  private let h: UInt128\n\n  // Additional authenticated data\n  private let aad: ArraySlice<UInt8>?\n  // Known Tag used to validate during decryption\n  private var expectedTag: Array<UInt8>?\n\n  // Note: need new worker to reset instance\n  // Use empty aad if not specified. AAD is optional.\n  private lazy var gf: GF = {\n    if let aad = aad {\n      return GF(aad: Array(aad), h: h, blockSize: blockSize)\n    }\n    return GF(aad: [UInt8](), h: h, blockSize: blockSize)\n  }()\n\n  init(iv: ArraySlice<UInt8>, aad: ArraySlice<UInt8>? = nil, expectedTag: Array<UInt8>? = nil, tagLength: Int, mode: GCM.Mode, cipherOperation: @escaping CipherOperationOnBlock) {\n    self.cipherOperation = cipherOperation\n    self.iv = iv\n    self.mode = mode\n    self.aad = aad\n    self.expectedTag = expectedTag\n    self.tagLength = tagLength\n    self.h = UInt128(cipherOperation(Array<UInt8>(repeating: 0, count: self.blockSize).slice)!) // empty block\n\n    if mode == .combined {\n      self.additionalBufferSize = tagLength\n    } else {\n      self.additionalBufferSize = 0\n    }\n\n    // Assume nonce is 12 bytes long, otherwise initial counter would be calculated from GHASH\n    // counter = GF.ghash(aad: [UInt8](), ciphertext: nonce)\n    if iv.count == GCMModeWorker.nonceSize {\n      self.counter = makeCounter(nonce: Array(self.iv))\n    } else {\n      self.counter = GF.ghash(h: self.h, aad: [UInt8](), ciphertext: Array(iv), blockSize: self.blockSize)\n    }\n\n    // Set constants\n    self.eky0 = UInt128(cipherOperation(self.counter.bytes.slice)!)\n  }\n\n  func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    self.counter = incrementCounter(self.counter)\n\n    guard let ekyN = cipherOperation(counter.bytes.slice) else {\n      return Array(plaintext)\n    }\n\n    // plaintext block ^ ek1\n    let ciphertext = xor(plaintext, ekyN) as Array<UInt8>\n\n    // update ghash incrementally\n    gf.ghashUpdate(block: ciphertext)\n\n    return Array(ciphertext)\n  }\n\n  @inlinable\n  func finalize(encrypt ciphertext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // Calculate MAC tag.\n    let ghash = self.gf.ghashFinish()\n    let tag = Array((ghash ^ self.eky0).bytes.prefix(self.tagLength))\n\n    // Notify handler\n    self.didCalculateTag?(tag)\n\n    switch self.mode {\n      case .combined:\n        return (ciphertext + tag).slice\n      case .detached:\n        return ciphertext\n    }\n  }\n\n  @inlinable\n  func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    self.counter = incrementCounter(self.counter)\n\n    // update ghash incrementally\n    self.gf.ghashUpdate(block: Array(ciphertext))\n\n    guard let ekN = cipherOperation(counter.bytes.slice) else {\n      return Array(ciphertext)\n    }\n\n    // ciphertext block ^ ek1\n    let plaintext = xor(ciphertext, ekN) as Array<UInt8>\n    return plaintext\n  }\n\n  // The authenticated decryption operation has five inputs: K, IV , C, A, and T. It has only a single\n  // output, either the plaintext value P or a special symbol FAIL that indicates that the inputs are not\n  // authentic.\n  @discardableResult\n  func willDecryptLast(bytes ciphertext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // Validate tag\n    switch self.mode {\n      case .combined:\n        // overwrite expectedTag property used later for verification\n        self.expectedTag = Array(ciphertext.suffix(self.tagLength))\n        return ciphertext[ciphertext.startIndex..<ciphertext.endIndex.advanced(by: -Swift.min(tagLength, ciphertext.count))]\n      case .detached:\n        return ciphertext\n    }\n  }\n\n  @inlinable\n  func didDecryptLast(bytes plaintext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // Calculate MAC tag.\n    let ghash = self.gf.ghashFinish()\n    let computedTag = Array((ghash ^ self.eky0).bytes.prefix(self.tagLength))\n\n    // Validate tag\n    guard let expectedTag = self.expectedTag, computedTag == expectedTag else {\n      throw GCM.Error.fail\n    }\n\n    return plaintext\n  }\n\n  func finalize(decrypt plaintext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // do nothing\n    plaintext\n  }\n}\n\n// MARK: - Local utils\n\nprivate func makeCounter(nonce: Array<UInt8>) -> UInt128 {\n  UInt128(nonce + [0, 0, 0, 1])\n}\n\n// Successive counter values are generated using the function incr(), which treats the rightmost 32\n// bits of its argument as a nonnegative integer with the least significant bit on the right\nprivate func incrementCounter(_ counter: UInt128) -> UInt128 {\n  let b = counter.i.b + 1\n  let a = (b == 0 ? counter.i.a + 1 : counter.i.a)\n  return UInt128((a, b))\n}\n\n// If data is not a multiple of block size bytes long then the remainder is zero padded\n// Note: It's similar to ZeroPadding, but it's not the same.\nprivate func addPadding(_ bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n  if bytes.isEmpty {\n    return Array<UInt8>(repeating: 0, count: blockSize)\n  }\n\n  let remainder = bytes.count % blockSize\n  if remainder == 0 {\n    return bytes\n  }\n\n  let paddingCount = blockSize - remainder\n  if paddingCount > 0 {\n    return bytes + Array<UInt8>(repeating: 0, count: paddingCount)\n  }\n  return bytes\n}\n\n// MARK: - GF\n\n/// The Field GF(2^128)\nprivate final class GF {\n  static let r = UInt128(a: 0xE100000000000000, b: 0)\n\n  let blockSize: Int\n  let h: UInt128\n\n  // AAD won't change\n  let aadLength: Int\n\n  // Updated for every consumed block\n  var ciphertextLength: Int\n\n  // Start with 0\n  var x: UInt128\n\n  init(aad: [UInt8], h: UInt128, blockSize: Int) {\n    self.blockSize = blockSize\n    self.aadLength = aad.count\n    self.ciphertextLength = 0\n    self.h = h\n    self.x = 0\n\n    // Calculate for AAD at the beginning\n    self.x = GF.calculateX(aad: aad, x: self.x, h: h, blockSize: blockSize)\n  }\n\n  @discardableResult\n  func ghashUpdate(block ciphertextBlock: Array<UInt8>) -> UInt128 {\n    self.ciphertextLength += ciphertextBlock.count\n    self.x = GF.calculateX(block: addPadding(ciphertextBlock, blockSize: self.blockSize), x: self.x, h: self.h, blockSize: self.blockSize)\n    return self.x\n  }\n\n  func ghashFinish() -> UInt128 {\n    // len(A) || len(C)\n    let len = UInt128(a: UInt64(aadLength * 8), b: UInt64(ciphertextLength * 8))\n    x = GF.multiply(self.x ^ len, self.h)\n    return self.x\n  }\n\n  // GHASH. One-time calculation\n  static func ghash(x startx: UInt128 = 0, h: UInt128, aad: Array<UInt8>, ciphertext: Array<UInt8>, blockSize: Int) -> UInt128 {\n    var x = self.calculateX(aad: aad, x: startx, h: h, blockSize: blockSize)\n    x = self.calculateX(ciphertext: ciphertext, x: x, h: h, blockSize: blockSize)\n\n    // len(aad) || len(ciphertext)\n    let len = UInt128(a: UInt64(aad.count * 8), b: UInt64(ciphertext.count * 8))\n    x = self.multiply(x ^ len, h)\n\n    return x\n  }\n\n  // Calculate Ciphertext part, for all blocks\n  // Not used with incremental calculation.\n  private static func calculateX(ciphertext: [UInt8], x startx: UInt128, h: UInt128, blockSize: Int) -> UInt128 {\n    let pciphertext = addPadding(ciphertext, blockSize: blockSize)\n    let blocksCount = pciphertext.count / blockSize\n\n    var x = startx\n    for i in 0..<blocksCount {\n      let cpos = i * blockSize\n      let block = pciphertext[pciphertext.startIndex.advanced(by: cpos)..<pciphertext.startIndex.advanced(by: cpos + blockSize)]\n      x = self.calculateX(block: Array(block), x: x, h: h, blockSize: blockSize)\n    }\n    return x\n  }\n\n  // block is expected to be padded with addPadding\n  private static func calculateX(block ciphertextBlock: Array<UInt8>, x: UInt128, h: UInt128, blockSize: Int) -> UInt128 {\n    let k = x ^ UInt128(ciphertextBlock)\n    return self.multiply(k, h)\n  }\n\n  // Calculate AAD part, for all blocks\n  private static func calculateX(aad: [UInt8], x startx: UInt128, h: UInt128, blockSize: Int) -> UInt128 {\n    let paad = addPadding(aad, blockSize: blockSize)\n    let blocksCount = paad.count / blockSize\n\n    var x = startx\n    for i in 0..<blocksCount {\n      let apos = i * blockSize\n      let k = x ^ UInt128(paad[paad.startIndex.advanced(by: apos)..<paad.startIndex.advanced(by: apos + blockSize)])\n      x = self.multiply(k, h)\n    }\n\n    return x\n  }\n\n  // Multiplication GF(2^128).\n  private static func multiply(_ x: UInt128, _ y: UInt128) -> UInt128 {\n    var z: UInt128 = 0\n    var v = x\n    var k = UInt128(a: 1 << 63, b: 0)\n\n    for _ in 0..<128 {\n      if y & k == k {\n        z = z ^ v\n      }\n\n      if v & 1 != 1 {\n        v = v >> 1\n      } else {\n        v = (v >> 1) ^ self.r\n      }\n\n      k = k >> 1\n    }\n\n    return z\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/OCB.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  The OCB Authenticated-Encryption Algorithm\n//  https://tools.ietf.org/html/rfc7253\n//\n\npublic final class OCB: BlockMode {\n\n  public enum Mode {\n    /// In combined mode, the authentication tag is directly appended to the encrypted message. This is usually what you want.\n    case combined\n    /// Some applications may need to store the authentication tag and the encrypted message at different locations.\n    case detached\n  }\n\n  public let options: BlockModeOption = [.initializationVectorRequired]\n\n  public enum Error: Swift.Error {\n    case invalidNonce\n    case fail\n  }\n\n  private let N: Array<UInt8>\n  private let additionalAuthenticatedData: Array<UInt8>?\n  private let mode: Mode\n  public let customBlockSize: Int? = nil\n\n  /// Length of authentication tag, in bytes.\n  /// For encryption, the value is given as init parameter.\n  /// For decryption, the length of given authentication tag is used.\n  private let tagLength: Int\n\n  // `authenticationTag` nil for encryption, known tag for decryption\n  /// For encryption, the value is set at the end of the encryption.\n  /// For decryption, this is a known Tag to validate against.\n  public var authenticationTag: Array<UInt8>?\n\n  // encrypt\n  public init(nonce N: Array<UInt8>, additionalAuthenticatedData: Array<UInt8>? = nil, tagLength: Int = 16, mode: Mode = .detached) {\n    self.N = N\n    self.additionalAuthenticatedData = additionalAuthenticatedData\n    self.mode = mode\n    self.tagLength = tagLength\n  }\n\n  // decrypt\n  @inlinable\n  public convenience init(nonce N: Array<UInt8>, authenticationTag: Array<UInt8>, additionalAuthenticatedData: Array<UInt8>? = nil, mode: Mode = .detached) {\n    self.init(nonce: N, additionalAuthenticatedData: additionalAuthenticatedData, tagLength: authenticationTag.count, mode: mode)\n    self.authenticationTag = authenticationTag\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    if self.N.isEmpty || self.N.count > 15 {\n      throw Error.invalidNonce\n    }\n\n    let worker = OCBModeWorker(N: N.slice, aad: self.additionalAuthenticatedData?.slice, expectedTag: self.authenticationTag, tagLength: self.tagLength, mode: self.mode, cipherOperation: cipherOperation, encryptionOperation: encryptionOperation)\n    worker.didCalculateTag = { [weak self] tag in\n      self?.authenticationTag = tag\n    }\n    return worker\n  }\n}\n\n// MARK: - Worker\n\nfinal class OCBModeWorker: BlockModeWorker, FinalizingEncryptModeWorker, FinalizingDecryptModeWorker {\n\n  let cipherOperation: CipherOperationOnBlock\n  var hashOperation: CipherOperationOnBlock!\n\n  // Callback called when authenticationTag is ready\n  var didCalculateTag: ((Array<UInt8>) -> Void)?\n\n  private let tagLength: Int\n\n  let blockSize = 16 // 128 bit\n  var additionalBufferSize: Int\n  private let mode: OCB.Mode\n\n  // Additional authenticated data\n  private let aad: ArraySlice<UInt8>?\n  // Known Tag used to validate during decryption\n  private var expectedTag: Array<UInt8>?\n\n  /*\n   * KEY-DEPENDENT\n   */\n  // NOTE: elements are lazily calculated\n  private var l = [Array<UInt8>]()\n  private var lAsterisk: Array<UInt8>\n  private var lDollar: Array<UInt8>\n\n  /*\n   * PER-ENCRYPTION/DECRYPTION\n   */\n  private var mainBlockCount: UInt64\n  private var offsetMain: Array<UInt8>\n  private var checksum: Array<UInt8>\n\n  init(N: ArraySlice<UInt8>, aad: ArraySlice<UInt8>? = nil, expectedTag: Array<UInt8>? = nil, tagLength: Int, mode: OCB.Mode, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) {\n\n    self.cipherOperation = cipherOperation\n    self.hashOperation = encryptionOperation\n    self.mode = mode\n    self.aad = aad\n    self.expectedTag = expectedTag\n    self.tagLength = tagLength\n\n    if mode == .combined {\n      self.additionalBufferSize = tagLength\n    } else {\n      self.additionalBufferSize = 0\n    }\n\n    /*\n     * KEY-DEPENDENT INITIALIZATION\n     */\n\n    let zeros = Array<UInt8>(repeating: 0, count: self.blockSize)\n    self.lAsterisk = self.hashOperation(zeros.slice)! /// L_* = ENCIPHER(K, zeros(128))\n    self.lDollar = double(self.lAsterisk) /// L_$ = double(L_*)\n    self.l.append(double(self.lDollar)) /// L_0 = double(L_$)\n\n    /*\n     * NONCE-DEPENDENT AND PER-ENCRYPTION/DECRYPTION INITIALIZATION\n     */\n\n    /// Nonce = num2str(TAGLEN mod 128,7) || zeros(120-bitlen(N)) || 1 || N\n    var nonce = Array<UInt8>(repeating: 0, count: blockSize)\n    nonce[(nonce.count - N.count)...] = N\n    nonce[0] = UInt8(tagLength) << 4\n    nonce[blockSize - 1 - N.count] |= 1\n\n    /// bottom = str2num(Nonce[123..128])\n    let bottom = nonce[15] & 0x3F\n\n    /// Ktop = ENCIPHER(K, Nonce[1..122] || zeros(6))\n    nonce[15] &= 0xC0\n    let Ktop = self.hashOperation(nonce.slice)!\n\n    /// Stretch = Ktop || (Ktop[1..64] xor Ktop[9..72])\n    let Stretch = Ktop + xor(Ktop[0..<8], Ktop[1..<9])\n\n    /// Offset_0 = Stretch[1+bottom..128+bottom]\n    var offsetMAIN_0 = Array<UInt8>(repeating: 0, count: blockSize)\n    let bits = bottom % 8\n    let bytes = Int(bottom / 8)\n    if bits == 0 {\n      offsetMAIN_0[0..<blockSize] = Stretch[bytes..<(bytes + blockSize)]\n    } else {\n      for i in 0..<self.blockSize {\n        let b1 = Stretch[bytes + i]\n        let b2 = Stretch[bytes + i + 1]\n        offsetMAIN_0[i] = ((b1 << bits) | (b2 >> (8 - bits)))\n      }\n    }\n\n    self.mainBlockCount = 0\n    self.offsetMain = Array<UInt8>(offsetMAIN_0.slice)\n    self.checksum = Array<UInt8>(repeating: 0, count: self.blockSize) /// Checksum_0 = zeros(128)\n  }\n\n  /// L_i = double(L_{i-1}) for every integer i > 0\n  func getLSub(_ n: Int) -> Array<UInt8> {\n    while n >= self.l.count {\n      self.l.append(double(self.l.last!))\n    }\n    return self.l[n]\n  }\n\n  func computeTag() -> Array<UInt8> {\n\n    let sum = self.hashAAD()\n\n    ///  Tag = ENCIPHER(K, Checksum_* xor Offset_* xor L_$) xor HASH(K,A)\n    return xor(self.hashOperation(xor(xor(self.checksum, self.offsetMain).slice, self.lDollar))!, sum)\n  }\n\n  func hashAAD() -> Array<UInt8> {\n    var sum = Array<UInt8>(repeating: 0, count: blockSize)\n\n    guard let aad = self.aad else {\n      return sum\n    }\n\n    var offset = Array<UInt8>(repeating: 0, count: blockSize)\n    var blockCount: UInt64 = 1\n    for aadBlock in aad.batched(by: self.blockSize) {\n\n      if aadBlock.count == self.blockSize {\n\n        /// Offset_i = Offset_{i-1} xor L_{ntz(i)}\n        offset = xor(offset, self.getLSub(ntz(blockCount)))\n\n        /// Sum_i = Sum_{i-1} xor ENCIPHER(K, A_i xor Offset_i)\n        sum = xor(sum, self.hashOperation(xor(aadBlock, offset))!)\n      } else {\n        if !aadBlock.isEmpty {\n\n          /// Offset_* = Offset_m xor L_*\n          offset = xor(offset, self.lAsterisk)\n\n          /// CipherInput = (A_* || 1 || zeros(127-bitlen(A_*))) xor Offset_*\n          let cipherInput: Array<UInt8> = xor(extend(aadBlock, size: blockSize), offset)\n\n          /// Sum = Sum_m xor ENCIPHER(K, CipherInput)\n          sum = xor(sum, self.hashOperation(cipherInput.slice)!)\n        }\n      }\n      blockCount += 1\n    }\n\n    return sum\n  }\n\n  func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n\n    if plaintext.count == self.blockSize {\n      return self.processBlock(block: plaintext, forEncryption: true)\n    } else {\n      return self.processFinalBlock(block: plaintext, forEncryption: true)\n    }\n  }\n\n  func finalize(encrypt ciphertext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n\n    let tag = self.computeTag()\n\n    self.didCalculateTag?(tag)\n\n    switch self.mode {\n      case .combined:\n        return ciphertext + tag\n      case .detached:\n        return ciphertext\n    }\n  }\n\n  func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n\n    if ciphertext.count == self.blockSize {\n      return self.processBlock(block: ciphertext, forEncryption: false)\n    } else {\n      return self.processFinalBlock(block: ciphertext, forEncryption: false)\n    }\n  }\n\n  func finalize(decrypt plaintext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // do nothing\n    plaintext\n  }\n\n  private func processBlock(block: ArraySlice<UInt8>, forEncryption: Bool) -> Array<UInt8> {\n\n    /*\n     * OCB-ENCRYPT/OCB-DECRYPT: Process any whole blocks\n     */\n\n    self.mainBlockCount += 1\n\n    /// Offset_i = Offset_{i-1} xor L_{ntz(i)}\n    self.offsetMain = xor(self.offsetMain, self.getLSub(ntz(self.mainBlockCount)))\n\n    /// C_i = Offset_i xor ENCIPHER(K, P_i xor Offset_i)\n    /// P_i = Offset_i xor DECIPHER(K, C_i xor Offset_i)\n    var mainBlock = Array<UInt8>(block)\n    mainBlock = xor(mainBlock, offsetMain)\n    mainBlock = self.cipherOperation(mainBlock.slice)!\n    mainBlock = xor(mainBlock, self.offsetMain)\n\n    /// Checksum_i = Checksum_{i-1} xor P_i\n    if forEncryption {\n      self.checksum = xor(self.checksum, block)\n    } else {\n      self.checksum = xor(self.checksum, mainBlock)\n    }\n\n    return mainBlock\n  }\n\n  private func processFinalBlock(block: ArraySlice<UInt8>, forEncryption: Bool) -> Array<UInt8> {\n\n    let out: Array<UInt8>\n\n    if block.isEmpty {\n      /// C_* = <empty string>\n      /// P_* = <empty string>\n      out = []\n\n    } else {\n\n      /// Offset_* = Offset_m xor L_*\n      self.offsetMain = xor(self.offsetMain, self.lAsterisk)\n\n      /// Pad = ENCIPHER(K, Offset_*)\n      let Pad = self.hashOperation(self.offsetMain.slice)!\n\n      /// C_* = P_* xor Pad[1..bitlen(P_*)]\n      /// P_* = C_* xor Pad[1..bitlen(C_*)]\n      out = xor(block, Pad[0..<block.count])\n\n      /// Checksum_* = Checksum_m xor (P_* || 1 || zeros(127-bitlen(P_*)))\n      let plaintext = forEncryption ? block : out.slice\n      self.checksum = xor(self.checksum, extend(plaintext, size: self.blockSize))\n    }\n    return out\n  }\n\n  // The authenticated decryption operation has five inputs: K, IV , C, A, and T. It has only a single\n  // output, either the plaintext value P or a special symbol FAIL that indicates that the inputs are not\n  // authentic.\n  @discardableResult\n  func willDecryptLast(bytes ciphertext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // Validate tag\n    switch self.mode {\n      case .combined:\n        // overwrite expectedTag property used later for verification\n        self.expectedTag = Array(ciphertext.suffix(self.tagLength))\n        return ciphertext[ciphertext.startIndex..<ciphertext.endIndex.advanced(by: -Swift.min(tagLength, ciphertext.count))]\n      case .detached:\n        return ciphertext\n    }\n  }\n\n  func didDecryptLast(bytes plaintext: ArraySlice<UInt8>) throws -> ArraySlice<UInt8> {\n    // Calculate MAC tag.\n    let computedTag = self.computeTag()\n\n    // Validate tag\n    guard let expectedTag = self.expectedTag, computedTag == expectedTag else {\n      throw OCB.Error.fail\n    }\n\n    return plaintext\n  }\n}\n\n// MARK: - Local utils\n\nprivate func ntz(_ x: UInt64) -> Int {\n  if x == 0 {\n    return 64\n  }\n\n  var xv = x\n  var n = 0\n  while (xv & 1) == 0 {\n    n += 1\n    xv = xv >> 1\n  }\n  return n\n}\n\nprivate func double(_ block: Array<UInt8>) -> Array<UInt8> {\n  var ( carry, result) = shiftLeft(block)\n\n  /*\n   * NOTE: This construction is an attempt at a constant-time implementation.\n   */\n  result[15] ^= (0x87 >> ((1 - carry) << 3))\n\n  return result\n}\n\nprivate func shiftLeft(_ block: Array<UInt8>) -> (UInt8, Array<UInt8>) {\n  var output = Array<UInt8>(repeating: 0, count: block.count)\n\n  var bit: UInt8 = 0\n\n  for i in 0..<block.count {\n    let b = block[block.count - 1 - i]\n    output[block.count - 1 - i] = ((b << 1) | bit)\n    bit = (b >> 7) & 1\n  }\n  return (bit, output)\n}\n\nprivate func extend(_ block: ArraySlice<UInt8>, size: Int) -> Array<UInt8> {\n  var output = Array<UInt8>(repeating: 0, count: size)\n  output[0..<block.count] = block\n  output[block.count] |= 0x80\n  return output\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/OFB.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// Output Feedback (OFB)\n//\n\npublic struct OFB: BlockMode {\n  public enum Error: Swift.Error {\n    /// Invalid IV\n    case invalidInitializationVector\n  }\n\n  public let options: BlockModeOption = [.initializationVectorRequired, .useEncryptToDecrypt]\n  private let iv: Array<UInt8>\n  public let customBlockSize: Int? = nil\n\n  public init(iv: Array<UInt8>) {\n    self.iv = iv\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    if self.iv.count != blockSize {\n      throw Error.invalidInitializationVector\n    }\n\n    return OFBModeWorker(blockSize: blockSize, iv: self.iv.slice, cipherOperation: cipherOperation)\n  }\n}\n\nstruct OFBModeWorker: BlockModeWorker {\n  let cipherOperation: CipherOperationOnBlock\n  let blockSize: Int\n  let additionalBufferSize: Int = 0\n  private let iv: ArraySlice<UInt8>\n  private var prev: ArraySlice<UInt8>?\n\n  init(blockSize: Int, iv: ArraySlice<UInt8>, cipherOperation: @escaping CipherOperationOnBlock) {\n    self.blockSize = blockSize\n    self.iv = iv\n    self.cipherOperation = cipherOperation\n  }\n\n  @inlinable\n  mutating func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    guard let ciphertext = cipherOperation(prev ?? iv) else {\n      return Array(plaintext)\n    }\n    self.prev = ciphertext.slice\n    return xor(plaintext, ciphertext)\n  }\n\n  @inlinable\n  mutating func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    guard let decrypted = cipherOperation(prev ?? iv) else {\n      return Array(ciphertext)\n    }\n    let plaintext: Array<UInt8> = xor(decrypted, ciphertext)\n    prev = decrypted.slice\n    return plaintext\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/BlockMode/PCBC.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  Propagating Cipher Block Chaining (PCBC)\n//\n\npublic struct PCBC: BlockMode {\n  public enum Error: Swift.Error {\n    /// Invalid IV\n    case invalidInitializationVector\n  }\n\n  public let options: BlockModeOption = [.initializationVectorRequired, .paddingRequired]\n  private let iv: Array<UInt8>\n  public let customBlockSize: Int? = nil\n\n  public init(iv: Array<UInt8>) {\n    self.iv = iv\n  }\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    if self.iv.count != blockSize {\n      throw Error.invalidInitializationVector\n    }\n\n    return PCBCModeWorker(blockSize: blockSize, iv: self.iv.slice, cipherOperation: cipherOperation)\n  }\n}\n\nstruct PCBCModeWorker: BlockModeWorker {\n  let cipherOperation: CipherOperationOnBlock\n  var blockSize: Int\n  let additionalBufferSize: Int = 0\n  private let iv: ArraySlice<UInt8>\n  private var prev: ArraySlice<UInt8>?\n\n  @inlinable\n  init(blockSize: Int, iv: ArraySlice<UInt8>, cipherOperation: @escaping CipherOperationOnBlock) {\n    self.blockSize = blockSize\n    self.iv = iv\n    self.cipherOperation = cipherOperation\n  }\n\n  @inlinable\n  mutating func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    guard let ciphertext = cipherOperation(xor(prev ?? iv, plaintext)) else {\n      return Array(plaintext)\n    }\n    self.prev = xor(plaintext, ciphertext.slice)\n    return ciphertext\n  }\n\n  @inlinable\n  mutating func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    guard let plaintext = cipherOperation(ciphertext) else {\n      return Array(ciphertext)\n    }\n    let result: Array<UInt8> = xor(prev ?? self.iv, plaintext)\n    self.prev = xor(result, ciphertext)\n    return result\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Blowfish.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  https://en.wikipedia.org/wiki/Blowfish_(cipher)\n//  Based on Paul Kocher implementation\n//\n\npublic final class Blowfish {\n  public enum Error: Swift.Error {\n    /// Data padding is required\n    case dataPaddingRequired\n    /// Invalid key or IV\n    case invalidKeyOrInitializationVector\n    /// Invalid IV\n    case invalidInitializationVector\n    /// Invalid block mode\n    case invalidBlockMode\n  }\n\n  public static let blockSize: Int = 8 // 64 bit\n  public let keySize: Int\n\n  private let blockMode: BlockMode\n  private let padding: Padding\n  private var decryptWorker: CipherModeWorker!\n  private var encryptWorker: CipherModeWorker!\n\n  private let N = 16 // rounds\n  private var P: Array<UInt32>\n  private var S: Array<Array<UInt32>>\n  private let origP: Array<UInt32> = [\n    0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344, 0xa4093822,\n    0x299f31d0, 0x082efa98, 0xec4e6c89, 0x452821e6, 0x38d01377,\n    0xbe5466cf, 0x34e90c6c, 0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5,\n    0xb5470917, 0x9216d5d9, 0x8979fb1b\n  ]\n\n  private let origS: Array<Array<UInt32>> = [\n    [\n      0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7,\n      0xb8e1afed, 0x6a267e96, 0xba7c9045, 0xf12c7f99,\n      0x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc16,\n      0x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e,\n      0x0d95748f, 0x728eb658, 0x718bcd58, 0x82154aee,\n      0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013,\n      0xc5d1b023, 0x286085f0, 0xca417918, 0xb8db38ef,\n      0x8e79dcb0, 0x603a180e, 0x6c9e0e8b, 0xb01e8a3e,\n      0xd71577c1, 0xbd314b27, 0x78af2fda, 0x55605c60,\n      0xe65525f3, 0xaa55ab94, 0x57489862, 0x63e81440,\n      0x55ca396a, 0x2aab10b6, 0xb4cc5c34, 0x1141e8ce,\n      0xa15486af, 0x7c72e993, 0xb3ee1411, 0x636fbc2a,\n      0x2ba9c55d, 0x741831f6, 0xce5c3e16, 0x9b87931e,\n      0xafd6ba33, 0x6c24cf5c, 0x7a325381, 0x28958677,\n      0x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x66282193,\n      0x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec8032,\n      0xef845d5d, 0xe98575b1, 0xdc262302, 0xeb651b88,\n      0x23893e81, 0xd396acc5, 0x0f6d6ff3, 0x83f44239,\n      0x2e0b4482, 0xa4842004, 0x69c8f04a, 0x9e1f9b5e,\n      0x21c66842, 0xf6e96c9a, 0x670c9c61, 0xabd388f0,\n      0x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a3,\n      0x6eef0b6c, 0x137a3be4, 0xba3bf050, 0x7efb2a98,\n      0xa1f1651d, 0x39af0176, 0x66ca593e, 0x82430e88,\n      0x8cee8619, 0x456f9fb4, 0x7d84a5c3, 0x3b8b5ebe,\n      0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa6,\n      0x4ed3aa62, 0x363f7706, 0x1bfedf72, 0x429b023d,\n      0x37d0d724, 0xd00a1248, 0xdb0fead3, 0x49f1c09b,\n      0x075372c9, 0x80991b7b, 0x25d479d8, 0xf6e8def7,\n      0xe3fe501a, 0xb6794c3b, 0x976ce0bd, 0x04c006ba,\n      0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a2463,\n      0x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f,\n      0x6dfc511f, 0x9b30952c, 0xcc814544, 0xaf5ebd09,\n      0xbee3d004, 0xde334afd, 0x660f2807, 0x192e4bb3,\n      0xc0cba857, 0x45c8740f, 0xd20b5f39, 0xb9d3fbdb,\n      0x5579c0bd, 0x1a60320a, 0xd6a100c6, 0x402c7279,\n      0x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f8,\n      0x3c7516df, 0xfd616b15, 0x2f501ec8, 0xad0552ab,\n      0x323db5fa, 0xfd238760, 0x53317b48, 0x3e00df82,\n      0x9e5c57bb, 0xca6f8ca0, 0x1a87562e, 0xdf1769db,\n      0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f5573,\n      0x695b27b0, 0xbbca58c8, 0xe1ffa35d, 0xb8f011a0,\n      0x10fa3d98, 0xfd2183b8, 0x4afcb56c, 0x2dd1d35b,\n      0x9a53e479, 0xb6f84565, 0xd28e49bc, 0x4bfb9790,\n      0xe1ddf2da, 0xa4cb7e33, 0x62fb1341, 0xcee4c6e8,\n      0xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb4,\n      0x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a0,\n      0xd08ed1d0, 0xafc725e0, 0x8e3c5b2f, 0x8e7594b7,\n      0x8ff6e2fb, 0xf2122b64, 0x8888b812, 0x900df01c,\n      0x4fad5ea0, 0x688fc31c, 0xd1cff191, 0xb3a8c1ad,\n      0x2f2f2218, 0xbe0e1777, 0xea752dfe, 0x8b021fa1,\n      0xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e299,\n      0xb4a84fe0, 0xfd13e0b7, 0x7cc43b81, 0xd2ada8d9,\n      0x165fa266, 0x80957705, 0x93cc7314, 0x211a1477,\n      0xe6ad2065, 0x77b5fa86, 0xc75442f5, 0xfb9d35cf,\n      0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e49,\n      0x00250e2d, 0x2071b35e, 0x226800bb, 0x57b8e0af,\n      0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa,\n      0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c5,\n      0x83260376, 0x6295cfa9, 0x11c81968, 0x4e734a41,\n      0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,\n      0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400,\n      0x08ba6fb5, 0x571be91f, 0xf296ec6b, 0x2a0dd915,\n      0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664,\n      0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a\n    ],\n    [\n      0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623,\n      0xad6ea6b0, 0x49a7df7d, 0x9cee60b8, 0x8fedb266,\n      0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1,\n      0x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e,\n      0x3f54989a, 0x5b429d65, 0x6b8fe4d6, 0x99f73fd6,\n      0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1,\n      0x4cdd2086, 0x8470eb26, 0x6382e9c6, 0x021ecc5e,\n      0x09686b3f, 0x3ebaefc9, 0x3c971814, 0x6b6a70a1,\n      0x687f3584, 0x52a0e286, 0xb79c5305, 0xaa500737,\n      0x3e07841c, 0x7fdeae5c, 0x8e7d44ec, 0x5716f2b8,\n      0xb03ada37, 0xf0500c0d, 0xf01c1f04, 0x0200b3ff,\n      0xae0cf51a, 0x3cb574b2, 0x25837a58, 0xdc0921bd,\n      0xd19113f9, 0x7ca92ff6, 0x94324773, 0x22f54701,\n      0x3ae5e581, 0x37c2dadc, 0xc8b57634, 0x9af3dda7,\n      0xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e41,\n      0xe238cd99, 0x3bea0e2f, 0x3280bba1, 0x183eb331,\n      0x4e548b38, 0x4f6db908, 0x6f420d03, 0xf60a04bf,\n      0x2cb81290, 0x24977c79, 0x5679b072, 0xbcaf89af,\n      0xde9a771f, 0xd9930810, 0xb38bae12, 0xdccf3f2e,\n      0x5512721f, 0x2e6b7124, 0x501adde6, 0x9f84cd87,\n      0x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c,\n      0xec7aec3a, 0xdb851dfa, 0x63094366, 0xc464c3d2,\n      0xef1c1847, 0x3215d908, 0xdd433b37, 0x24c2ba16,\n      0x12a14d43, 0x2a65c451, 0x50940002, 0x133ae4dd,\n      0x71dff89e, 0x10314e55, 0x81ac77d6, 0x5f11199b,\n      0x043556f1, 0xd7a3c76b, 0x3c11183b, 0x5924a509,\n      0xf28fe6ed, 0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e,\n      0x86e34570, 0xeae96fb1, 0x860e5e0a, 0x5a3e2ab3,\n      0x771fe71c, 0x4e3d06fa, 0x2965dcb9, 0x99e71d0f,\n      0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a,\n      0xc6150eba, 0x94e2ea78, 0xa5fc3c53, 0x1e0a2df4,\n      0xf2f74ea7, 0x361d2b3d, 0x1939260f, 0x19c27960,\n      0x5223a708, 0xf71312b6, 0xebadfe6e, 0xeac31f66,\n      0xe3bc4595, 0xa67bc883, 0xb17f37d1, 0x018cff28,\n      0xc332ddef, 0xbe6c5aa5, 0x65582185, 0x68ab9802,\n      0xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f84,\n      0x1521b628, 0x29076170, 0xecdd4775, 0x619f1510,\n      0x13cca830, 0xeb61bd96, 0x0334fe1e, 0xaa0363cf,\n      0xb5735c90, 0x4c70a239, 0xd59e9e0b, 0xcbaade14,\n      0xeecc86bc, 0x60622ca7, 0x9cab5cab, 0xb2f3846e,\n      0x648b1eaf, 0x19bdf0ca, 0xa02369b9, 0x655abb50,\n      0x40685a32, 0x3c2ab4b3, 0x319ee9d5, 0xc021b8f7,\n      0x9b540b19, 0x875fa099, 0x95f7997e, 0x623d7da8,\n      0xf837889a, 0x97e32d77, 0x11ed935f, 0x16681281,\n      0x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba99,\n      0x57f584a5, 0x1b227263, 0x9b83c3ff, 0x1ac24696,\n      0xcdb30aeb, 0x532e3054, 0x8fd948e4, 0x6dbc3128,\n      0x58ebf2ef, 0x34c6ffea, 0xfe28ed61, 0xee7c3c73,\n      0x5d4a14d9, 0xe864b7e3, 0x42105d14, 0x203e13e0,\n      0x45eee2b6, 0xa3aaabea, 0xdb6c4f15, 0xfacb4fd0,\n      0xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd2105,\n      0xd81e799e, 0x86854dc7, 0xe44b476a, 0x3d816250,\n      0xcf62a1f2, 0x5b8d2646, 0xfc8883a0, 0xc1c7b6a3,\n      0x7f1524c3, 0x69cb7492, 0x47848a0b, 0x5692b285,\n      0x095bbf00, 0xad19489d, 0x1462b174, 0x23820e00,\n      0x58428d2a, 0x0c55f5ea, 0x1dadf43e, 0x233f7061,\n      0x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb,\n      0x7cde3759, 0xcbee7460, 0x4085f2a7, 0xce77326e,\n      0xa6078084, 0x19f8509e, 0xe8efd855, 0x61d99735,\n      0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,\n      0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9,\n      0xdb73dbd3, 0x105588cd, 0x675fda79, 0xe3674340,\n      0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20,\n      0x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7\n    ],\n    [\n      0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934,\n      0x411520f7, 0x7602d4f7, 0xbcf46b2e, 0xd4a20068,\n      0xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af,\n      0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840,\n      0x4d95fc1d, 0x96b591af, 0x70f4ddd3, 0x66a02f45,\n      0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504,\n      0x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a,\n      0x28507825, 0x530429f4, 0x0a2c86da, 0xe9b66dfb,\n      0x68dc1462, 0xd7486900, 0x680ec0a4, 0x27a18dee,\n      0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b6,\n      0xaace1e7c, 0xd3375fec, 0xce78a399, 0x406b2a42,\n      0x20fe9e35, 0xd9f385b9, 0xee39d7ab, 0x3b124e8b,\n      0x1dc9faf7, 0x4b6d1856, 0x26a36631, 0xeae397b2,\n      0x3a6efa74, 0xdd5b4332, 0x6841e7f7, 0xca7820fb,\n      0xfb0af54e, 0xd8feb397, 0x454056ac, 0xba489527,\n      0x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b,\n      0x55a867bc, 0xa1159a58, 0xcca92963, 0x99e1db33,\n      0xa62a4a56, 0x3f3125f9, 0x5ef47e1c, 0x9029317c,\n      0xfdf8e802, 0x04272f70, 0x80bb155c, 0x05282ce3,\n      0x95c11548, 0xe4c66d22, 0x48c1133f, 0xc70f86dc,\n      0x07f9c9ee, 0x41041f0f, 0x404779a4, 0x5d886e17,\n      0x325f51eb, 0xd59bc0d1, 0xf2bcc18f, 0x41113564,\n      0x257b7834, 0x602a9c60, 0xdff8e8a3, 0x1f636c1b,\n      0x0e12b4c2, 0x02e1329e, 0xaf664fd1, 0xcad18115,\n      0x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb922,\n      0x85b2a20e, 0xe6ba0d99, 0xde720c8c, 0x2da2f728,\n      0xd0127845, 0x95b794fd, 0x647d0862, 0xe7ccf5f0,\n      0x5449a36f, 0x877d48fa, 0xc39dfd27, 0xf33e8d1e,\n      0x0a476341, 0x992eff74, 0x3a6f6eab, 0xf4f8fd37,\n      0xa812dc60, 0xa1ebddf8, 0x991be14c, 0xdb6e6b0d,\n      0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e804,\n      0xf1290dc7, 0xcc00ffa3, 0xb5390f92, 0x690fed0b,\n      0x667b9ffb, 0xcedb7d9c, 0xa091cf0b, 0xd9155ea3,\n      0xbb132f88, 0x515bad24, 0x7b9479bf, 0x763bd6eb,\n      0x37392eb3, 0xcc115979, 0x8026e297, 0xf42e312d,\n      0x6842ada7, 0xc66a2b3b, 0x12754ccc, 0x782ef11c,\n      0x6a124237, 0xb79251e7, 0x06a1bbe6, 0x4bfb6350,\n      0x1a6b1018, 0x11caedfa, 0x3d25bdd8, 0xe2e1c3c9,\n      0x44421659, 0x0a121386, 0xd90cec6e, 0xd5abea2a,\n      0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe,\n      0x9dbc8057, 0xf0f7c086, 0x60787bf8, 0x6003604d,\n      0xd1fd8346, 0xf6381fb0, 0x7745ae04, 0xd736fccc,\n      0x83426b33, 0xf01eab71, 0xb0804187, 0x3c005e5f,\n      0x77a057be, 0xbde8ae24, 0x55464299, 0xbf582e61,\n      0x4e58f48f, 0xf2ddfda2, 0xf474ef38, 0x8789bdc2,\n      0x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b9,\n      0x7aeb2661, 0x8b1ddf84, 0x846a0e79, 0x915f95e2,\n      0x466e598e, 0x20b45770, 0x8cd55591, 0xc902de4c,\n      0xb90bace1, 0xbb8205d0, 0x11a86248, 0x7574a99e,\n      0xb77f19b6, 0xe0a9dc09, 0x662d09a1, 0xc4324633,\n      0xe85a1f02, 0x09f0be8c, 0x4a99a025, 0x1d6efe10,\n      0x1ab93d1d, 0x0ba5a4df, 0xa186f20f, 0x2868f169,\n      0xdcb7da83, 0x573906fe, 0xa1e2ce9b, 0x4fcd7f52,\n      0x50115e01, 0xa70683fa, 0xa002b5c4, 0x0de6d027,\n      0x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b5,\n      0xf0177a28, 0xc0f586e0, 0x006058aa, 0x30dc7d62,\n      0x11e69ed7, 0x2338ea63, 0x53c2dd94, 0xc2c21634,\n      0xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d76,\n      0x6f05e409, 0x4b7c0188, 0x39720a3d, 0x7c927c24,\n      0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,\n      0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4,\n      0x1e50ef5e, 0xb161e6f8, 0xa28514d9, 0x6c51133c,\n      0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c837,\n      0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0\n    ],\n    [\n      0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b,\n      0x5cb0679e, 0x4fa33742, 0xd3822740, 0x99bc9bbe,\n      0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b,\n      0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4,\n      0x5748ab2f, 0xbc946e79, 0xc6a376d2, 0x6549c2c8,\n      0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,\n      0x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee304,\n      0xa1fad5f0, 0x6a2d519a, 0x63ef8ce2, 0x9a86ee22,\n      0xc089c2b8, 0x43242ef6, 0xa51e03aa, 0x9cf2d0a4,\n      0x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd6,\n      0x2826a2f9, 0xa73a3ae1, 0x4ba99586, 0xef5562e9,\n      0xc72fefd3, 0xf752f7da, 0x3f046f69, 0x77fa0a59,\n      0x80e4a915, 0x87b08601, 0x9b09e6ad, 0x3b3ee593,\n      0xe990fd5a, 0x9e34d797, 0x2cf0b7d9, 0x022b8b51,\n      0x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d28,\n      0x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c,\n      0xe029ac71, 0xe019a5e6, 0x47b0acfd, 0xed93fa9b,\n      0xe8d3c48d, 0x283b57cc, 0xf8d56629, 0x79132e28,\n      0x785f0191, 0xed756055, 0xf7960e44, 0xe3d35e8c,\n      0x15056dd4, 0x88f46dba, 0x03a16125, 0x0564f0bd,\n      0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a,\n      0x1b3f6d9b, 0x1e6321f5, 0xf59c66fb, 0x26dcf319,\n      0x7533d928, 0xb155fdf5, 0x03563482, 0x8aba3cbb,\n      0x28517711, 0xc20ad9f8, 0xabcc5167, 0xccad925f,\n      0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f991,\n      0xea7a90c2, 0xfb3e7bce, 0x5121ce64, 0x774fbe32,\n      0xa8b6e37e, 0xc3293d46, 0x48de5369, 0x6413e680,\n      0xa2ae0810, 0xdd6db224, 0x69852dfd, 0x09072166,\n      0xb39a460a, 0x6445c0dd, 0x586cdecf, 0x1c20c8ae,\n      0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb,\n      0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd5,\n      0x72eacea8, 0xfa6484bb, 0x8d6612ae, 0xbf3c6f47,\n      0xd29be463, 0x542f5d9e, 0xaec2771b, 0xf64e6370,\n      0x740e0d8d, 0xe75b1357, 0xf8721671, 0xaf537d5d,\n      0x4040cb08, 0x4eb4e2cc, 0x34d2466a, 0x0115af84,\n      0xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea048,\n      0x6f3f3b82, 0x3520ab82, 0x011a1d4b, 0x277227f8,\n      0x611560b1, 0xe7933fdc, 0xbb3a792b, 0x344525bd,\n      0xa08839e1, 0x51ce794b, 0x2f32c9b7, 0xa01fbac9,\n      0xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac7,\n      0x1a908749, 0xd44fbd9a, 0xd0dadecb, 0xd50ada38,\n      0x0339c32a, 0xc6913667, 0x8df9317c, 0xe0b12b4f,\n      0xf79e59b7, 0x43f5bb3a, 0xf2d519ff, 0x27d9459c,\n      0xbf97222c, 0x15e6fc2a, 0x0f91fc71, 0x9b941525,\n      0xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d1,\n      0xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a442,\n      0xe0ec6e0e, 0x1698db3b, 0x4c98a0be, 0x3278e964,\n      0x9f1f9532, 0xe0d392df, 0xd3a0342b, 0x8971f21e,\n      0x1b0a7441, 0x4ba3348c, 0xc5be7120, 0xc37632d8,\n      0xdf359f8d, 0x9b992f2e, 0xe60b6f47, 0x0fe3f11d,\n      0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f,\n      0x1618b166, 0xfd2c1d05, 0x848fd2c5, 0xf6fb2299,\n      0xf523f357, 0xa6327623, 0x93a83531, 0x56cccd02,\n      0xacf08162, 0x5a75ebb5, 0x6e163697, 0x88d273cc,\n      0xde966292, 0x81b949d0, 0x4c50901b, 0x71c65614,\n      0xe6c6c7bd, 0x327a140a, 0x45e1d006, 0xc3f27b9a,\n      0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f6,\n      0x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b,\n      0x53113ec0, 0x1640e3d3, 0x38abbd60, 0x2547adf0,\n      0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,\n      0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e,\n      0x1948c25c, 0x02fb8a8c, 0x01c36ae4, 0xd6ebe1f9,\n      0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f,\n      0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6\n    ]\n  ]\n\n  public init(key: Array<UInt8>, blockMode: BlockMode = CBC(iv: Array<UInt8>(repeating: 0, count: Blowfish.blockSize)), padding: Padding) throws {\n    precondition(key.count >= 5 && key.count <= 56)\n\n    self.blockMode = blockMode\n    self.padding = padding\n    self.keySize = key.count\n\n    self.S = self.origS\n    self.P = self.origP\n\n    self.expandKey(key: key)\n    try self.setupBlockModeWorkers()\n  }\n\n  private func setupBlockModeWorkers() throws {\n    let decryptBlock = { [weak self] (block: ArraySlice<UInt8>) -> Array<UInt8>? in\n      self?.decrypt(block: block)\n    }\n\n    let encryptBlock = { [weak self] (block: ArraySlice<UInt8>) -> Array<UInt8>? in\n      self?.encrypt(block: block)\n    }\n\n    self.encryptWorker = try self.blockMode.worker(blockSize: Blowfish.blockSize, cipherOperation: encryptBlock, encryptionOperation: encryptBlock)\n\n    if self.blockMode.options.contains(.useEncryptToDecrypt) {\n      self.decryptWorker = try self.blockMode.worker(blockSize: Blowfish.blockSize, cipherOperation: encryptBlock, encryptionOperation: encryptBlock)\n    } else {\n      self.decryptWorker = try self.blockMode.worker(blockSize: Blowfish.blockSize, cipherOperation: decryptBlock, encryptionOperation: encryptBlock)\n    }\n  }\n\n  private func reset() {\n    self.S = self.origS\n    self.P = self.origP\n    // todo expand key\n  }\n\n  private func expandKey(key: Array<UInt8>) {\n    var j = 0\n    for i in 0..<(self.N + 2) {\n      var data: UInt32 = 0x0\n      for _ in 0..<4 {\n        data = (data << 8) | UInt32(key[j])\n        j += 1\n        if j >= key.count {\n          j = 0\n        }\n      }\n      self.P[i] ^= data\n    }\n\n    var datal: UInt32 = 0\n    var datar: UInt32 = 0\n\n    for i in stride(from: 0, to: self.N + 2, by: 2) {\n      self.encryptBlowfishBlock(l: &datal, r: &datar)\n      self.P[i] = datal\n      self.P[i + 1] = datar\n    }\n\n    for i in 0..<4 {\n      for j in stride(from: 0, to: 256, by: 2) {\n        self.encryptBlowfishBlock(l: &datal, r: &datar)\n        self.S[i][j] = datal\n        self.S[i][j + 1] = datar\n      }\n    }\n  }\n\n  private func encrypt(block: ArraySlice<UInt8>) -> Array<UInt8>? {\n    var result = Array<UInt8>()\n\n    var l = UInt32(bytes: block[block.startIndex..<block.startIndex.advanced(by: 4)])\n    var r = UInt32(bytes: block[block.startIndex.advanced(by: 4)..<block.startIndex.advanced(by: 8)])\n\n    self.encryptBlowfishBlock(l: &l, r: &r)\n\n    // because everything is too complex to be solved in reasonable time o_O\n    result += [\n      UInt8((l >> 24) & 0xff),\n      UInt8((l >> 16) & 0xff)\n    ]\n    result += [\n      UInt8((l >> 8) & 0xff),\n      UInt8((l >> 0) & 0xff)\n    ]\n    result += [\n      UInt8((r >> 24) & 0xff),\n      UInt8((r >> 16) & 0xff)\n    ]\n    result += [\n      UInt8((r >> 8) & 0xff),\n      UInt8((r >> 0) & 0xff)\n    ]\n\n    return result\n  }\n\n  private func decrypt(block: ArraySlice<UInt8>) -> Array<UInt8>? {\n    var result = Array<UInt8>()\n\n    var l = UInt32(bytes: block[block.startIndex..<block.startIndex.advanced(by: 4)])\n    var r = UInt32(bytes: block[block.startIndex.advanced(by: 4)..<block.startIndex.advanced(by: 8)])\n\n    self.decryptBlowfishBlock(l: &l, r: &r)\n\n    // because everything is too complex to be solved in reasonable time o_O\n    result += [\n      UInt8((l >> 24) & 0xff),\n      UInt8((l >> 16) & 0xff)\n    ]\n    result += [\n      UInt8((l >> 8) & 0xff),\n      UInt8((l >> 0) & 0xff)\n    ]\n    result += [\n      UInt8((r >> 24) & 0xff),\n      UInt8((r >> 16) & 0xff)\n    ]\n    result += [\n      UInt8((r >> 8) & 0xff),\n      UInt8((r >> 0) & 0xff)\n    ]\n    return result\n  }\n\n  /// Encrypts the 8-byte padded buffer\n  ///\n  /// - Parameters:\n  ///   - l: left half\n  ///   - r: right half\n  private func encryptBlowfishBlock(l: inout UInt32, r: inout UInt32) {\n    var Xl = l\n    var Xr = r\n\n    for i in 0..<self.N {\n      Xl = Xl ^ self.P[i]\n      Xr = self.F(x: Xl) ^ Xr\n\n      (Xl, Xr) = (Xr, Xl)\n    }\n\n    (Xl, Xr) = (Xr, Xl)\n\n    Xr = Xr ^ self.P[self.N]\n    Xl = Xl ^ self.P[self.N + 1]\n\n    l = Xl\n    r = Xr\n  }\n\n  /// Decrypts the 8-byte padded buffer\n  ///\n  /// - Parameters:\n  ///   - l: left half\n  ///   - r: right half\n  private func decryptBlowfishBlock(l: inout UInt32, r: inout UInt32) {\n    var Xl = l\n    var Xr = r\n\n    for i in (2...self.N + 1).reversed() {\n      Xl = Xl ^ self.P[i]\n      Xr = self.F(x: Xl) ^ Xr\n\n      (Xl, Xr) = (Xr, Xl)\n    }\n\n    (Xl, Xr) = (Xr, Xl)\n\n    Xr = Xr ^ self.P[1]\n    Xl = Xl ^ self.P[0]\n\n    l = Xl\n    r = Xr\n  }\n\n  private func F(x: UInt32) -> UInt32 {\n    let f1 = self.S[0][Int(x >> 24) & 0xff]\n    let f2 = self.S[1][Int(x >> 16) & 0xff]\n    let f3 = self.S[2][Int(x >> 8) & 0xff]\n    let f4 = self.S[3][Int(x & 0xff)]\n    return ((f1 &+ f2) ^ f3) &+ f4\n  }\n}\n\nextension Blowfish: Cipher {\n  /// Encrypt the 8-byte padded buffer, block by block. Note that for amounts of data larger than a block, it is not safe to just call encrypt() on successive blocks.\n  ///\n  /// - Parameter bytes: Plaintext data\n  /// - Returns: Encrypted data\n  public func encrypt<C: Collection>(_ bytes: C) throws -> Array<UInt8> where C.Element == UInt8, C.Index == Int {\n    let bytes = self.padding.add(to: Array(bytes), blockSize: Blowfish.blockSize) // FIXME: Array(bytes) copies\n\n    var out = Array<UInt8>()\n    out.reserveCapacity(bytes.count)\n\n    for chunk in bytes.batched(by: Blowfish.blockSize) {\n      out += self.encryptWorker.encrypt(block: chunk)\n    }\n\n    if self.blockMode.options.contains(.paddingRequired) && (out.count % Blowfish.blockSize != 0) {\n      throw Error.dataPaddingRequired\n    }\n\n    return out\n  }\n\n  /// Decrypt the 8-byte padded buffer\n  ///\n  /// - Parameter bytes: Ciphertext data\n  /// - Returns: Plaintext data\n  public func decrypt<C: Collection>(_ bytes: C) throws -> Array<UInt8> where C.Element == UInt8, C.Index == Int {\n    if self.blockMode.options.contains(.paddingRequired) && (bytes.count % Blowfish.blockSize != 0) {\n      throw Error.dataPaddingRequired\n    }\n\n    var out = Array<UInt8>()\n    out.reserveCapacity(bytes.count)\n\n    for chunk in Array(bytes).batched(by: Blowfish.blockSize) {\n      out += self.decryptWorker.decrypt(block: chunk) // FIXME: copying here is ineffective\n    }\n\n    out = self.padding.remove(from: out, blockSize: Blowfish.blockSize)\n\n    return out\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CBCMAC.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic final class CBCMAC: CMAC {\n  public override func authenticate(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    var inBytes = bytes\n    bitPadding(to: &inBytes, blockSize: CMAC.BlockSize)\n    let blocks = inBytes.batched(by: CMAC.BlockSize)\n\n    var lastBlockEncryptionResult: [UInt8] = CBCMAC.Zero\n    try blocks.forEach { block in\n      let aes = try AES(key: Array(key), blockMode: CBC(iv: lastBlockEncryptionResult), padding: .noPadding)\n      lastBlockEncryptionResult = try aes.encrypt(block)\n    }\n\n    return lastBlockEncryptionResult\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CMAC.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic class CMAC: Authenticator {\n  public enum Error: Swift.Error {\n    case wrongKeyLength\n  }\n\n  internal let key: SecureBytes\n\n  internal static let BlockSize: Int = 16\n  internal static let Zero: Array<UInt8> = [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]\n  private static let Rb: Array<UInt8> = [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x87]\n\n  public init(key: Array<UInt8>) throws {\n    self.key = SecureBytes(bytes: key)\n  }\n\n  // MARK: Authenticator\n\n  // AES-CMAC\n  public func authenticate(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    let cipher = try AES(key: Array(key), blockMode: CBC(iv: CMAC.Zero), padding: .noPadding)\n    return try self.authenticate(bytes, cipher: cipher)\n  }\n\n  // CMAC using a Cipher\n  public func authenticate(_ bytes: Array<UInt8>, cipher: Cipher) throws -> Array<UInt8> {\n    let l = try cipher.encrypt(CMAC.Zero)\n    var subKey1 = self.leftShiftOneBit(l)\n    if (l[0] & 0x80) != 0 {\n      subKey1 = xor(CMAC.Rb, subKey1)\n    }\n    var subKey2 = self.leftShiftOneBit(subKey1)\n    if (subKey1[0] & 0x80) != 0 {\n      subKey2 = xor(CMAC.Rb, subKey2)\n    }\n\n    let lastBlockComplete: Bool\n    let blockCount = (bytes.count + CMAC.BlockSize - 1) / CMAC.BlockSize\n    if blockCount == 0 {\n      lastBlockComplete = false\n    } else {\n      lastBlockComplete = bytes.count % CMAC.BlockSize == 0\n    }\n    var paddedBytes = bytes\n    if !lastBlockComplete {\n      bitPadding(to: &paddedBytes, blockSize: CMAC.BlockSize)\n    }\n\n    var blocks = Array(paddedBytes.batched(by: CMAC.BlockSize))\n    var lastBlock = blocks.popLast()!\n    if lastBlockComplete {\n      lastBlock = xor(lastBlock, subKey1)\n    } else {\n      lastBlock = xor(lastBlock, subKey2)\n    }\n\n    var x = Array<UInt8>(repeating: 0x00, count: CMAC.BlockSize)\n    var y = Array<UInt8>(repeating: 0x00, count: CMAC.BlockSize)\n    for block in blocks {\n      y = xor(block, x)\n      x = try cipher.encrypt(y)\n    }\n    // the difference between CMAC and CBC-MAC is that CMAC xors the final block with a secret value\n    y = self.process(lastBlock: lastBlock, with: x)\n    return try cipher.encrypt(y)\n  }\n\n  func process(lastBlock: ArraySlice<UInt8>, with x: [UInt8]) -> [UInt8] {\n    xor(lastBlock, x)\n  }\n\n  // MARK: Helper methods\n\n  /**\n   Performs left shift by one bit to the bit string acquired after concatenating al bytes in the byte array\n   - parameters:\n   - bytes: byte array\n   - returns: bit shifted bit string split again in array of bytes\n   */\n  private func leftShiftOneBit(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    var shifted = Array<UInt8>(repeating: 0x00, count: bytes.count)\n    let last = bytes.count - 1\n    for index in 0..<last {\n      shifted[index] = bytes[index] << 1\n      if (bytes[index + 1] & 0x80) != 0 {\n        shifted[index] += 0x01\n      }\n    }\n    shifted[last] = bytes[last] << 1\n    return shifted\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Addition.swift",
    "content": "//\n//  Addition.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n    //MARK: Addition\n    \n    /// Add `word` to this integer in place.\n    /// `word` is shifted `shift` words to the left before being added.\n    ///\n    /// - Complexity: O(max(count, shift))\n    internal mutating func addWord(_ word: Word, shiftedBy shift: Int = 0) {\n        precondition(shift >= 0)\n        var carry = word\n        var i = shift\n        while carry > 0 {\n            let (d, c) = self[i].addingReportingOverflow(carry)\n            self[i] = d\n            carry = (c ? 1 : 0)\n            i += 1\n        }\n    }\n\n    /// Add the digit `d` to this integer and return the result.\n    /// `d` is shifted `shift` words to the left before being added.\n    ///\n    /// - Complexity: O(max(count, shift))\n    internal func addingWord(_ word: Word, shiftedBy shift: Int = 0) -> CS.BigUInt {\n        var r = self\n        r.addWord(word, shiftedBy: shift)\n        return r\n    }\n\n    /// Add `b` to this integer in place.\n    /// `b` is shifted `shift` words to the left before being added.\n    ///\n    /// - Complexity: O(max(count, b.count + shift))\n    internal mutating func add(_ b: CS.BigUInt, shiftedBy shift: Int = 0) {\n        precondition(shift >= 0)\n        var carry = false\n        var bi = 0\n        let bc = b.count\n        while bi < bc || carry {\n            let ai = shift + bi\n            let (d, c) = self[ai].addingReportingOverflow(b[bi])\n            if carry {\n                let (d2, c2) = d.addingReportingOverflow(1)\n                self[ai] = d2\n                carry = c || c2\n            }\n            else {\n                self[ai] = d\n                carry = c\n            }\n            bi += 1\n        }\n    }\n\n    /// Add `b` to this integer and return the result.\n    /// `b` is shifted `shift` words to the left before being added.\n    ///\n    /// - Complexity: O(max(count, b.count + shift))\n    internal func adding(_ b: CS.BigUInt, shiftedBy shift: Int = 0) -> CS.BigUInt {\n        var r = self\n        r.add(b, shiftedBy: shift)\n        return r\n    }\n\n    /// Increment this integer by one. If `shift` is non-zero, it selects\n    /// the word that is to be incremented.\n    ///\n    /// - Complexity: O(count + shift)\n    internal mutating func increment(shiftedBy shift: Int = 0) {\n        self.addWord(1, shiftedBy: shift)\n    }\n\n    /// Add `a` and `b` together and return the result.\n    ///\n    /// - Complexity: O(max(a.count, b.count))\n    public static func +(a: CS.BigUInt, b: CS.BigUInt) -> CS.BigUInt {\n        return a.adding(b)\n    }\n\n    /// Add `a` and `b` together, and store the sum in `a`.\n    ///\n    /// - Complexity: O(max(a.count, b.count))\n    public static func +=(a: inout CS.BigUInt, b: CS.BigUInt) {\n        a.add(b, shiftedBy: 0)\n    }\n}\n\nextension CS.BigInt {\n    /// Add `a` to `b` and return the result.\n    public static func +(a: CS.BigInt, b: CS.BigInt) -> CS.BigInt {\n        switch (a.sign, b.sign) {\n        case (.plus, .plus):\n            return CS.BigInt(sign: .plus, magnitude: a.magnitude + b.magnitude)\n        case (.minus, .minus):\n            return CS.BigInt(sign: .minus, magnitude: a.magnitude + b.magnitude)\n        case (.plus, .minus):\n            if a.magnitude >= b.magnitude {\n                return CS.BigInt(sign: .plus, magnitude: a.magnitude - b.magnitude)\n            }\n            else {\n                return CS.BigInt(sign: .minus, magnitude: b.magnitude - a.magnitude)\n            }\n        case (.minus, .plus):\n            if b.magnitude >= a.magnitude {\n                return CS.BigInt(sign: .plus, magnitude: b.magnitude - a.magnitude)\n            }\n            else {\n                return CS.BigInt(sign: .minus, magnitude: a.magnitude - b.magnitude)\n            }\n        }\n    }\n\n    /// Add `b` to `a` in place.\n    public static func +=(a: inout CS.BigInt, b: CS.BigInt) {\n        a = a + b\n    }\n}\n\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/BigInt.swift",
    "content": "//\n//  CS.BigInt.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2015-12-27.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\n//MARK: CS.BigInt\n\nextension CS {\n\n  /// An arbitrary precision signed integer type, also known as a \"big integer\".\n  ///\n  /// Operations on big integers never overflow, but they might take a long time to execute.\n  /// The amount of memory (and address space) available is the only constraint to the magnitude of these numbers.\n  ///\n  /// This particular big integer type uses base-2^64 digits to represent integers.\n  ///\n  /// `BigInt` is essentially a tiny wrapper that extends `BigUInt` with a sign bit and provides signed integer\n  /// operations. Both the underlying absolute value and the negative/positive flag are available as read-write\n  /// properties.\n  ///\n  /// Not all algorithms of `BigUInt` are available for `BigInt` values; for example, there is no square root or\n  /// primality test for signed integers. When you need to call one of these, just extract the absolute value:\n  ///\n  /// ```Swift\n  /// CS.BigInt(255).abs.isPrime()   // Returns false\n  /// ```\n  ///\n  public struct BigInt: SignedInteger {\n      public enum Sign {\n          case plus\n          case minus\n      }\n\n      public typealias Magnitude = BigUInt\n\n      /// The type representing a digit in `BigInt`'s underlying number system.\n      public typealias Word = BigUInt.Word\n\n      public static var isSigned: Bool {\n          return true\n      }\n\n      /// The absolute value of this integer.\n      public var magnitude: BigUInt\n\n      /// True iff the value of this integer is negative.\n      public var sign: Sign\n\n      /// Initializes a new big integer with the provided absolute number and sign flag.\n      public init(sign: Sign, magnitude: BigUInt) {\n          self.sign = (magnitude.isZero ? .plus : sign)\n          self.magnitude = magnitude\n      }\n\n      /// Return true iff this integer is zero.\n      ///\n      /// - Complexity: O(1)\n      public var isZero: Bool {\n          return magnitude.isZero\n      }\n\n      /// Returns `-1` if this value is negative and `1` if it’s positive; otherwise, `0`.\n      ///\n      /// - Returns: The sign of this number, expressed as an integer of the same type.\n      public func signum() -> CS.BigInt {\n          switch sign {\n          case .plus:\n              return isZero ? 0 : 1\n          case .minus:\n              return -1\n          }\n      }\n  }\n\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/BigUInt.swift",
    "content": "//\n//  BigUInt.swift\n//  BigInt\n//\n//  Created by Károly Lőrentey on 2015-12-26.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS {\n\n  /// An arbitrary precision unsigned integer type, also known as a \"big integer\".\n  ///\n  /// Operations on big integers never overflow, but they may take a long time to execute.\n  /// The amount of memory (and address space) available is the only constraint to the magnitude of these numbers.\n  ///\n  /// This particular big integer type uses base-2^64 digits to represent integers; you can think of it as a wrapper\n  /// around `Array<UInt64>`. (In fact, `BigUInt` only uses an array if there are more than two digits.)\n  public struct BigUInt: UnsignedInteger {\n      /// The type representing a digit in `BigUInt`'s underlying number system.\n      public typealias Word = UInt\n\n      /// The storage variants of a `BigUInt`.\n      enum Kind {\n          /// Value consists of the two specified words (low and high). Either or both words may be zero.\n          case inline(Word, Word)\n          /// Words are stored in a slice of the storage array.\n          case slice(from: Int, to: Int)\n          /// Words are stored in the storage array.\n          case array\n      }\n\n      internal fileprivate(set) var kind: Kind // Internal for testing only\n      internal fileprivate(set) var storage: [Word] // Internal for testing only; stored separately to prevent COW copies\n\n      /// Initializes a new BigUInt with value 0.\n      public init() {\n          self.kind = .inline(0, 0)\n          self.storage = []\n      }\n\n      internal init(word: Word) {\n          self.kind = .inline(word, 0)\n          self.storage = []\n      }\n\n      internal init(low: Word, high: Word) {\n          self.kind = .inline(low, high)\n          self.storage = []\n      }\n\n      /// Initializes a new BigUInt with the specified digits. The digits are ordered from least to most significant.\n      public init(words: [Word]) {\n          self.kind = .array\n          self.storage = words\n          normalize()\n      }\n\n      internal init(words: [Word], from startIndex: Int, to endIndex: Int) {\n          self.kind = .slice(from: startIndex, to: endIndex)\n          self.storage = words\n          normalize()\n      }\n  }\n\n}\n\nextension CS.BigUInt {\n    public static var isSigned: Bool {\n        return false\n    }\n\n    /// Return true iff this integer is zero.\n    ///\n    /// - Complexity: O(1)\n    var isZero: Bool {\n        switch kind {\n        case .inline(0, 0): return true\n        case .array: return storage.isEmpty\n        default:\n            return false\n        }\n    }\n\n    /// Returns `1` if this value is, positive; otherwise, `0`.\n    ///\n    /// - Returns: The sign of this number, expressed as an integer of the same type.\n    public func signum() -> CS.BigUInt {\n        return isZero ? 0 : 1\n    }\n}\n\nextension CS.BigUInt {\n    mutating func ensureArray() {\n        switch kind {\n        case let .inline(w0, w1):\n            kind = .array\n            storage = w1 != 0 ? [w0, w1]\n                : w0 != 0 ? [w0]\n                : []\n        case let .slice(from: start, to: end):\n            kind = .array\n            storage = Array(storage[start ..< end])\n        case .array:\n            break\n        }\n    }\n\n    var capacity: Int {\n        guard case .array = kind else { return 0 }\n        return storage.capacity\n    }\n\n    mutating func reserveCapacity(_ minimumCapacity: Int) {\n        switch kind {\n        case let .inline(w0, w1):\n            kind = .array\n            storage.reserveCapacity(minimumCapacity)\n            if w1 != 0 {\n                storage.append(w0)\n                storage.append(w1)\n            }\n            else if w0 != 0 {\n                storage.append(w0)\n            }\n        case let .slice(from: start, to: end):\n            kind = .array\n            var words: [Word] = []\n            words.reserveCapacity(Swift.max(end - start, minimumCapacity))\n            words.append(contentsOf: storage[start ..< end])\n            storage = words\n        case .array:\n            storage.reserveCapacity(minimumCapacity)\n        }\n    }\n\n    /// Gets rid of leading zero digits in the digit array and converts slices into inline digits when possible.\n    internal mutating func normalize() {\n        switch kind {\n        case .slice(from: let start, to: var end):\n            assert(start >= 0 && end <= storage.count && start <= end)\n            while start < end, storage[end - 1] == 0 {\n                end -= 1\n            }\n            switch end - start {\n            case 0:\n                kind = .inline(0, 0)\n                storage = []\n            case 1:\n                kind = .inline(storage[start], 0)\n                storage = []\n            case 2:\n                kind = .inline(storage[start], storage[start + 1])\n                storage = []\n            case storage.count:\n                assert(start == 0)\n                kind = .array\n            default:\n                kind = .slice(from: start, to: end)\n            }\n        case .array where storage.last == 0:\n            while storage.last == 0 {\n                storage.removeLast()\n            }\n        default:\n            break\n        }\n    }\n\n    /// Set this integer to 0 without releasing allocated storage capacity (if any).\n    mutating func clear() {\n        self.load(0)\n    }\n\n    /// Set this integer to `value` by copying its digits without releasing allocated storage capacity (if any).\n    mutating func load(_ value: CS.BigUInt) {\n        switch kind {\n        case .inline, .slice:\n            self = value\n        case .array:\n            self.storage.removeAll(keepingCapacity: true)\n            self.storage.append(contentsOf: value.words)\n        }\n    }\n}\n\nextension CS.BigUInt {\n    //MARK: Collection-like members\n\n    /// The number of digits in this integer, excluding leading zero digits.\n    var count: Int {\n        switch kind {\n        case let .inline(w0, w1):\n            return w1 != 0 ? 2\n                : w0 != 0 ? 1\n                : 0\n        case let .slice(from: start, to: end):\n            return end - start\n        case .array:\n            return storage.count\n        }\n    }\n\n    /// Get or set a digit at a given index.\n    ///\n    /// - Note: Unlike a normal collection, it is OK for the index to be greater than or equal to `endIndex`.\n    ///   The subscripting getter returns zero for indexes beyond the most significant digit.\n    ///   Setting these extended digits automatically appends new elements to the underlying digit array.\n    /// - Requires: index >= 0\n    /// - Complexity: The getter is O(1). The setter is O(1) if the conditions below are true; otherwise it's O(count).\n    ///    - The integer's storage is not shared with another integer\n    ///    - The integer wasn't created as a slice of another integer\n    ///    - `index < count`\n    subscript(_ index: Int) -> Word {\n        get {\n            precondition(index >= 0)\n            switch (kind, index) {\n            case (.inline(let w0, _), 0): return w0\n            case (.inline(_, let w1), 1): return w1\n            case (.slice(from: let start, to: let end), _) where index < end - start:\n                return storage[start + index]\n            case (.array, _) where index < storage.count:\n                return storage[index]\n            default:\n                return 0\n            }\n        }\n        set(word) {\n            precondition(index >= 0)\n            switch (kind, index) {\n            case let (.inline(_, w1), 0):\n                kind = .inline(word, w1)\n            case let (.inline(w0, _), 1):\n                kind = .inline(w0, word)\n            case let (.slice(from: start, to: end), _) where index < end - start:\n                replace(at: index, with: word)\n            case (.array, _) where index < storage.count:\n                replace(at: index, with: word)\n            default:\n                extend(at: index, with: word)\n            }\n        }\n    }\n\n    private mutating func replace(at index: Int, with word: Word) {\n        ensureArray()\n        precondition(index < storage.count)\n        storage[index] = word\n        if word == 0, index == storage.count - 1 {\n            normalize()\n        }\n    }\n\n    private mutating func extend(at index: Int, with word: Word) {\n        guard word != 0 else { return }\n        reserveCapacity(index + 1)\n        precondition(index >= storage.count)\n        storage.append(contentsOf: repeatElement(0, count: index - storage.count))\n        storage.append(word)\n    }\n\n    /// Returns an integer built from the digits of this integer in the given range.\n    internal func extract(_ bounds: Range<Int>) -> CS.BigUInt {\n        switch kind {\n        case let .inline(w0, w1):\n            let bounds = bounds.clamped(to: 0 ..< 2)\n            if bounds == 0 ..< 2 {\n                return CS.BigUInt(low: w0, high: w1)\n            }\n            else if bounds == 0 ..< 1 {\n                return CS.BigUInt(word: w0)\n            }\n            else if bounds == 1 ..< 2 {\n                return CS.BigUInt(word: w1)\n            }\n            else {\n                return CS.BigUInt()\n            }\n        case let .slice(from: start, to: end):\n            let s = Swift.min(end, start + Swift.max(bounds.lowerBound, 0))\n            let e = Swift.max(s, (bounds.upperBound > end - start ? end : start + bounds.upperBound))\n            return CS.BigUInt(words: storage, from: s, to: e)\n        case .array:\n            let b = bounds.clamped(to: storage.startIndex ..< storage.endIndex)\n            return CS.BigUInt(words: storage, from: b.lowerBound, to: b.upperBound)\n        }\n    }\n\n    internal func extract<Bounds: RangeExpression>(_ bounds: Bounds) -> CS.BigUInt where Bounds.Bound == Int {\n        return self.extract(bounds.relative(to: 0 ..< Int.max))\n    }\n}\n\nextension CS.BigUInt {\n    internal mutating func shiftRight(byWords amount: Int) {\n        assert(amount >= 0)\n        guard amount > 0 else { return }\n        switch kind {\n        case let .inline(_, w1) where amount == 1:\n            kind = .inline(w1, 0)\n        case .inline(_, _):\n            kind = .inline(0, 0)\n        case let .slice(from: start, to: end):\n            let s = start + amount\n            if s >= end {\n                kind = .inline(0, 0)\n            }\n            else {\n                kind = .slice(from: s, to: end)\n                normalize()\n            }\n        case .array:\n            if amount >= storage.count {\n                storage.removeAll(keepingCapacity: true)\n            }\n            else {\n                storage.removeFirst(amount)\n            }\n        }\n    }\n\n    internal mutating func shiftLeft(byWords amount: Int) {\n        assert(amount >= 0)\n        guard amount > 0 else { return }\n        guard !isZero else { return }\n        switch kind {\n        case let .inline(w0, 0) where amount == 1:\n            kind = .inline(0, w0)\n        case let .inline(w0, w1):\n            let c = (w1 == 0 ? 1 : 2)\n            storage.reserveCapacity(amount + c)\n            storage.append(contentsOf: repeatElement(0, count: amount))\n            storage.append(w0)\n            if w1 != 0 {\n                storage.append(w1)\n            }\n            kind = .array\n        case let .slice(from: start, to: end):\n            var words: [Word] = []\n            words.reserveCapacity(amount + count)\n            words.append(contentsOf: repeatElement(0, count: amount))\n            words.append(contentsOf: storage[start ..< end])\n            storage = words\n            kind = .array\n        case .array:\n            storage.insert(contentsOf: repeatElement(0, count: amount), at: 0)\n        }\n    }\n}\n\nextension CS.BigUInt {\n    //MARK: Low and High\n\n    /// Split this integer into a high-order and a low-order part.\n    ///\n    /// - Requires: count > 1\n    /// - Returns: `(low, high)` such that\n    ///   - `self == low.add(high, shiftedBy: middleIndex)`\n    ///   - `high.width <= floor(width / 2)`\n    ///   - `low.width <= ceil(width / 2)`\n    /// - Complexity: Typically O(1), but O(count) in the worst case, because high-order zero digits need to be removed after the split.\n    internal var split: (high: CS.BigUInt, low: CS.BigUInt) {\n        precondition(count > 1)\n        let mid = middleIndex\n        return (self.extract(mid...), self.extract(..<mid))\n    }\n\n    /// Index of the digit at the middle of this integer.\n    ///\n    /// - Returns: The index of the digit that is least significant in `self.high`.\n    internal var middleIndex: Int {\n        return (count + 1) / 2\n    }\n\n    /// The low-order half of this CS.BigUInt.\n    ///\n    /// - Returns: `self[0 ..< middleIndex]`\n    /// - Requires: count > 1\n    internal var low: CS.BigUInt {\n        return self.extract(0 ..< middleIndex)\n    }\n\n    /// The high-order half of this CS.BigUInt.\n    ///\n    /// - Returns: `self[middleIndex ..< count]`\n    /// - Requires: count > 1\n    internal var high: CS.BigUInt {\n        return self.extract(middleIndex ..< count)\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/BitwiseOps.swift",
    "content": "//\n//  BitwiseOps.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\n//MARK: Bitwise Operations\n\nextension CS.BigUInt {\n    /// Return the ones' complement of `a`.\n    ///\n    /// - Complexity: O(a.count)\n    public static prefix func ~(a: CS.BigUInt) -> CS.BigUInt {\n        return CS.BigUInt(words: a.words.map { ~$0 })\n    }\n\n    /// Calculate the bitwise OR of `a` and `b`, and store the result in `a`.\n    ///\n    /// - Complexity: O(max(a.count, b.count))\n    public static func |= (a: inout CS.BigUInt, b: CS.BigUInt) {\n        a.reserveCapacity(b.count)\n        for i in 0 ..< b.count {\n            a[i] |= b[i]\n        }\n    }\n\n    /// Calculate the bitwise AND of `a` and `b` and return the result.\n    ///\n    /// - Complexity: O(max(a.count, b.count))\n    public static func &= (a: inout CS.BigUInt, b: CS.BigUInt) {\n        for i in 0 ..< Swift.max(a.count, b.count) {\n            a[i] &= b[i]\n        }\n    }\n\n    /// Calculate the bitwise XOR of `a` and `b` and return the result.\n    ///\n    /// - Complexity: O(max(a.count, b.count))\n    public static func ^= (a: inout CS.BigUInt, b: CS.BigUInt) {\n        a.reserveCapacity(b.count)\n        for i in 0 ..< b.count {\n            a[i] ^= b[i]\n        }\n    }\n}\n\nextension CS.BigInt {\n    public static prefix func ~(x: CS.BigInt) -> CS.BigInt {\n        switch x.sign {\n        case .plus:\n            return CS.BigInt(sign: .minus, magnitude: x.magnitude + 1)\n        case .minus:\n            return CS.BigInt(sign: .plus, magnitude: x.magnitude - 1)\n        }\n    }\n    \n    public static func &(lhs: inout CS.BigInt, rhs: CS.BigInt) -> CS.BigInt {\n        let left = lhs.words\n        let right = rhs.words\n        // Note we aren't using left.count/right.count here; we account for the sign bit separately later.\n        let count = Swift.max(lhs.magnitude.count, rhs.magnitude.count)\n        var words: [UInt] = []\n        words.reserveCapacity(count)\n        for i in 0 ..< count {\n            words.append(left[i] & right[i])\n        }\n        if lhs.sign == .minus && rhs.sign == .minus {\n            words.twosComplement()\n            return CS.BigInt(sign: .minus, magnitude: CS.BigUInt(words: words))\n        }\n        return CS.BigInt(sign: .plus, magnitude: CS.BigUInt(words: words))\n    }\n    \n    public static func |(lhs: inout CS.BigInt, rhs: CS.BigInt) -> CS.BigInt {\n        let left = lhs.words\n        let right = rhs.words\n        // Note we aren't using left.count/right.count here; we account for the sign bit separately later.\n        let count = Swift.max(lhs.magnitude.count, rhs.magnitude.count)\n        var words: [UInt] = []\n        words.reserveCapacity(count)\n        for i in 0 ..< count {\n            words.append(left[i] | right[i])\n        }\n        if lhs.sign == .minus || rhs.sign == .minus {\n            words.twosComplement()\n            return CS.BigInt(sign: .minus, magnitude: CS.BigUInt(words: words))\n        }\n        return CS.BigInt(sign: .plus, magnitude: CS.BigUInt(words: words))\n    }\n    \n    public static func ^(lhs: inout CS.BigInt, rhs: CS.BigInt) -> CS.BigInt {\n        let left = lhs.words\n        let right = rhs.words\n        // Note we aren't using left.count/right.count here; we account for the sign bit separately later.\n        let count = Swift.max(lhs.magnitude.count, rhs.magnitude.count)\n        var words: [UInt] = []\n        words.reserveCapacity(count)\n        for i in 0 ..< count {\n            words.append(left[i] ^ right[i])\n        }\n        if (lhs.sign == .minus) != (rhs.sign == .minus) {\n            words.twosComplement()\n            return CS.BigInt(sign: .minus, magnitude: CS.BigUInt(words: words))\n        }\n        return CS.BigInt(sign: .plus, magnitude: CS.BigUInt(words: words))\n    }\n    \n    public static func &=(lhs: inout CS.BigInt, rhs: CS.BigInt) {\n        lhs = lhs & rhs\n    }\n    \n    public static func |=(lhs: inout CS.BigInt, rhs: CS.BigInt) {\n        lhs = lhs | rhs\n    }\n    \n    public static func ^=(lhs: inout CS.BigInt, rhs: CS.BigInt) {\n        lhs = lhs ^ rhs\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/CS.swift",
    "content": "//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// To avoid name conflict with BigInt library, I choose to rename\n// BigInt -> BigInteger\n// BigUInt -> BigUInteger\n\npublic typealias BigInteger = CS.BigInt\npublic typealias BigUInteger = CS.BigUInt\n\npublic enum CS {\n  // namespace\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Codable.swift",
    "content": "//\n//  Codable.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2017-8-11.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS {\n\n  // Little-endian to big-endian\n  struct Units<Unit: FixedWidthInteger, Words: RandomAccessCollection>: RandomAccessCollection\n  where Words.Element: FixedWidthInteger, Words.Index == Int {\n      typealias Word = Words.Element\n      let words: Words\n      init(of type: Unit.Type, _ words: Words) {\n          precondition(Word.bitWidth % Unit.bitWidth == 0 || Unit.bitWidth % Word.bitWidth == 0)\n          self.words = words\n      }\n      var count: Int { return (words.count * Word.bitWidth + Unit.bitWidth - 1) / Unit.bitWidth }\n      var startIndex: Int { return 0 }\n      var endIndex: Int { return count }\n      subscript(_ index: Int) -> Unit {\n          let index = count - 1 - index\n          if Unit.bitWidth == Word.bitWidth {\n              return Unit(words[index])\n          }\n          else if Unit.bitWidth > Word.bitWidth {\n              let c = Unit.bitWidth / Word.bitWidth\n              var unit: Unit = 0\n              var j = 0\n              for i in (c * index) ..< Swift.min(c * (index + 1), words.endIndex) {\n                  unit |= Unit(words[i]) << j\n                  j += Word.bitWidth\n              }\n              return unit\n          }\n          // Unit.bitWidth < Word.bitWidth\n          let c = Word.bitWidth / Unit.bitWidth\n          let i = index / c\n          let j = index % c\n          return Unit(truncatingIfNeeded: words[i] >> (j * Unit.bitWidth))\n      }\n  }\n}\n\nextension Array where Element: FixedWidthInteger {\n    // Big-endian to little-endian\n    init<Unit: FixedWidthInteger>(count: Int?, generator: () throws -> Unit?) rethrows {\n        typealias Word = Element\n        precondition(Word.bitWidth % Unit.bitWidth == 0 || Unit.bitWidth % Word.bitWidth == 0)\n        self = []\n        if Unit.bitWidth == Word.bitWidth {\n            if let count = count {\n                self.reserveCapacity(count)\n            }\n            while let unit = try generator() {\n                self.append(Word(unit))\n            }\n        }\n        else if Unit.bitWidth > Word.bitWidth {\n            let wordsPerUnit = Unit.bitWidth / Word.bitWidth\n            if let count = count {\n                self.reserveCapacity(count * wordsPerUnit)\n            }\n            while let unit = try generator() {\n                var shift = Unit.bitWidth - Word.bitWidth\n                while shift >= 0 {\n                    self.append(Word(truncatingIfNeeded: unit >> shift))\n                    shift -= Word.bitWidth\n                }\n            }\n        }\n        else {\n            let unitsPerWord = Word.bitWidth / Unit.bitWidth\n            if let count = count {\n                self.reserveCapacity((count + unitsPerWord - 1) / unitsPerWord)\n            }\n            var word: Word = 0\n            var c = 0\n            while let unit = try generator() {\n                word <<= Unit.bitWidth\n                word |= Word(unit)\n                c += Unit.bitWidth\n                if c == Word.bitWidth {\n                    self.append(word)\n                    word = 0\n                    c = 0\n                }\n            }\n            if c > 0 {\n                self.append(word << c)\n                var shifted: Word = 0\n                for i in self.indices {\n                    let word = self[i]\n                    self[i] = shifted | (word >> c)\n                    shifted = word << (Word.bitWidth - c)\n                }\n            }\n        }\n        self.reverse()\n    }\n}\n\nextension CS.BigInt: Codable {\n    public init(from decoder: Decoder) throws {\n        var container = try decoder.unkeyedContainer()\n\n        // Decode sign\n        let sign: CS.BigInt.Sign\n        switch try container.decode(String.self) {\n        case \"+\":\n            sign = .plus\n        case \"-\":\n            sign = .minus\n        default:\n            throw DecodingError.dataCorrupted(.init(codingPath: container.codingPath,\n                                                    debugDescription: \"Invalid big integer sign\"))\n        }\n\n        // Decode magnitude\n        let words = try [UInt](count: container.count?.advanced(by: -1)) { () -> UInt64? in\n            guard !container.isAtEnd else { return nil }\n            return try container.decode(UInt64.self)\n        }\n        let magnitude = CS.BigUInt(words: words)\n\n        self.init(sign: sign, magnitude: magnitude)\n    }\n\n    public func encode(to encoder: Encoder) throws {\n        var container = encoder.unkeyedContainer()\n        try container.encode(sign == .plus ? \"+\" : \"-\")\n        let units = CS.Units(of: UInt64.self, self.magnitude.words)\n        if units.isEmpty {\n            try container.encode(0 as UInt64)\n        }\n        else {\n            try container.encode(contentsOf: units)\n        }\n    }\n}\n\nextension CS.BigUInt: Codable {\n    public init(from decoder: Decoder) throws {\n        let value = try CS.BigInt(from: decoder)\n        guard value.sign == .plus else {\n            throw DecodingError.dataCorrupted(.init(codingPath: decoder.codingPath,\n                                                    debugDescription: \"BigUInt cannot hold a negative value\"))\n        }\n        self = value.magnitude\n    }\n\n    public func encode(to encoder: Encoder) throws {\n        try CS.BigInt(sign: .plus, magnitude: self).encode(to: encoder)\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Comparable.swift",
    "content": "//\n//  Comparable.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nimport Foundation\n\nextension CS.BigUInt: Comparable {\n    //MARK: Comparison\n    \n    /// Compare `a` to `b` and return an `NSComparisonResult` indicating their order.\n    ///\n    /// - Complexity: O(count)\n    public static func compare(_ a: CS.BigUInt, _ b: CS.BigUInt) -> ComparisonResult {\n        if a.count != b.count { return a.count > b.count ? .orderedDescending : .orderedAscending }\n        for i in (0 ..< a.count).reversed() {\n            let ad = a[i]\n            let bd = b[i]\n            if ad != bd { return ad > bd ? .orderedDescending : .orderedAscending }\n        }\n        return .orderedSame\n    }\n\n    /// Return true iff `a` is equal to `b`.\n    ///\n    /// - Complexity: O(count)\n    public static func ==(a: CS.BigUInt, b: CS.BigUInt) -> Bool {\n        return CS.BigUInt.compare(a, b) == .orderedSame\n    }\n\n    /// Return true iff `a` is less than `b`.\n    ///\n    /// - Complexity: O(count)\n    public static func <(a: CS.BigUInt, b: CS.BigUInt) -> Bool {\n        return CS.BigUInt.compare(a, b) == .orderedAscending\n    }\n}\n\nextension CS.BigInt {\n    /// Return true iff `a` is equal to `b`.\n    public static func ==(a: CS.BigInt, b: CS.BigInt) -> Bool {\n        return a.sign == b.sign && a.magnitude == b.magnitude\n    }\n\n    /// Return true iff `a` is less than `b`.\n    public static func <(a: CS.BigInt, b: CS.BigInt) -> Bool {\n        switch (a.sign, b.sign) {\n        case (.plus, .plus):\n            return a.magnitude < b.magnitude\n        case (.plus, .minus):\n            return false\n        case (.minus, .plus):\n            return true\n        case (.minus, .minus):\n            return a.magnitude > b.magnitude\n        }\n    }\n}\n\n\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/DataConversion.swift",
    "content": "//\n//  DataConversion.swift\n//  BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-04.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nimport Foundation\n\nextension CS.BigUInt {\n    //MARK: NSData Conversion\n\n    /// Initialize a BigInt from bytes accessed from an UnsafeRawBufferPointer\n    public init(_ buffer: UnsafeRawBufferPointer) {\n        // This assumes Word is binary.\n        precondition(Word.bitWidth % 8 == 0)\n\n        self.init()\n\n        let length = buffer.count\n        guard length > 0 else { return }\n        let bytesPerDigit = Word.bitWidth / 8\n        var index = length / bytesPerDigit\n        var c = bytesPerDigit - length % bytesPerDigit\n        if c == bytesPerDigit {\n            c = 0\n            index -= 1\n        }\n\n        var word: Word = 0\n        for byte in buffer {\n            word <<= 8\n            word += Word(byte)\n            c += 1\n            if c == bytesPerDigit {\n                self[index] = word\n                index -= 1\n                c = 0\n                word = 0\n            }\n        }\n        assert(c == 0 && word == 0 && index == -1)\n    }\n\n\n    /// Initializes an integer from the bits stored inside a piece of `Data`.\n    /// The data is assumed to be in network (big-endian) byte order.\n    public init(_ data: Data) {\n        // This assumes Word is binary.\n        precondition(Word.bitWidth % 8 == 0)\n\n        self.init()\n\n        let length = data.count\n        guard length > 0 else { return }\n        let bytesPerDigit = Word.bitWidth / 8\n        var index = length / bytesPerDigit\n        var c = bytesPerDigit - length % bytesPerDigit\n        if c == bytesPerDigit {\n            c = 0\n            index -= 1\n        }\n        let word: Word = data.withUnsafeBytes { buffPtr in\n            var word: Word = 0\n            let p = buffPtr.bindMemory(to: UInt8.self)\n            for byte in p {\n                word <<= 8\n                word += Word(byte)\n                c += 1\n                if c == bytesPerDigit {\n                    self[index] = word\n                    index -= 1\n                    c = 0\n                    word = 0\n                }\n            }\n            return word\n        }\n        assert(c == 0 && word == 0 && index == -1)\n    }\n\n    /// Return a `Data` value that contains the base-256 representation of this integer, in network (big-endian) byte order.\n    public func serialize() -> Data {\n        // This assumes Digit is binary.\n        precondition(Word.bitWidth % 8 == 0)\n\n        let byteCount = (self.bitWidth + 7) / 8\n\n        guard byteCount > 0 else { return Data() }\n\n        var data = Data(count: byteCount)\n        data.withUnsafeMutableBytes { buffPtr in\n            let p = buffPtr.bindMemory(to: UInt8.self)\n            var i = byteCount - 1\n            for var word in self.words {\n                for _ in 0 ..< Word.bitWidth / 8 {\n                    p[i] = UInt8(word & 0xFF)\n                    word >>= 8\n                    if i == 0 {\n                        assert(word == 0)\n                        break\n                    }\n                    i -= 1\n                }\n            }\n        }\n        return data\n    }\n}\n\nextension CS.BigInt {\n    \n    /// Initialize a BigInt from bytes accessed from an UnsafeRawBufferPointer,\n    /// where the first byte indicates sign (0 for positive, 1 for negative)\n    public init(_ buffer: UnsafeRawBufferPointer) {\n        // This assumes Word is binary.\n        precondition(Word.bitWidth % 8 == 0)\n        \n        self.init()\n        \n        let length = buffer.count\n        \n        // Serialized data for a BigInt should contain at least 2 bytes: one representing\n        // the sign, and another for the non-zero magnitude. Zero is represented by an\n        // empty Data struct, and negative zero is not supported.\n        guard length > 1, let firstByte = buffer.first else { return }\n\n        // The first byte gives the sign\n        // This byte is compared to a bitmask to allow additional functionality to be added\n        // to this byte in the future.\n        self.sign = firstByte & 0b1 == 0 ? .plus : .minus\n\n        self.magnitude = CS.BigUInt(UnsafeRawBufferPointer(rebasing: buffer.dropFirst(1)))\n    }\n    \n    /// Initializes an integer from the bits stored inside a piece of `Data`.\n    /// The data is assumed to be in network (big-endian) byte order with a first\n    /// byte to represent the sign (0 for positive, 1 for negative)\n    public init(_ data: Data) {\n        // This assumes Word is binary.\n        // This is the same assumption made when initializing CS.BigUInt from Data\n        precondition(Word.bitWidth % 8 == 0)\n\n        self.init()\n        \n        // Serialized data for a BigInt should contain at least 2 bytes: one representing\n        // the sign, and another for the non-zero magnitude. Zero is represented by an\n        // empty Data struct, and negative zero is not supported.\n        guard data.count > 1, let firstByte = data.first else { return }\n        \n        // The first byte gives the sign\n        // This byte is compared to a bitmask to allow additional functionality to be added\n        // to this byte in the future.\n        self.sign = firstByte & 0b1 == 0 ? .plus : .minus\n        \n        // The remaining bytes are read and stored as the magnitude\n        self.magnitude = CS.BigUInt(data.dropFirst(1))\n    }\n    \n    /// Return a `Data` value that contains the base-256 representation of this integer, in network (big-endian) byte order and a prepended byte to indicate the sign (0 for positive, 1 for negative)\n    public func serialize() -> Data {\n        // Create a data object for the magnitude portion of the BigInt\n        let magnitudeData = self.magnitude.serialize()\n        \n        // Similar to CS.BigUInt, a value of 0 should return an initialized, empty Data struct\n        guard magnitudeData.count > 0 else { return magnitudeData }\n        \n        // Create a new Data struct for the signed BigInt value\n        var data = Data(capacity: magnitudeData.count + 1)\n        \n        // The first byte should be 0 for a positive value, or 1 for a negative value\n        // i.e., the sign bit is the LSB\n        data.append(self.sign == .plus ? 0 : 1)\n        \n        data.append(magnitudeData)\n        return data\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Division.swift",
    "content": "//\n//  Division.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\n//MARK: Full-width multiplication and division\n\n// TODO: Return to `where Magnitude == Self` when SR-13491 is resolved\nextension FixedWidthInteger {\n    private var halfShift: Self {\n        return Self(Self.bitWidth / 2)\n\n    }\n    private var high: Self {\n        return self &>> halfShift\n    }\n\n    private var low: Self {\n        let mask: Self = 1 &<< halfShift - 1\n        return self & mask\n    }\n\n    private var upshifted: Self {\n        return self &<< halfShift\n    }\n\n    private var split: (high: Self, low: Self) {\n        return (self.high, self.low)\n    }\n\n    private init(_ value: (high: Self, low: Self)) {\n        self = value.high.upshifted + value.low\n    }\n\n    /// Divide the double-width integer `dividend` by `self` and return the quotient and remainder.\n    ///\n    /// - Requires: `dividend.high < self`, so that the result will fit in a single digit.\n    /// - Complexity: O(1) with 2 divisions, 6 multiplications and ~12 or so additions/subtractions.\n    internal func fastDividingFullWidth(_ dividend: (high: Self, low: Self.Magnitude)) -> (quotient: Self, remainder: Self) {\n        // Division is complicated; doing it with single-digit operations is maddeningly complicated.\n        // This is a Swift adaptation for \"divlu2\" in Hacker's Delight,\n        // which is in turn a C adaptation of Knuth's Algorithm D (TAOCP vol 2, 4.3.1).\n        precondition(dividend.high < self)\n\n        // This replaces the implementation in stdlib, which is much slower.\n        // FIXME: Speed up stdlib. It should use full-width idiv on Intel processors, and\n        // fall back to a reasonably fast algorithm elsewhere.\n\n        // The trick here is that we're actually implementing a 4/2 long division using half-words,\n        // with the long division loop unrolled into two 3/2 half-word divisions.\n        // Luckily, 3/2 half-word division can be approximated by a single full-word division operation\n        // that, when the divisor is normalized, differs from the correct result by at most 2.\n\n        /// Find the half-word quotient in `u / vn`, which must be normalized.\n        /// `u` contains three half-words in the two halves of `u.high` and the lower half of\n        /// `u.low`. (The weird distribution makes for a slightly better fit with the input.)\n        /// `vn` contains the normalized divisor, consisting of two half-words.\n        ///\n        /// - Requires: u.high < vn && u.low.high == 0 && vn.leadingZeroBitCount == 0\n        func quotient(dividing u: (high: Self, low: Self), by vn: Self) -> Self {\n            let (vn1, vn0) = vn.split\n            // Get approximate quotient.\n            let (q, r) = u.high.quotientAndRemainder(dividingBy: vn1)\n            let p = q * vn0\n            // q is often already correct, but sometimes the approximation overshoots by at most 2.\n            // The code that follows checks for this while being careful to only perform single-digit operations.\n            if q.high == 0 && p <= r.upshifted + u.low { return q }\n            let r2 = r + vn1\n            if r2.high != 0 { return q - 1 }\n            if (q - 1).high == 0 && p - vn0 <= r2.upshifted + u.low { return q - 1 }\n            //assert((r + 2 * vn1).high != 0 || p - 2 * vn0 <= (r + 2 * vn1).upshifted + u.low)\n            return q - 2\n        }\n        /// Divide 3 half-digits by 2 half-digits to get a half-digit quotient and a full-digit remainder.\n        ///\n        /// - Requires: u.high < v && u.low.high == 0 && vn.width = width(Digit)\n        func quotientAndRemainder(dividing u: (high: Self, low: Self), by v: Self) -> (quotient: Self, remainder: Self) {\n            let q = quotient(dividing: u, by: v)\n            // Note that `uh.low` masks off a couple of bits, and `q * v` and the\n            // subtraction are likely to overflow. Despite this, the end result (remainder) will\n            // still be correct and it will fit inside a single (full) Digit.\n            let r = Self(u) &- q &* v\n            assert(r < v)\n            return (q, r)\n        }\n\n        // Normalize the dividend and the divisor (self) such that the divisor has no leading zeroes.\n        let z = Self(self.leadingZeroBitCount)\n        let w = Self(Self.bitWidth) - z\n        let vn = self << z\n\n        let un32 = (z == 0 ? dividend.high : (dividend.high &<< z) | ((dividend.low as! Self) &>> w)) // No bits are lost\n        let un10 = dividend.low &<< z\n        let (un1, un0) = un10.split\n\n        // Divide `(un32,un10)` by `vn`, splitting the full 4/2 division into two 3/2 ones.\n        let (q1, un21) = quotientAndRemainder(dividing: (un32, (un1 as! Self)), by: vn)\n        let (q0, rn) = quotientAndRemainder(dividing: (un21, (un0 as! Self)), by: vn)\n\n        // Undo normalization of the remainder and combine the two halves of the quotient.\n        let mod = rn >> z\n        let div = Self((q1, q0))\n        return (div, mod)\n    }\n\n    /// Return the quotient of the 3/2-word division `x/y` as a single word.\n    ///\n    /// - Requires: (x.0, x.1) <= y && y.0.high != 0\n    /// - Returns: The exact value when it fits in a single word, otherwise `Self`.\n    static func approximateQuotient(dividing x: (Self, Self, Self), by y: (Self, Self)) -> Self {\n        // Start with q = (x.0, x.1) / y.0, (or Word.max on overflow)\n        var q: Self\n        var r: Self\n        if x.0 == y.0 {\n            q = Self.max\n            let (s, o) = x.0.addingReportingOverflow(x.1)\n            if o { return q }\n            r = s\n        }\n        else {\n            (q, r) = y.0.fastDividingFullWidth((x.0, (x.1 as! Magnitude)))\n        }\n        // Now refine q by considering x.2 and y.1.\n        // Note that since y is normalized, q * y - x is between 0 and 2.\n        let (ph, pl) = q.multipliedFullWidth(by: y.1)\n        if ph < r || (ph == r && pl <= x.2) { return q }\n\n        let (r1, ro) = r.addingReportingOverflow(y.0)\n        if ro { return q - 1 }\n\n        let (pl1, so) = pl.subtractingReportingOverflow((y.1 as! Magnitude))\n        let ph1 = (so ? ph - 1 : ph)\n\n        if ph1 < r1 || (ph1 == r1 && pl1 <= x.2) { return q - 1 }\n        return q - 2\n    }\n}\n\nextension CS.BigUInt {\n    //MARK: Division\n\n    /// Divide this integer by the word `y`, leaving the quotient in its place and returning the remainder.\n    ///\n    /// - Requires: y > 0\n    /// - Complexity: O(count)\n    internal mutating func divide(byWord y: Word) -> Word {\n        precondition(y > 0)\n        if y == 1 { return 0 }\n        \n        var remainder: Word = 0\n        for i in (0 ..< count).reversed() {\n            let u = self[i]\n            (self[i], remainder) = y.fastDividingFullWidth((remainder, u))\n        }\n        return remainder\n    }\n\n    /// Divide this integer by the word `y` and return the resulting quotient and remainder.\n    ///\n    /// - Requires: y > 0\n    /// - Returns: (quotient, remainder) where quotient = floor(x/y), remainder = x - quotient * y\n    /// - Complexity: O(x.count)\n    internal func quotientAndRemainder(dividingByWord y: Word) -> (quotient:  CS.BigUInt, remainder: Word) {\n        var div = self\n        let mod = div.divide(byWord: y)\n        return (div, mod)\n    }\n\n    /// Divide `x` by `y`, putting the quotient in `x` and the remainder in `y`.\n    /// Reusing integers like this reduces the number of allocations during the calculation.\n    static func divide(_ x: inout  CS.BigUInt, by y: inout  CS.BigUInt) {\n        // This is a Swift adaptation of \"divmnu\" from Hacker's Delight, which is in\n        // turn a C adaptation of Knuth's Algorithm D (TAOCP vol 2, 4.3.1).\n\n        precondition(!y.isZero)\n\n        // First, let's take care of the easy cases.\n        if x < y {\n            (x, y) = (0, x)\n            return\n        }\n        if y.count == 1 {\n            // The single-word case reduces to a simpler loop.\n            y =  CS.BigUInt(x.divide(byWord: y[0]))\n            return\n        }\n\n        // In the hard cases, we will perform the long division algorithm we learned in school.\n        // It works by successively calculating the single-word quotient of the top y.count + 1\n        // words of x divided by y, replacing the top of x with the remainder, and repeating\n        // the process one word lower.\n        //\n        // The tricky part is that the algorithm needs to be able to do n+1/n word divisions,\n        // but we only have a primitive for dividing two words by a single\n        // word. (Remember that this step is also tricky when we do it on paper!)\n        //\n        // The solution is that the long division can be approximated by a single full division\n        // using just the most significant words. We can then use multiplications and\n        // subtractions to refine the approximation until we get the correct quotient word.\n        //\n        // We could do this by doing a simple 2/1 full division, but Knuth goes one step further,\n        // and implements a 3/2 division. This results in an exact approximation in the\n        // vast majority of cases, eliminating an extra subtraction over big integers.\n        //\n        // The function `approximateQuotient` above implements Knuth's 3/2 division algorithm.\n        // It requires that the divisor's most significant word is larger than\n        // Word.max / 2. This ensures that the approximation has tiny error bounds,\n        // which is what makes this entire approach viable.\n        // To satisfy this requirement, we will normalize the division by multiplying\n        // both the divisor and the dividend by the same (small) factor.\n        let z = y.leadingZeroBitCount\n        y <<= z\n        x <<= z // We'll calculate the remainder in the normalized dividend.\n        var quotient =  CS.BigUInt()\n        assert(y.leadingZeroBitCount == 0)\n\n        // We're ready to start the long division!\n        let dc = y.count\n        let d1 = y[dc - 1]\n        let d0 = y[dc - 2]\n        var product:  CS.BigUInt = 0\n        for j in (dc ... x.count).reversed() {\n            // Approximate dividing the top dc+1 words of `remainder` using the topmost 3/2 words.\n            let r2 = x[j]\n            let r1 = x[j - 1]\n            let r0 = x[j - 2]\n            let q = Word.approximateQuotient(dividing: (r2, r1, r0), by: (d1, d0))\n\n            // Multiply the entire divisor with `q` and subtract the result from remainder.\n            // Normalization ensures the 3/2 quotient will either be exact for the full division, or\n            // it may overshoot by at most 1, in which case the product will be greater\n            // than the remainder.\n            product.load(y)\n            product.multiply(byWord: q)\n            if product <= x.extract(j - dc ..< j + 1) {\n                x.subtract(product, shiftedBy: j - dc)\n                quotient[j - dc] = q\n            }\n            else {\n                // This case is extremely rare -- it has a probability of 1/2^(Word.bitWidth - 1).\n                x.add(y, shiftedBy: j - dc)\n                x.subtract(product, shiftedBy: j - dc)\n                quotient[j - dc] = q - 1\n            }\n        }\n        // The remainder's normalization needs to be undone, but otherwise we're done.\n        x >>= z\n        y = x\n        x = quotient\n    }\n\n    /// Divide `x` by `y`, putting the remainder in `x`.\n    mutating func formRemainder(dividingBy y:  CS.BigUInt, normalizedBy shift: Int) {\n        precondition(!y.isZero)\n        assert(y.leadingZeroBitCount == 0)\n        if y.count == 1 {\n            let remainder = self.divide(byWord: y[0] >> shift)\n            self.load(CS.BigUInt(remainder))\n            return\n        }\n        self <<= shift\n        if self >= y {\n            let dc = y.count\n            let d1 = y[dc - 1]\n            let d0 = y[dc - 2]\n            var product:  CS.BigUInt = 0\n            for j in (dc ... self.count).reversed() {\n                let r2 = self[j]\n                let r1 = self[j - 1]\n                let r0 = self[j - 2]\n                let q = Word.approximateQuotient(dividing: (r2, r1, r0), by: (d1, d0))\n                product.load(y)\n                product.multiply(byWord: q)\n                if product <= self.extract(j - dc ..< j + 1) {\n                    self.subtract(product, shiftedBy: j - dc)\n                }\n                else {\n                    self.add(y, shiftedBy: j - dc)\n                    self.subtract(product, shiftedBy: j - dc)\n                }\n            }\n        }\n        self >>= shift\n    }\n\n\n    /// Divide this integer by `y` and return the resulting quotient and remainder.\n    ///\n    /// - Requires: `y > 0`\n    /// - Returns: `(quotient, remainder)` where `quotient = floor(self/y)`, `remainder = self - quotient * y`\n    /// - Complexity: O(count^2)\n    public func quotientAndRemainder(dividingBy y:  CS.BigUInt) -> (quotient:  CS.BigUInt, remainder:  CS.BigUInt) {\n        var x = self\n        var y = y\n         CS.BigUInt.divide(&x, by: &y)\n        return (x, y)\n    }\n\n    /// Divide `x` by `y` and return the quotient.\n    ///\n    /// - Note: Use `divided(by:)` if you also need the remainder.\n    public static func /(x: CS.BigUInt, y: CS.BigUInt) -> CS.BigUInt {\n        return x.quotientAndRemainder(dividingBy: y).quotient\n    }\n\n    /// Divide `x` by `y` and return the remainder.\n    ///\n    /// - Note: Use `divided(by:)` if you also need the remainder.\n    public static func %(x: CS.BigUInt, y: CS.BigUInt) -> CS.BigUInt {\n        var x = x\n        let shift = y.leadingZeroBitCount\n        x.formRemainder(dividingBy: y << shift, normalizedBy: shift)\n        return x\n    }\n\n    /// Divide `x` by `y` and store the quotient in `x`.\n    ///\n    /// - Note: Use `divided(by:)` if you also need the remainder.\n    public static func /=(x: inout  CS.BigUInt, y:  CS.BigUInt) {\n        var y = y\n         CS.BigUInt.divide(&x, by: &y)\n    }\n\n    /// Divide `x` by `y` and store the remainder in `x`.\n    ///\n    /// - Note: Use `divided(by:)` if you also need the remainder.\n    public static func %=(x: inout CS.BigUInt, y: CS.BigUInt) {\n        let shift = y.leadingZeroBitCount\n        x.formRemainder(dividingBy: y << shift, normalizedBy: shift)\n    }\n}\n\nextension CS.BigInt {\n    /// Divide this integer by `y` and return the resulting quotient and remainder.\n    ///\n    /// - Requires: `y > 0`\n    /// - Returns: `(quotient, remainder)` where `quotient = floor(self/y)`, `remainder = self - quotient * y`\n    /// - Complexity: O(count^2)\n    public func quotientAndRemainder(dividingBy y: CS.BigInt) -> (quotient: CS.BigInt, remainder: CS.BigInt) {\n        var a = self.magnitude\n        var b = y.magnitude\n         CS.BigUInt.divide(&a, by: &b)\n        return ( CS.BigInt(sign: self.sign == y.sign ? .plus : .minus, magnitude: a),\n                CS.BigInt(sign: self.sign, magnitude: b))\n    }\n\n    /// Divide `a` by `b` and return the quotient. Traps if `b` is zero.\n    public static func /(a: CS.BigInt, b: CS.BigInt) -> CS.BigInt {\n        return CS.BigInt(sign: a.sign == b.sign ? .plus : .minus, magnitude: a.magnitude / b.magnitude)\n    }\n\n    /// Divide `a` by `b` and return the remainder. The result has the same sign as `a`.\n    public static func %(a: CS.BigInt, b: CS.BigInt) -> CS.BigInt {\n        return CS.BigInt(sign: a.sign, magnitude: a.magnitude % b.magnitude)\n    }\n\n    /// Return the result of `a` mod `b`. The result is always a nonnegative integer that is less than the absolute value of `b`.\n    public func modulus(_ mod: CS.BigInt) -> CS.BigInt {\n        let remainder = self.magnitude % mod.magnitude\n        return CS.BigInt(\n            self.sign == .minus && !remainder.isZero\n                ? mod.magnitude - remainder\n                : remainder)\n    }\n}\n\nextension CS.BigInt {\n    /// Divide `a` by `b` storing the quotient in `a`.\n    public static func /=(a: inout CS.BigInt, b: CS.BigInt) { a = a / b }\n    /// Divide `a` by `b` storing the remainder in `a`.\n    public static func %=(a: inout CS.BigInt, b: CS.BigInt) { a = a % b }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Exponentiation.swift",
    "content": "//\n//  Exponentiation.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n    //MARK: Exponentiation\n\n    /// Returns this integer raised to the power `exponent`.\n    ///\n    /// This function calculates the result by [successively squaring the base while halving the exponent][expsqr].\n    ///\n    /// [expsqr]: https://en.wikipedia.org/wiki/Exponentiation_by_squaring\n    ///\n    /// - Note: This function can be unreasonably expensive for large exponents, which is why `exponent` is\n    ///         a simple integer value. If you want to calculate big exponents, you'll probably need to use\n    ///         the modulo arithmetic variant.\n    /// - Returns: 1 if `exponent == 0`, otherwise `self` raised to `exponent`. (This implies that `0.power(0) == 1`.)\n    /// - SeeAlso: `BigUInt.power(_:, modulus:)`\n    /// - Complexity: O((exponent * self.count)^log2(3)) or somesuch. The result may require a large amount of memory, too.\n    public func power(_ exponent: Int) -> CS.BigUInt {\n        if exponent == 0 { return 1 }\n        if exponent == 1 { return self }\n        if exponent < 0 {\n            precondition(!self.isZero)\n            return self == 1 ? 1 : 0\n        }\n        if self <= 1 { return self }\n        var result = CS.BigUInt(1)\n        var b = self\n        var e = exponent\n        while e > 0 {\n            if e & 1 == 1 {\n                result *= b\n            }\n            e >>= 1\n            b *= b\n        }\n        return result\n    }\n\n    /// Returns the remainder of this integer raised to the power `exponent` in modulo arithmetic under `modulus`.\n    ///\n    /// Uses the [right-to-left binary method][rtlb].\n    ///\n    /// [rtlb]: https://en.wikipedia.org/wiki/Modular_exponentiation#Right-to-left_binary_method\n    ///\n    /// - Complexity: O(exponent.count * modulus.count^log2(3)) or somesuch\n    public func power(_ exponent: CS.BigUInt, modulus: CS.BigUInt) -> CS.BigUInt {\n        precondition(!modulus.isZero)\n        if modulus == (1 as CS.BigUInt) { return 0 }\n        let shift = modulus.leadingZeroBitCount\n        let normalizedModulus = modulus << shift\n        var result = CS.BigUInt(1)\n        var b = self\n        b.formRemainder(dividingBy: normalizedModulus, normalizedBy: shift)\n        for var e in exponent.words {\n            for _ in 0 ..< Word.bitWidth {\n                if e & 1 == 1 {\n                    result *= b\n                    result.formRemainder(dividingBy: normalizedModulus, normalizedBy: shift)\n                }\n                e >>= 1\n                b *= b\n                b.formRemainder(dividingBy: normalizedModulus, normalizedBy: shift)\n            }\n        }\n        return result\n    }\n}\n\nextension CS.BigInt {\n    /// Returns this integer raised to the power `exponent`.\n    ///\n    /// This function calculates the result by [successively squaring the base while halving the exponent][expsqr].\n    ///\n    /// [expsqr]: https://en.wikipedia.org/wiki/Exponentiation_by_squaring\n    ///\n    /// - Note: This function can be unreasonably expensive for large exponents, which is why `exponent` is\n    ///         a simple integer value. If you want to calculate big exponents, you'll probably need to use\n    ///         the modulo arithmetic variant.\n    /// - Returns: 1 if `exponent == 0`, otherwise `self` raised to `exponent`. (This implies that `0.power(0) == 1`.)\n    /// - SeeAlso: `BigUInt.power(_:, modulus:)`\n    /// - Complexity: O((exponent * self.count)^log2(3)) or somesuch. The result may require a large amount of memory, too.\n    public func power(_ exponent: Int) -> CS.BigInt {\n        return CS.BigInt(sign: self.sign == .minus && exponent & 1 != 0 ? .minus : .plus,\n                      magnitude: self.magnitude.power(exponent))\n    }\n\n    /// Returns the remainder of this integer raised to the power `exponent` in modulo arithmetic under `modulus`.\n    ///\n    /// Uses the [right-to-left binary method][rtlb].\n    ///\n    /// [rtlb]: https://en.wikipedia.org/wiki/Modular_exponentiation#Right-to-left_binary_method\n    ///\n    /// - Complexity: O(exponent.count * modulus.count^log2(3)) or somesuch\n    public func power(_ exponent: CS.BigInt, modulus: CS.BigInt) -> CS.BigInt {\n        precondition(!modulus.isZero)\n        if modulus.magnitude == 1 { return 0 }\n        if exponent.isZero { return 1 }\n        if exponent == 1 { return self.modulus(modulus) }\n        if exponent < 0 {\n            precondition(!self.isZero)\n            guard magnitude == 1 else { return 0 }\n            guard sign == .minus else { return 1 }\n            guard exponent.magnitude[0] & 1 != 0 else { return 1 }\n            return CS.BigInt(modulus.magnitude - 1)\n        }\n        let power = self.magnitude.power(exponent.magnitude,\n                                         modulus: modulus.magnitude)\n        if self.sign == .plus || exponent.magnitude[0] & 1 == 0 || power.isZero {\n            return CS.BigInt(power)\n        }\n        return CS.BigInt(modulus.magnitude - power)\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/FloatingPointConversion.swift",
    "content": "//\n//  FloatingPointConversion.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2017-08-11.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n    public init?<T: BinaryFloatingPoint>(exactly source: T) {\n        guard source.isFinite else { return nil }\n        guard !source.isZero else { self = 0; return }\n        guard source.sign == .plus else { return nil }\n        let value = source.rounded(.towardZero)\n        guard value == source else { return nil }\n        assert(value.floatingPointClass == .positiveNormal)\n        assert(value.exponent >= 0)\n        let significand = value.significandBitPattern\n        self = (CS.BigUInt(1) << value.exponent) + CS.BigUInt(significand) >> (T.significandBitCount - Int(value.exponent))\n    }\n\n    public init<T: BinaryFloatingPoint>(_ source: T) {\n        self.init(exactly: source.rounded(.towardZero))!\n    }\n}\n\nextension CS.BigInt {\n    public init?<T: BinaryFloatingPoint>(exactly source: T) {\n        switch source.sign{\n        case .plus:\n            guard let magnitude = CS.BigUInt(exactly: source) else { return nil }\n            self = CS.BigInt(sign: .plus, magnitude: magnitude)\n        case .minus:\n            guard let magnitude = CS.BigUInt(exactly: -source) else { return nil }\n            self = CS.BigInt(sign: .minus, magnitude: magnitude)\n        }\n    }\n\n    public init<T: BinaryFloatingPoint>(_ source: T) {\n        self.init(exactly: source.rounded(.towardZero))!\n    }\n}\n\nextension BinaryFloatingPoint where RawExponent: FixedWidthInteger, RawSignificand: FixedWidthInteger {\n    public init(_ value: CS.BigInt) {\n        guard !value.isZero else { self = 0; return }\n        let v = value.magnitude\n        let bitWidth = v.bitWidth\n        var exponent = bitWidth - 1\n        let shift = bitWidth - Self.significandBitCount - 1\n        var significand = value.magnitude >> (shift - 1)\n        if significand[0] & 3 == 3 { // Handle rounding\n            significand >>= 1\n            significand += 1\n            if significand.trailingZeroBitCount >= Self.significandBitCount {\n                exponent += 1\n            }\n        }\n        else {\n            significand >>= 1\n        }\n        let bias = 1 << (Self.exponentBitCount - 1) - 1\n        guard exponent <= bias else { self = Self.infinity; return }\n        significand &= 1 << Self.significandBitCount - 1\n        self = Self.init(sign: value.sign == .plus ? .plus : .minus,\n                         exponentBitPattern: RawExponent(bias + exponent),\n                         significandBitPattern: RawSignificand(significand))\n    }\n\n    public init(_ value: CS.BigUInt) {\n        self.init(CS.BigInt(sign: .plus, magnitude: value))\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/GCD.swift",
    "content": "//\n//  GCD.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n    //MARK: Greatest Common Divisor\n    \n    /// Returns the greatest common divisor of `self` and `b`.\n    ///\n    /// - Complexity: O(count^2) where count = max(self.count, b.count)\n    public func greatestCommonDivisor(with b: CS.BigUInt) -> CS.BigUInt {\n        // This is Stein's algorithm: https://en.wikipedia.org/wiki/Binary_GCD_algorithm\n        if self.isZero { return b }\n        if b.isZero { return self }\n\n        let az = self.trailingZeroBitCount\n        let bz = b.trailingZeroBitCount\n        let twos = Swift.min(az, bz)\n\n        var (x, y) = (self >> az, b >> bz)\n        if x < y { swap(&x, &y) }\n\n        while !x.isZero {\n            x >>= x.trailingZeroBitCount\n            if x < y { swap(&x, &y) }\n            x -= y\n        }\n        return y << twos\n    }\n    \n    /// Returns the [multiplicative inverse of this integer in modulo `modulus` arithmetic][inverse],\n    /// or `nil` if there is no such number.\n    /// \n    /// [inverse]: https://en.wikipedia.org/wiki/Extended_Euclidean_algorithm#Modular_integers\n    ///\n    /// - Returns: If `gcd(self, modulus) == 1`, the value returned is an integer `a < modulus` such that `(a * self) % modulus == 1`. If `self` and `modulus` aren't coprime, the return value is `nil`.\n    /// - Requires: modulus > 1\n    /// - Complexity: O(count^3)\n    public func inverse(_ modulus: CS.BigUInt) -> CS.BigUInt? {\n        precondition(modulus > 1)\n        var t1 = CS.BigInt(0)\n        var t2 = CS.BigInt(1)\n        var r1 = modulus\n        var r2 = self\n        while !r2.isZero {\n            let quotient = r1 / r2\n            (t1, t2) = (t2, t1 - CS.BigInt(quotient) * t2)\n            (r1, r2) = (r2, r1 - quotient * r2)\n        }\n        if r1 > 1 { return nil }\n        if t1.sign == .minus { return modulus - t1.magnitude }\n        return t1.magnitude\n    }\n}\n\nextension CS.BigInt {\n    /// Returns the greatest common divisor of `a` and `b`.\n    ///\n    /// - Complexity: O(count^2) where count = max(a.count, b.count)\n    public func greatestCommonDivisor(with b: CS.BigInt) -> CS.BigInt {\n        return CS.BigInt(self.magnitude.greatestCommonDivisor(with: b.magnitude))\n    }\n\n    /// Returns the [multiplicative inverse of this integer in modulo `modulus` arithmetic][inverse],\n    /// or `nil` if there is no such number.\n    ///\n    /// [inverse]: https://en.wikipedia.org/wiki/Extended_Euclidean_algorithm#Modular_integers\n    ///\n    /// - Returns: If `gcd(self, modulus) == 1`, the value returned is an integer `a < modulus` such that `(a * self) % modulus == 1`. If `self` and `modulus` aren't coprime, the return value is `nil`.\n    /// - Requires: modulus.magnitude > 1\n    /// - Complexity: O(count^3)\n    public func inverse(_ modulus: CS.BigInt) -> CS.BigInt? {\n        guard let inv = self.magnitude.inverse(modulus.magnitude) else { return nil }\n        return CS.BigInt(self.sign == .plus || inv.isZero ? inv : modulus.magnitude - inv)\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Hashable.swift",
    "content": "//\n//  Hashable.swift\n//  BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt: Hashable {\n    //MARK: Hashing\n\n    /// Append this `BigUInt` to the specified hasher.\n    public func hash(into hasher: inout Hasher) {\n        for word in self.words {\n            hasher.combine(word)\n        }\n    }\n}\n\nextension CS.BigInt: Hashable {\n    /// Append this `BigInt` to the specified hasher.\n    public func hash(into hasher: inout Hasher) {\n        hasher.combine(sign)\n        hasher.combine(magnitude)\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/IntegerConversion.swift",
    "content": "//\n//  IntegerConversion.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2017-08-11.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n    public init?<T: BinaryInteger>(exactly source: T) {\n        guard source >= (0 as T) else { return nil }\n        if source.bitWidth <= 2 * Word.bitWidth {\n            var it = source.words.makeIterator()\n            self.init(low: it.next() ?? 0, high: it.next() ?? 0)\n            precondition(it.next() == nil, \"Length of BinaryInteger.words is greater than its bitWidth\")\n        }\n        else {\n            self.init(words: source.words)\n        }\n    }\n\n    public init<T: BinaryInteger>(_ source: T) {\n        precondition(source >= (0 as T), \"BigUInt cannot represent negative values\")\n        self.init(exactly: source)!\n    }\n\n    public init<T: BinaryInteger>(truncatingIfNeeded source: T) {\n        self.init(words: source.words)\n    }\n\n    public init<T: BinaryInteger>(clamping source: T) {\n        if source <= (0 as T) {\n            self.init()\n        }\n        else {\n            self.init(words: source.words)\n        }\n    }\n}\n\nextension CS.BigInt {\n    public init() {\n        self.init(sign: .plus, magnitude: 0)\n    }\n\n    /// Initializes a new signed big integer with the same value as the specified unsigned big integer.\n    public init(_ integer: CS.BigUInt) {\n        self.magnitude = integer\n        self.sign = .plus\n    }\n\n    public init<T>(_ source: T) where T : BinaryInteger {\n        if source >= (0 as T) {\n            self.init(sign: .plus, magnitude: CS.BigUInt(source))\n        }\n        else {\n            var words = Array(source.words)\n            words.twosComplement()\n            self.init(sign: .minus, magnitude: CS.BigUInt(words: words))\n        }\n    }\n\n    public init?<T>(exactly source: T) where T : BinaryInteger {\n        self.init(source)\n    }\n\n    public init<T>(clamping source: T) where T : BinaryInteger {\n        self.init(source)\n    }\n\n    public init<T>(truncatingIfNeeded source: T) where T : BinaryInteger {\n        self.init(source)\n    }\n}\n\nextension CS.BigUInt: ExpressibleByIntegerLiteral {\n    /// Initialize a new big integer from an integer literal.\n    public init(integerLiteral value: UInt64) {\n        self.init(value)\n    }\n}\n\nextension CS.BigInt: ExpressibleByIntegerLiteral {\n    /// Initialize a new big integer from an integer literal.\n    public init(integerLiteral value: Int64) {\n        self.init(value)\n    }\n}\n\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Multiplication.swift",
    "content": "//\n//  Multiplication.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n\n    //MARK: Multiplication\n\n    /// Multiply this big integer by a single word, and store the result in place of the original big integer.\n    ///\n    /// - Complexity: O(count)\n    public mutating func multiply(byWord y: Word) {\n        guard y != 0 else { self = 0; return }\n        guard y != 1 else { return }\n        var carry: Word = 0\n        let c = self.count\n        for i in 0 ..< c {\n            let (h, l) = self[i].multipliedFullWidth(by: y)\n            let (low, o) = l.addingReportingOverflow(carry)\n            self[i] = low\n            carry = (o ? h + 1 : h)\n        }\n        self[c] = carry\n    }\n\n    /// Multiply this big integer by a single Word, and return the result.\n    ///\n    /// - Complexity: O(count)\n    public func multiplied(byWord y: Word) -> CS.BigUInt {\n        var r = self\n        r.multiply(byWord: y)\n        return r\n    }\n\n    /// Multiply `x` by `y`, and add the result to this integer, optionally shifted `shift` words to the left.\n    ///\n    /// - Note: This is the fused multiply/shift/add operation; it is more efficient than doing the components\n    ///   individually. (The fused operation doesn't need to allocate space for temporary big integers.)\n    /// - Returns: `self` is set to `self + (x * y) << (shift * 2^Word.bitWidth)`\n    /// - Complexity: O(count)\n    public mutating func multiplyAndAdd(_ x: CS.BigUInt, _ y: Word, shiftedBy shift: Int = 0) {\n        precondition(shift >= 0)\n        guard y != 0 && x.count > 0 else { return }\n        guard y != 1 else { self.add(x, shiftedBy: shift); return }\n        var mulCarry: Word = 0\n        var addCarry = false\n        let xc = x.count\n        var xi = 0\n        while xi < xc || addCarry || mulCarry > 0 {\n            let (h, l) = x[xi].multipliedFullWidth(by: y)\n            let (low, o) = l.addingReportingOverflow(mulCarry)\n            mulCarry = (o ? h + 1 : h)\n\n            let ai = shift + xi\n            let (sum1, so1) = self[ai].addingReportingOverflow(low)\n            if addCarry {\n                let (sum2, so2) = sum1.addingReportingOverflow(1)\n                self[ai] = sum2\n                addCarry = so1 || so2\n            }\n            else {\n                self[ai] = sum1\n                addCarry = so1\n            }\n            xi += 1\n        }\n    }\n\n    /// Multiply this integer by `y` and return the result.\n    ///\n    /// - Note: This uses the naive O(n^2) multiplication algorithm unless both arguments have more than\n    ///   `BigUInt.directMultiplicationLimit` words.\n    /// - Complexity: O(n^log2(3))\n    public func multiplied(by y: CS.BigUInt) -> CS.BigUInt {\n        // This method is mostly defined for symmetry with the rest of the arithmetic operations.\n        return self * y\n    }\n\n    /// Multiplication switches to an asymptotically better recursive algorithm when arguments have more words than this limit.\n    public static var directMultiplicationLimit: Int = 1024\n\n    /// Multiply `a` by `b` and return the result.\n    ///\n    /// - Note: This uses the naive O(n^2) multiplication algorithm unless both arguments have more than\n    ///   `BigUInt.directMultiplicationLimit` words.\n    /// - Complexity: O(n^log2(3))\n    public static func *(x: CS.BigUInt, y: CS.BigUInt) -> CS.BigUInt {\n        let xc = x.count\n        let yc = y.count\n        if xc == 0 { return CS.BigUInt() }\n        if yc == 0 { return CS.BigUInt() }\n        if yc == 1 { return x.multiplied(byWord: y[0]) }\n        if xc == 1 { return y.multiplied(byWord: x[0]) }\n\n        if Swift.min(xc, yc) <= CS.BigUInt.directMultiplicationLimit {\n            // Long multiplication.\n            let left = (xc < yc ? y : x)\n            let right = (xc < yc ? x : y)\n            var result = CS.BigUInt()\n            for i in (0 ..< right.count).reversed() {\n                result.multiplyAndAdd(left, right[i], shiftedBy: i)\n            }\n            return result\n        }\n\n        if yc < xc {\n            let (xh, xl) = x.split\n            var r = xl * y\n            r.add(xh * y, shiftedBy: x.middleIndex)\n            return r\n        }\n        else if xc < yc {\n            let (yh, yl) = y.split\n            var r = yl * x\n            r.add(yh * x, shiftedBy: y.middleIndex)\n            return r\n        }\n\n        let shift = x.middleIndex\n\n        // Karatsuba multiplication:\n        // x * y = <a,b> * <c,d> = <ac, ac + bd - (a-b)(c-d), bd> (ignoring carry)\n        let (a, b) = x.split\n        let (c, d) = y.split\n\n        let high = a * c\n        let low = b * d\n        let xp = a >= b\n        let yp = c >= d\n        let xm = (xp ? a - b : b - a)\n        let ym = (yp ? c - d : d - c)\n        let m = xm * ym\n\n        var r = low\n        r.add(high, shiftedBy: 2 * shift)\n        r.add(low, shiftedBy: shift)\n        r.add(high, shiftedBy: shift)\n        if xp == yp {\n            r.subtract(m, shiftedBy: shift)\n        }\n        else {\n            r.add(m, shiftedBy: shift)\n        }\n        return r\n    }\n\n    /// Multiply `a` by `b` and store the result in `a`.\n    public static func *=(a: inout CS.BigUInt, b: CS.BigUInt) {\n        a = a * b\n    }\n}\n\nextension CS.BigInt {\n    /// Multiply `a` with `b` and return the result.\n    public static func *(a: CS.BigInt, b: CS.BigInt) -> CS.BigInt {\n        return CS.BigInt(sign: a.sign == b.sign ? .plus : .minus, magnitude: a.magnitude * b.magnitude)\n    }\n\n    /// Multiply `a` with `b` in place.\n    public static func *=(a: inout CS.BigInt, b: CS.BigInt) { a = a * b }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/PrimeTest.swift",
    "content": "//\n//  PrimeTest.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-04.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\n/// The first several [prime numbers][primes]. \n///\n/// [primes]: https://oeis.org/A000040\nlet primes: [CS.BigUInt.Word] = [2, 3, 5, 7, 11, 13, 17, 19, 23, 29, 31, 37, 41]\n\n/// The ith element in this sequence is the smallest composite number that passes the strong probable prime test\n/// for all of the first (i+1) primes.\n///\n/// This is sequence [A014233](http://oeis.org/A014233) on the [Online Encyclopaedia of Integer Sequences](http://oeis.org).\nlet pseudoPrimes: [CS.BigUInt] = [\n    /*  2 */ 2_047,\n    /*  3 */ 1_373_653,\n    /*  5 */ 25_326_001,\n    /*  7 */ 3_215_031_751,\n    /* 11 */ 2_152_302_898_747,\n    /* 13 */ 3_474_749_660_383,\n    /* 17 */ 341_550_071_728_321,\n    /* 19 */ 341_550_071_728_321,\n    /* 23 */ 3_825_123_056_546_413_051,\n    /* 29 */ 3_825_123_056_546_413_051,\n    /* 31 */ 3_825_123_056_546_413_051,\n    /* 37 */ \"318665857834031151167461\",\n    /* 41 */ \"3317044064679887385961981\",\n]\n\nextension CS.BigUInt {\n    //MARK: Primality Testing\n\n    /// Returns true iff this integer passes the [strong probable prime test][sppt] for the specified base.\n    ///\n    /// [sppt]: https://en.wikipedia.org/wiki/Probable_prime\n    public func isStrongProbablePrime(_ base: CS.BigUInt) -> Bool {\n        precondition(base > (1 as CS.BigUInt))\n        precondition(self > (0 as CS.BigUInt))\n        let dec = self - 1\n\n        let r = dec.trailingZeroBitCount\n        let d = dec >> r\n\n        var test = base.power(d, modulus: self)\n        if test == 1 || test == dec { return true }\n\n        if r > 0 {\n            let shift = self.leadingZeroBitCount\n            let normalized = self << shift\n            for _ in 1 ..< r {\n                test *= test\n                test.formRemainder(dividingBy: normalized, normalizedBy: shift)\n                if test == 1 {\n                    return false\n                }\n                if test == dec { return true }\n            }\n        }\n        return false\n    }\n\n    /// Returns true if this integer is probably prime. Returns false if this integer is definitely not prime.\n    ///\n    /// This function performs a probabilistic [Miller-Rabin Primality Test][mrpt], consisting of `rounds` iterations, \n    /// each calculating the strong probable prime test for a random base. The number of rounds is 10 by default,\n    /// but you may specify your own choice.\n    ///\n    /// To speed things up, the function checks if `self` is divisible by the first few prime numbers before\n    /// diving into (slower) Miller-Rabin testing.\n    ///\n    /// Also, when `self` is less than 82 bits wide, `isPrime` does a deterministic test that is guaranteed to \n    /// return a correct result.\n    ///\n    /// [mrpt]: https://en.wikipedia.org/wiki/Miller–Rabin_primality_test\n    public func isPrime(rounds: Int = 10) -> Bool {\n        if count <= 1 && self[0] < 2 { return false }\n        if count == 1 && self[0] < 4 { return true }\n\n        // Even numbers above 2 aren't prime.\n        if self[0] & 1 == 0 { return false }\n\n        // Quickly check for small primes.\n        for i in 1 ..< primes.count {\n            let p = primes[i]\n            if self.count == 1 && self[0] == p {\n                return true\n            }\n            if self.quotientAndRemainder(dividingByWord: p).remainder == 0 {\n                return false\n            }\n        }\n\n        /// Give an exact answer when we can.\n        if self < pseudoPrimes.last! {\n            for i in 0 ..< pseudoPrimes.count {\n                guard isStrongProbablePrime(CS.BigUInt(primes[i])) else {\n                    break\n                }\n                if self < pseudoPrimes[i] {\n                    // `self` is below the lowest pseudoprime corresponding to the prime bases we tested. It's a prime!\n                    return true\n                }\n            }\n            return false\n        }\n\n        /// Otherwise do as many rounds of random SPPT as required.\n        for _ in 0 ..< rounds {\n            let random = CS.BigUInt.randomInteger(lessThan: self - 2) + 2\n            guard isStrongProbablePrime(random) else {\n                return false\n            }\n        }\n\n        // Well, it smells primey to me.\n        return true\n    }\n}\n\nextension CS.BigInt {\n    //MARK: Primality Testing\n\n    /// Returns true iff this integer passes the [strong probable prime test][sppt] for the specified base.\n    ///\n    /// [sppt]: https://en.wikipedia.org/wiki/Probable_prime\n    public func isStrongProbablePrime(_ base: CS.BigInt) -> Bool {\n        precondition(base.sign == .plus)\n        if self.sign == .minus { return false }\n        return self.magnitude.isStrongProbablePrime(base.magnitude)\n    }\n\n    /// Returns true if this integer is probably prime. Returns false if this integer is definitely not prime.\n    ///\n    /// This function performs a probabilistic [Miller-Rabin Primality Test][mrpt], consisting of `rounds` iterations,\n    /// each calculating the strong probable prime test for a random base. The number of rounds is 10 by default,\n    /// but you may specify your own choice.\n    ///\n    /// To speed things up, the function checks if `self` is divisible by the first few prime numbers before\n    /// diving into (slower) Miller-Rabin testing.\n    ///\n    /// Also, when `self` is less than 82 bits wide, `isPrime` does a deterministic test that is guaranteed to\n    /// return a correct result.\n    ///\n    /// [mrpt]: https://en.wikipedia.org/wiki/Miller–Rabin_primality_test\n    public func isPrime(rounds: Int = 10) -> Bool {\n        if self.sign == .minus { return false }\n        return self.magnitude.isPrime(rounds: rounds)\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Random.swift",
    "content": "//\n//  Random.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-04.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n    /// Create a big unsigned integer consisting of `width` uniformly distributed random bits.\n    ///\n    /// - Parameter width: The maximum number of one bits in the result.\n    /// - Parameter generator: The source of randomness.\n    /// - Returns: A big unsigned integer less than `1 << width`.\n    public static func randomInteger<RNG: RandomNumberGenerator>(withMaximumWidth width: Int, using generator: inout RNG) -> CS.BigUInt {\n        var result = CS.BigUInt.zero\n        var bitsLeft = width\n        var i = 0\n        let wordsNeeded = (width + Word.bitWidth - 1) / Word.bitWidth\n        if wordsNeeded > 2 {\n            result.reserveCapacity(wordsNeeded)\n        }\n        while bitsLeft >= Word.bitWidth {\n            result[i] = generator.next()\n            i += 1\n            bitsLeft -= Word.bitWidth\n        }\n        if bitsLeft > 0 {\n            let mask: Word = (1 << bitsLeft) - 1\n            result[i] = (generator.next() as Word) & mask\n        }\n        return result\n    }\n\n    /// Create a big unsigned integer consisting of `width` uniformly distributed random bits.\n    ///\n    /// - Note: I use a `SystemRandomGeneratorGenerator` as the source of randomness.\n    ///\n    /// - Parameter width: The maximum number of one bits in the result.\n    /// - Returns: A big unsigned integer less than `1 << width`.\n    public static func randomInteger(withMaximumWidth width: Int) -> CS.BigUInt {\n        var rng = SystemRandomNumberGenerator()\n        return randomInteger(withMaximumWidth: width, using: &rng)\n    }\n\n    /// Create a big unsigned integer consisting of `width-1` uniformly distributed random bits followed by a one bit.\n    ///\n    /// - Note: If `width` is zero, the result is zero.\n    ///\n    /// - Parameter width: The number of bits required to represent the answer.\n    /// - Parameter generator: The source of randomness.\n    /// - Returns: A random big unsigned integer whose width is `width`.\n    public static func randomInteger<RNG: RandomNumberGenerator>(withExactWidth width: Int, using generator: inout RNG) -> CS.BigUInt {\n        // width == 0 -> return 0 because there is no room for a one bit.\n        // width == 1 -> return 1 because there is no room for any random bits.\n        guard width > 1 else { return CS.BigUInt(width) }\n        var result = randomInteger(withMaximumWidth: width - 1, using: &generator)\n        result[(width - 1) / Word.bitWidth] |= 1 << Word((width - 1) % Word.bitWidth)\n        return result\n    }\n\n    /// Create a big unsigned integer consisting of `width-1` uniformly distributed random bits followed by a one bit.\n    ///\n    /// - Note: If `width` is zero, the result is zero.\n    /// - Note: I use a `SystemRandomGeneratorGenerator` as the source of randomness.\n    ///\n    /// - Returns: A random big unsigned integer whose width is `width`.\n    public static func randomInteger(withExactWidth width: Int) -> CS.BigUInt {\n        var rng = SystemRandomNumberGenerator()\n        return randomInteger(withExactWidth: width, using: &rng)\n    }\n\n    /// Create a uniformly distributed random unsigned integer that's less than the specified limit.\n    ///\n    /// - Precondition: `limit > 0`.\n    ///\n    /// - Parameter limit: The upper bound on the result.\n    /// - Parameter generator: The source of randomness.\n    /// - Returns: A random big unsigned integer that is less than `limit`.\n    public static func randomInteger<RNG: RandomNumberGenerator>(lessThan limit: CS.BigUInt, using generator: inout RNG) -> CS.BigUInt {\n        precondition(limit > 0, \"\\(#function): 0 is not a valid limit\")\n        let width = limit.bitWidth\n        var random = randomInteger(withMaximumWidth: width, using: &generator)\n        while random >= limit {\n            random = randomInteger(withMaximumWidth: width, using: &generator)\n        }\n        return random\n    }\n\n    /// Create a uniformly distributed random unsigned integer that's less than the specified limit.\n    ///\n    /// - Precondition: `limit > 0`.\n    /// - Note: I use a `SystemRandomGeneratorGenerator` as the source of randomness.\n    ///\n    /// - Parameter limit: The upper bound on the result.\n    /// - Returns: A random big unsigned integer that is less than `limit`.\n    public static func randomInteger(lessThan limit: CS.BigUInt) -> CS.BigUInt {\n        var rng = SystemRandomNumberGenerator()\n        return randomInteger(lessThan: limit, using: &rng)\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Shifts.swift",
    "content": "//\n//  Shifts.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n\n    //MARK: Shift Operators\n    \n    internal func shiftedLeft(by amount: Word) -> CS.BigUInt {\n        guard amount > 0 else { return self }\n        \n        let ext = Int(amount / Word(Word.bitWidth)) // External shift amount (new words)\n        let up = Word(amount % Word(Word.bitWidth)) // Internal shift amount (subword shift)\n        let down = Word(Word.bitWidth) - up\n        \n        var result = CS.BigUInt()\n        if up > 0 {\n            var i = 0\n            var lowbits: Word = 0\n            while i < self.count || lowbits > 0 {\n                let word = self[i]\n                result[i + ext] = word << up | lowbits\n                lowbits = word >> down\n                i += 1\n            }\n        }\n        else {\n            for i in 0 ..< self.count {\n                result[i + ext] = self[i]\n            }\n        }\n        return result\n    }\n    \n    internal mutating func shiftLeft(by amount: Word) {\n        guard amount > 0 else { return }\n        \n        let ext = Int(amount / Word(Word.bitWidth)) // External shift amount (new words)\n        let up = Word(amount % Word(Word.bitWidth)) // Internal shift amount (subword shift)\n        let down = Word(Word.bitWidth) - up\n        \n        if up > 0 {\n            var i = 0\n            var lowbits: Word = 0\n            while i < self.count || lowbits > 0 {\n                let word = self[i]\n                self[i] = word << up | lowbits\n                lowbits = word >> down\n                i += 1\n            }\n        }\n        if ext > 0 && self.count > 0 {\n            self.shiftLeft(byWords: ext)\n        }\n    }\n    \n    internal func shiftedRight(by amount: Word) -> CS.BigUInt {\n        guard amount > 0 else { return self }\n        guard amount < self.bitWidth else { return 0 }\n        \n        let ext = Int(amount / Word(Word.bitWidth)) // External shift amount (new words)\n        let down = Word(amount % Word(Word.bitWidth)) // Internal shift amount (subword shift)\n        let up = Word(Word.bitWidth) - down\n        \n        var result = CS.BigUInt()\n        if down > 0 {\n            var highbits: Word = 0\n            for i in (ext ..< self.count).reversed() {\n                let word = self[i]\n                result[i - ext] = highbits | word >> down\n                highbits = word << up\n            }\n        }\n        else {\n            for i in (ext ..< self.count).reversed() {\n                result[i - ext] = self[i]\n            }\n        }\n        return result\n    }\n\n    internal mutating func shiftRight(by amount: Word) {\n        guard amount > 0 else { return }\n        guard amount < self.bitWidth else { self.clear(); return }\n        \n        let ext = Int(amount / Word(Word.bitWidth)) // External shift amount (new words)\n        let down = Word(amount % Word(Word.bitWidth)) // Internal shift amount (subword shift)\n        let up = Word(Word.bitWidth) - down\n        \n        if ext > 0 {\n            self.shiftRight(byWords: ext)\n        }\n        if down > 0 {\n            var i = self.count - 1\n            var highbits: Word = 0\n            while i >= 0 {\n                let word = self[i]\n                self[i] = highbits | word >> down\n                highbits = word << up\n                i -= 1\n            }\n        }\n    }\n    \n    public static func >>=<Other: BinaryInteger>(lhs: inout CS.BigUInt, rhs: Other) {\n        if rhs < (0 as Other) {\n            lhs <<= (0 - rhs)\n        }\n        else if rhs >= lhs.bitWidth {\n            lhs.clear()\n        }\n        else {\n            lhs.shiftRight(by: UInt(rhs))\n        }\n    }\n    \n    public static func <<=<Other: BinaryInteger>(lhs: inout CS.BigUInt, rhs: Other) {\n        if rhs < (0 as Other) {\n            lhs >>= (0 - rhs)\n            return\n        }\n        lhs.shiftLeft(by: Word(exactly: rhs)!)\n    }\n\n    public static func >><Other: BinaryInteger>(lhs: CS.BigUInt, rhs: Other) -> CS.BigUInt {\n        if rhs < (0 as Other) {\n            return lhs << (0 - rhs)\n        }\n        if rhs > Word.max {\n            return 0\n        }\n        return lhs.shiftedRight(by: UInt(rhs))\n    }\n\n    public static func <<<Other: BinaryInteger>(lhs: CS.BigUInt, rhs: Other) -> CS.BigUInt {\n        if rhs < (0 as Other) {\n            return lhs >> (0 - rhs)\n        }\n        return lhs.shiftedLeft(by: Word(exactly: rhs)!)\n    }\n}\n\nextension CS.BigInt {\n    func shiftedLeft(by amount: Word) -> CS.BigInt {\n        return CS.BigInt(sign: self.sign, magnitude: self.magnitude.shiftedLeft(by: amount))\n    }\n    \n    mutating func shiftLeft(by amount: Word) {\n        self.magnitude.shiftLeft(by: amount)\n    }\n    \n    func shiftedRight(by amount: Word) -> CS.BigInt {\n        let m = self.magnitude.shiftedRight(by: amount)\n        return CS.BigInt(sign: self.sign, magnitude: self.sign == .minus && m.isZero ? 1 : m)\n    }\n    \n    mutating func shiftRight(by amount: Word) {\n        magnitude.shiftRight(by: amount)\n        if sign == .minus, magnitude.isZero {\n            magnitude.load(1)\n        }\n    }\n    \n    public static func &<<(left: CS.BigInt, right: CS.BigInt) -> CS.BigInt {\n        return left.shiftedLeft(by: right.words[0])\n    }\n    \n    public static func &<<=(left: inout CS.BigInt, right: CS.BigInt) {\n        left.shiftLeft(by: right.words[0])\n    }\n    \n    public static func &>>(left: CS.BigInt, right: CS.BigInt) -> CS.BigInt {\n        return left.shiftedRight(by: right.words[0])\n    }\n    \n    public static func &>>=(left: inout CS.BigInt, right: CS.BigInt) {\n        left.shiftRight(by: right.words[0])\n    }\n    \n    public static func <<<Other: BinaryInteger>(lhs: CS.BigInt, rhs: Other) -> CS.BigInt {\n        guard rhs >= (0 as Other) else { return lhs >> (0 - rhs) }\n        return lhs.shiftedLeft(by: Word(rhs))\n    }\n    \n    public static func <<=<Other: BinaryInteger>(lhs: inout CS.BigInt, rhs: Other) {\n        if rhs < (0 as Other) {\n            lhs >>= (0 - rhs)\n        }\n        else {\n            lhs.shiftLeft(by: Word(rhs))\n        }\n    }\n    \n    public static func >><Other: BinaryInteger>(lhs: CS.BigInt, rhs: Other) -> CS.BigInt {\n        guard rhs >= (0 as Other) else { return lhs << (0 - rhs) }\n        return lhs.shiftedRight(by: Word(rhs))\n    }\n    \n    public static func >>=<Other: BinaryInteger>(lhs: inout CS.BigInt, rhs: Other) {\n        if rhs < (0 as Other) {\n            lhs <<= (0 - rhs)\n        }\n        else {\n            lhs.shiftRight(by: Word(rhs))\n        }\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/SquareRoot.swift",
    "content": "//\n//  SquareRoot.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\n//MARK: Square Root\n\nextension CS.BigUInt {\n    /// Returns the integer square root of a big integer; i.e., the largest integer whose square isn't greater than `value`.\n    ///\n    /// - Returns: floor(sqrt(self))\n    public func squareRoot() -> CS.BigUInt {\n        // This implementation uses Newton's method.\n        guard !self.isZero else { return CS.BigUInt() }\n        var x = CS.BigUInt(1) << ((self.bitWidth + 1) / 2)\n        var y: CS.BigUInt = 0\n        while true {\n            y.load(self)\n            y /= x\n            y += x\n            y >>= 1\n            if x == y || x == y - 1 { break }\n            x = y\n        }\n        return x\n    }\n}\n\nextension CS.BigInt {\n    /// Returns the integer square root of a big integer; i.e., the largest integer whose square isn't greater than `value`.\n    ///\n    /// - Requires: self >= 0\n    /// - Returns: floor(sqrt(self))\n    public func squareRoot() -> CS.BigInt {\n        precondition(self.sign == .plus)\n        return CS.BigInt(sign: .plus, magnitude: self.magnitude.squareRoot())\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Strideable.swift",
    "content": "//\n//  Strideable.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2017-08-11.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt: Strideable {\n    /// A type that can represent the distance between two values ofa `BigUInt`.\n    public typealias Stride = CS.BigInt\n\n    /// Adds `n` to `self` and returns the result. Traps if the result would be less than zero.\n    public func advanced(by n: CS.BigInt) -> CS.BigUInt {\n        return n.sign == .minus ? self - n.magnitude : self + n.magnitude\n    }\n\n    /// Returns the (potentially negative) difference between `self` and `other` as a `BigInt`. Never traps.\n    public func distance(to other: CS.BigUInt) -> CS.BigInt {\n        return CS.BigInt(other) - CS.BigInt(self)\n    }\n}\n\nextension CS.BigInt: Strideable {\n    public typealias Stride = CS.BigInt\n\n    /// Returns `self + n`.\n    public func advanced(by n: Stride) -> CS.BigInt {\n        return self + n\n    }\n\n    /// Returns `other - self`.\n    public func distance(to other: CS.BigInt) -> Stride {\n        return other - self\n    }\n}\n\n\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/StringConversion.swift",
    "content": "//\n//  StringConversion.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n\n    //MARK: String Conversion\n\n    /// Calculates the number of numerals in a given radix that fit inside a single `Word`.\n    ///\n    /// - Returns: (chars, power) where `chars` is highest that satisfy `radix^chars <= 2^Word.bitWidth`. `power` is zero\n    ///   if radix is a power of two; otherwise `power == radix^chars`.\n    fileprivate static func charsPerWord(forRadix radix: Int) -> (chars: Int, power: Word) {\n        var power: Word = 1\n        var overflow = false\n        var count = 0\n        while !overflow {\n            let (high,low) = power.multipliedFullWidth(by: Word(radix))\n            if high > 0 {\n              overflow = true\n            }\n\n            if !overflow || (high == 1 && low == 0) {\n                count += 1\n                power = low\n            }\n        }\n        return (count, power)\n    }\n\n    /// Initialize a big integer from an ASCII representation in a given radix. Numerals above `9` are represented by\n    /// letters from the English alphabet.\n    ///\n    /// - Requires: `radix > 1 && radix < 36`\n    /// - Parameter `text`: A string consisting of characters corresponding to numerals in the given radix. (0-9, a-z, A-Z)\n    /// - Parameter `radix`: The base of the number system to use, or 10 if unspecified.\n    /// - Returns: The integer represented by `text`, or nil if `text` contains a character that does not represent a numeral in `radix`.\n    public init?<S: StringProtocol>(_ text: S, radix: Int = 10) {\n        precondition(radix > 1 && radix < 36)\n        guard !text.isEmpty else { return nil }\n        let (charsPerWord, power) = CS.BigUInt.charsPerWord(forRadix: radix)\n\n        var words: [Word] = []\n        var end = text.endIndex\n        var start = end\n        var count = 0\n        while start != text.startIndex {\n            start = text.index(before: start)\n            count += 1\n            if count == charsPerWord {\n                guard let d = Word.init(text[start ..< end], radix: radix) else { return nil }\n                words.append(d)\n                end = start\n                count = 0\n            }\n        }\n        if start != end {\n            guard let d = Word.init(text[start ..< end], radix: radix) else { return nil }\n            words.append(d)\n        }\n\n        if power == 0 {\n            self.init(words: words)\n        }\n        else {\n            self.init()\n            for d in words.reversed() {\n                self.multiply(byWord: power)\n                self.addWord(d)\n            }\n        }\n    }\n}\n\nextension CS.BigInt {\n    /// Initialize a big integer from an ASCII representation in a given radix. Numerals above `9` are represented by\n    /// letters from the English alphabet.\n    ///\n    /// - Requires: `radix > 1 && radix < 36`\n    /// - Parameter `text`: A string optionally starting with \"-\" or \"+\" followed by characters corresponding to numerals in the given radix. (0-9, a-z, A-Z)\n    /// - Parameter `radix`: The base of the number system to use, or 10 if unspecified.\n    /// - Returns: The integer represented by `text`, or nil if `text` contains a character that does not represent a numeral in `radix`.\n    public init?<S: StringProtocol>(_ text: S, radix: Int = 10) {\n        var magnitude: CS.BigUInt?\n        var sign: Sign = .plus\n        if text.first == \"-\" {\n            sign = .minus\n            let text = text.dropFirst()\n            magnitude = CS.BigUInt(text, radix: radix)\n        }\n        else if text.first == \"+\" {\n            let text = text.dropFirst()\n            magnitude = CS.BigUInt(text, radix: radix)\n        }\n        else {\n            magnitude = CS.BigUInt(text, radix: radix)\n        }\n        guard let m = magnitude else { return nil }\n        self.magnitude = m\n        self.sign = m.isZero ? .plus : sign\n    }\n}\n\nextension String {\n    /// Initialize a new string with the base-10 representation of an unsigned big integer.\n    ///\n    /// - Complexity: O(v.count^2)\n    public init(_ v: CS.BigUInt) { self.init(v, radix: 10, uppercase: false) }\n\n    /// Initialize a new string representing an unsigned big integer in the given radix (base).\n    ///\n    /// Numerals greater than 9 are represented as letters from the English alphabet,\n    /// starting with `a` if `uppercase` is false or `A` otherwise.\n    ///\n    /// - Requires: radix > 1 && radix <= 36\n    /// - Complexity: O(count) when radix is a power of two; otherwise O(count^2).\n    public init(_ v: CS.BigUInt, radix: Int, uppercase: Bool = false) {\n        precondition(radix > 1)\n        let (charsPerWord, power) = CS.BigUInt.charsPerWord(forRadix: radix)\n\n        guard !v.isZero else { self = \"0\"; return }\n\n        var parts: [String]\n        if power == 0 {\n            parts = v.words.map { String($0, radix: radix, uppercase: uppercase) }\n        }\n        else {\n            parts = []\n            var rest = v\n            while !rest.isZero {\n                let mod = rest.divide(byWord: power)\n                parts.append(String(mod, radix: radix, uppercase: uppercase))\n            }\n        }\n        assert(!parts.isEmpty)\n\n        self = \"\"\n        var first = true\n        for part in parts.reversed() {\n            let zeroes = charsPerWord - part.count\n            assert(zeroes >= 0)\n            if !first && zeroes > 0 {\n                // Insert leading zeroes for mid-Words\n                self += String(repeating: \"0\", count: zeroes)\n            }\n            first = false\n            self += part\n        }\n    }\n\n    /// Initialize a new string representing a signed big integer in the given radix (base).\n    ///\n    /// Numerals greater than 9 are represented as letters from the English alphabet,\n    /// starting with `a` if `uppercase` is false or `A` otherwise.\n    ///\n    /// - Requires: radix > 1 && radix <= 36\n    /// - Complexity: O(count) when radix is a power of two; otherwise O(count^2).\n    public init(_ value: CS.BigInt, radix: Int = 10, uppercase: Bool = false) {\n        self = String(value.magnitude, radix: radix, uppercase: uppercase)\n        if value.sign == .minus {\n            self = \"-\" + self\n        }\n    }\n}\n\nextension CS.BigUInt: ExpressibleByStringLiteral {\n    /// Initialize a new big integer from a Unicode scalar.\n    /// The scalar must represent a decimal digit.\n    public init(unicodeScalarLiteral value: UnicodeScalar) {\n        self = CS.BigUInt(String(value), radix: 10)!\n    }\n\n    /// Initialize a new big integer from an extended grapheme cluster.\n    /// The cluster must consist of a decimal digit.\n    public init(extendedGraphemeClusterLiteral value: String) {\n        self = CS.BigUInt(value, radix: 10)!\n    }\n\n    /// Initialize a new big integer from a decimal number represented by a string literal of arbitrary length.\n    /// The string must contain only decimal digits.\n    public init(stringLiteral value: StringLiteralType) {\n        self = CS.BigUInt(value, radix: 10)!\n    }\n}\n\nextension CS.BigInt: ExpressibleByStringLiteral {\n    /// Initialize a new big integer from a Unicode scalar.\n    /// The scalar must represent a decimal digit.\n    public init(unicodeScalarLiteral value: UnicodeScalar) {\n        self = CS.BigInt(String(value), radix: 10)!\n    }\n\n    /// Initialize a new big integer from an extended grapheme cluster.\n    /// The cluster must consist of a decimal digit.\n    public init(extendedGraphemeClusterLiteral value: String) {\n        self = CS.BigInt(value, radix: 10)!\n    }\n\n    /// Initialize a new big integer from a decimal number represented by a string literal of arbitrary length.\n    /// The string must contain only decimal digits.\n    public init(stringLiteral value: StringLiteralType) {\n        self = CS.BigInt(value, radix: 10)!\n    }\n}\n\nextension CS.BigUInt: CustomStringConvertible {\n    /// Return the decimal representation of this integer.\n    public var description: String {\n        return String(self, radix: 10)\n    }\n}\n\nextension CS.BigInt: CustomStringConvertible {\n    /// Return the decimal representation of this integer.\n    public var description: String {\n        return String(self, radix: 10)\n    }\n}\n\nextension CS.BigUInt: CustomPlaygroundDisplayConvertible {\n\n    /// Return the playground quick look representation of this integer.\n    public var playgroundDescription: Any {\n        let text = String(self)\n        return text + \" (\\(self.bitWidth) bits)\"\n    }\n}\n\nextension CS.BigInt: CustomPlaygroundDisplayConvertible {\n\n    /// Return the playground quick look representation of this integer.\n    public var playgroundDescription: Any {\n        let text = String(self)\n        return text + \" (\\(self.magnitude.bitWidth) bits)\"\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/Subtraction.swift",
    "content": "//\n//  Subtraction.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2016-01-03.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension CS.BigUInt {\n    //MARK: Subtraction\n\n    /// Subtract `word` from this integer in place, returning a flag indicating if the operation\n    /// caused an arithmetic overflow. `word` is shifted `shift` words to the left before being subtracted.\n    ///\n    /// - Note: If the result indicates an overflow, then `self` becomes the two's complement of the absolute difference.\n    /// - Complexity: O(count)\n    internal mutating func subtractWordReportingOverflow(_ word: Word, shiftedBy shift: Int = 0) -> Bool {\n        precondition(shift >= 0)\n        var carry: Word = word\n        var i = shift\n        let count = self.count\n        while carry > 0 && i < count {\n            let (d, c) = self[i].subtractingReportingOverflow(carry)\n            self[i] = d\n            carry = (c ? 1 : 0)\n            i += 1\n        }\n        return carry > 0\n    }\n\n    /// Subtract `word` from this integer, returning the difference and a flag that is true if the operation\n    /// caused an arithmetic overflow. `word` is shifted `shift` words to the left before being subtracted.\n    ///\n    /// - Note: If `overflow` is true, then the returned value is the two's complement of the absolute difference.\n    /// - Complexity: O(count)\n    internal func subtractingWordReportingOverflow(_ word: Word, shiftedBy shift: Int = 0) -> (partialValue: CS.BigUInt, overflow: Bool) {\n        var result = self\n        let overflow = result.subtractWordReportingOverflow(word, shiftedBy: shift)\n        return (result, overflow)\n    }\n\n    /// Subtract a digit `d` from this integer in place.\n    /// `d` is shifted `shift` digits to the left before being subtracted.\n    ///\n    /// - Requires: self >= d * 2^shift\n    /// - Complexity: O(count)\n    internal mutating func subtractWord(_ word: Word, shiftedBy shift: Int = 0) {\n        let overflow = subtractWordReportingOverflow(word, shiftedBy: shift)\n        precondition(!overflow)\n    }\n\n    /// Subtract a digit `d` from this integer and return the result.\n    /// `d` is shifted `shift` digits to the left before being subtracted.\n    ///\n    /// - Requires: self >= d * 2^shift\n    /// - Complexity: O(count)\n    internal func subtractingWord(_ word: Word, shiftedBy shift: Int = 0) -> CS.BigUInt {\n        var result = self\n        result.subtractWord(word, shiftedBy: shift)\n        return result\n    }\n\n    /// Subtract `other` from this integer in place, and return a flag indicating if the operation caused an\n    /// arithmetic overflow. `other` is shifted `shift` digits to the left before being subtracted.\n    ///\n    /// - Note: If the result indicates an overflow, then `self` becomes the twos' complement of the absolute difference.\n    /// - Complexity: O(count)\n    public mutating func subtractReportingOverflow(_ b: CS.BigUInt, shiftedBy shift: Int = 0) -> Bool {\n        precondition(shift >= 0)\n        var carry = false\n        var bi = 0\n        let bc = b.count\n        let count = self.count\n        while bi < bc || (shift + bi < count && carry) {\n            let ai = shift + bi\n            let (d, c) = self[ai].subtractingReportingOverflow(b[bi])\n            if carry {\n                let (d2, c2) = d.subtractingReportingOverflow(1)\n                self[ai] = d2\n                carry = c || c2\n            }\n            else {\n                self[ai] = d\n                carry = c\n            }\n            bi += 1\n        }\n        return carry\n    }\n\n    /// Subtract `other` from this integer, returning the difference and a flag indicating arithmetic overflow.\n    /// `other` is shifted `shift` digits to the left before being subtracted.\n    ///\n    /// - Note: If `overflow` is true, then the result value is the twos' complement of the absolute value of the difference.\n    /// - Complexity: O(count)\n    public func subtractingReportingOverflow(_ other: CS.BigUInt, shiftedBy shift: Int) -> (partialValue: CS.BigUInt, overflow: Bool) {\n        var result = self\n        let overflow = result.subtractReportingOverflow(other, shiftedBy: shift)\n        return (result, overflow)\n    }\n    \n    /// Subtracts `other` from `self`, returning the result and a flag indicating arithmetic overflow.\n    ///\n    /// - Note: When the operation overflows, then `partialValue` is the twos' complement of the absolute value of the difference.\n    /// - Complexity: O(count)\n    public func subtractingReportingOverflow(_ other: CS.BigUInt) -> (partialValue: CS.BigUInt, overflow: Bool) {\n        return self.subtractingReportingOverflow(other, shiftedBy: 0)\n    }\n    \n    /// Subtract `other` from this integer in place.\n    /// `other` is shifted `shift` digits to the left before being subtracted.\n    ///\n    /// - Requires: self >= other * 2^shift\n    /// - Complexity: O(count)\n    public mutating func subtract(_ other: CS.BigUInt, shiftedBy shift: Int = 0) {\n        let overflow = subtractReportingOverflow(other, shiftedBy: shift)\n        precondition(!overflow)\n    }\n\n    /// Subtract `b` from this integer, and return the difference.\n    /// `b` is shifted `shift` digits to the left before being subtracted.\n    ///\n    /// - Requires: self >= b * 2^shift\n    /// - Complexity: O(count)\n    public func subtracting(_ other: CS.BigUInt, shiftedBy shift: Int = 0) -> CS.BigUInt {\n        var result = self\n        result.subtract(other, shiftedBy: shift)\n        return result\n    }\n\n    /// Decrement this integer by one.\n    ///\n    /// - Requires: !isZero\n    /// - Complexity: O(count)\n    public mutating func decrement(shiftedBy shift: Int = 0) {\n        self.subtract(1, shiftedBy: shift)\n    }\n\n    /// Subtract `b` from `a` and return the result.\n    ///\n    /// - Requires: a >= b\n    /// - Complexity: O(a.count)\n    public static func -(a: CS.BigUInt, b: CS.BigUInt) -> CS.BigUInt {\n        return a.subtracting(b)\n    }\n\n    /// Subtract `b` from `a` and store the result in `a`.\n    ///\n    /// - Requires: a >= b\n    /// - Complexity: O(a.count)\n    public static func -=(a: inout CS.BigUInt, b: CS.BigUInt) {\n        a.subtract(b)\n    }\n}\n\nextension CS.BigInt {\n    public mutating func negate() {\n        guard !magnitude.isZero else { return }\n        self.sign = self.sign == .plus ? .minus : .plus\n    }\n\n    /// Subtract `b` from `a` and return the result.\n    public static func -(a: CS.BigInt, b: CS.BigInt) -> CS.BigInt {\n        return a + -b\n    }\n\n    /// Subtract `b` from `a` in place.\n    public static func -=(a: inout CS.BigInt, b: CS.BigInt) { a = a - b }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CS_BigInt/WordsAndBits.swift",
    "content": "//\n//  WordsAndBits.swift\n//  CS.BigInt\n//\n//  Created by Károly Lőrentey on 2017-08-11.\n//  Copyright © 2016-2017 Károly Lőrentey.\n//\n\nextension Array where Element == UInt {\n    mutating func twosComplement() {\n        var increment = true\n        for i in 0 ..< self.count {\n            if increment {\n                (self[i], increment) = (~self[i]).addingReportingOverflow(1)\n            }\n            else {\n                self[i] = ~self[i]\n            }\n        }\n    }\n}\n\nextension CS.BigUInt {\n    public subscript(bitAt index: Int) -> Bool {\n        get {\n            precondition(index >= 0)\n            let (i, j) = index.quotientAndRemainder(dividingBy: Word.bitWidth)\n            return self[i] & (1 << j) != 0\n        }\n        set {\n            precondition(index >= 0)\n            let (i, j) = index.quotientAndRemainder(dividingBy: Word.bitWidth)\n            if newValue {\n                self[i] |= 1 << j\n            }\n            else {\n                self[i] &= ~(1 << j)\n            }\n        }\n    }\n}\n\nextension CS.BigUInt {\n    /// The minimum number of bits required to represent this integer in binary.\n    ///\n    /// - Returns: floor(log2(2 * self + 1))\n    /// - Complexity: O(1)\n    public var bitWidth: Int {\n        guard count > 0 else { return 0 }\n        return count * Word.bitWidth - self[count - 1].leadingZeroBitCount\n    }\n\n    /// The number of leading zero bits in the binary representation of this integer in base `2^(Word.bitWidth)`.\n    /// This is useful when you need to normalize a `BigUInt` such that the top bit of its most significant word is 1.\n    ///\n    /// - Note: 0 is considered to have zero leading zero bits.\n    /// - Returns: A value in `0...(Word.bitWidth - 1)`.\n    /// - SeeAlso: width\n    /// - Complexity: O(1)\n    public var leadingZeroBitCount: Int {\n        guard count > 0 else { return 0 }\n        return self[count - 1].leadingZeroBitCount\n    }\n\n    /// The number of trailing zero bits in the binary representation of this integer.\n    ///\n    /// - Note: 0 is considered to have zero trailing zero bits.\n    /// - Returns: A value in `0...width`.\n    /// - Complexity: O(count)\n    public var trailingZeroBitCount: Int {\n        guard count > 0 else { return 0 }\n        let i = self.words.firstIndex { $0 != 0 }!\n        return i * Word.bitWidth + self[i].trailingZeroBitCount\n    }\n}\n\nextension CS.BigInt {\n    public var bitWidth: Int {\n        guard !magnitude.isZero else { return 0 }\n        return magnitude.bitWidth + 1\n    }\n\n    public var trailingZeroBitCount: Int {\n        // Amazingly, this works fine for negative numbers\n        return magnitude.trailingZeroBitCount\n    }\n}\n\nextension CS.BigUInt {\n    public struct Words: RandomAccessCollection {\n        private let value: CS.BigUInt\n\n        fileprivate init(_ value: CS.BigUInt) { self.value = value }\n\n        public var startIndex: Int { return 0 }\n        public var endIndex: Int { return value.count }\n\n        public subscript(_ index: Int) -> Word {\n            return value[index]\n        }\n    }\n\n    public var words: Words { return Words(self) }\n\n    public init<Words: Sequence>(words: Words) where Words.Element == Word {\n        let uc = words.underestimatedCount\n        if uc > 2 {\n            self.init(words: Array(words))\n        }\n        else {\n            var it = words.makeIterator()\n            guard let w0 = it.next() else {\n                self.init()\n                return\n            }\n            guard let w1 = it.next() else {\n                self.init(word: w0)\n                return\n            }\n            if let w2 = it.next() {\n                var words: [UInt] = []\n                words.reserveCapacity(Swift.max(3, uc))\n                words.append(w0)\n                words.append(w1)\n                words.append(w2)\n                while let word = it.next() {\n                    words.append(word)\n                }\n                self.init(words: words)\n            }\n            else {\n                self.init(low: w0, high: w1)\n            }\n        }\n    }\n}\n\nextension CS.BigInt {\n    public struct Words: RandomAccessCollection {\n        public typealias Indices = CountableRange<Int>\n\n        private let value: CS.BigInt\n        private let decrementLimit: Int\n\n        fileprivate init(_ value: CS.BigInt) {\n            self.value = value\n            switch value.sign {\n            case .plus:\n                self.decrementLimit = 0\n            case .minus:\n                assert(!value.magnitude.isZero)\n                self.decrementLimit = value.magnitude.words.firstIndex(where: { $0 != 0 })!\n            }\n        }\n\n        public var count: Int {\n            switch value.sign {\n            case .plus:\n                if let high = value.magnitude.words.last, high >> (Word.bitWidth - 1) != 0 {\n                    return value.magnitude.count + 1\n                }\n                return value.magnitude.count\n            case .minus:\n                let high = value.magnitude.words.last!\n                if high >> (Word.bitWidth - 1) != 0 {\n                    return value.magnitude.count + 1\n                }\n                return value.magnitude.count\n            }\n        }\n\n        public var indices: Indices { return 0 ..< count }\n        public var startIndex: Int { return 0 }\n        public var endIndex: Int { return count }\n\n        public subscript(_ index: Int) -> UInt {\n            // Note that indices above `endIndex` are accepted.\n            if value.sign == .plus {\n                return value.magnitude[index]\n            }\n            if index <= decrementLimit {\n                return ~(value.magnitude[index] &- 1)\n            }\n            return ~value.magnitude[index]\n        }\n    }\n\n    public var words: Words {\n        return Words(self)\n    }\n\n    public init<S: Sequence>(words: S) where S.Element == Word {\n        var words = Array(words)\n        if (words.last ?? 0) >> (Word.bitWidth - 1) == 0 {\n            self.init(sign: .plus, magnitude: CS.BigUInt(words: words))\n        }\n        else {\n            words.twosComplement()\n            self.init(sign: .minus, magnitude: CS.BigUInt(words: words))\n        }\n    }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/ChaCha20.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  https://tools.ietf.org/html/rfc7539\n//\n\npublic final class ChaCha20: BlockCipher {\n  public enum Error: Swift.Error {\n    case invalidKeyOrInitializationVector\n    case notSupported\n  }\n\n  public static let blockSize = 64 // 512 / 8\n  public let keySize: Int\n\n  fileprivate let key: Key\n  fileprivate var counter: Array<UInt8>\n\n  public convenience init(key: Array<UInt8>, iv nonce: Array<UInt8>) throws {\n    try self.init(key: key, iv: nonce, blockCounter: 0)\n  }\n\n  init(key: Array<UInt8>, iv nonce: Array<UInt8>, blockCounter: UInt32 = 0) throws {\n    precondition(nonce.count == 12 || nonce.count == 8)\n\n    if key.count != 32 {\n      throw Error.invalidKeyOrInitializationVector\n    }\n\n    self.key = Key(bytes: key)\n    self.keySize = self.key.count\n\n    if nonce.count == 8 {\n      self.counter = blockCounter.bigEndian.bytes() + [0, 0, 0, 0] + nonce\n    } else {\n      self.counter = blockCounter.bigEndian.bytes() + nonce\n    }\n\n    assert(self.counter.count == 16)\n  }\n\n  /// https://tools.ietf.org/html/rfc7539#section-2.3.\n  fileprivate func core(block: inout Array<UInt8>, counter: Array<UInt8>, key: Array<UInt8>) {\n    precondition(block.count == ChaCha20.blockSize)\n    precondition(counter.count == 16)\n    precondition(key.count == 32)\n\n    let j0: UInt32 = 0x61707865\n    let j1: UInt32 = 0x3320646e // 0x3620646e sigma/tau\n    let j2: UInt32 = 0x79622d32\n    let j3: UInt32 = 0x6b206574\n    let j4: UInt32 = UInt32(bytes: key[0..<4]).bigEndian\n    let j5: UInt32 = UInt32(bytes: key[4..<8]).bigEndian\n    let j6: UInt32 = UInt32(bytes: key[8..<12]).bigEndian\n    let j7: UInt32 = UInt32(bytes: key[12..<16]).bigEndian\n    let j8: UInt32 = UInt32(bytes: key[16..<20]).bigEndian\n    let j9: UInt32 = UInt32(bytes: key[20..<24]).bigEndian\n    let j10: UInt32 = UInt32(bytes: key[24..<28]).bigEndian\n    let j11: UInt32 = UInt32(bytes: key[28..<32]).bigEndian\n    let j12: UInt32 = UInt32(bytes: counter[0..<4]).bigEndian\n    let j13: UInt32 = UInt32(bytes: counter[4..<8]).bigEndian\n    let j14: UInt32 = UInt32(bytes: counter[8..<12]).bigEndian\n    let j15: UInt32 = UInt32(bytes: counter[12..<16]).bigEndian\n\n    var (x0, x1, x2, x3, x4, x5, x6, x7) = (j0, j1, j2, j3, j4, j5, j6, j7)\n    var (x8, x9, x10, x11, x12, x13, x14, x15) = (j8, j9, j10, j11, j12, j13, j14, j15)\n\n    for _ in 0..<10 { // 20 rounds\n      x0 = x0 &+ x4\n      x12 ^= x0\n      x12 = (x12 << 16) | (x12 >> 16)\n      x8 = x8 &+ x12\n      x4 ^= x8\n      x4 = (x4 << 12) | (x4 >> 20)\n      x0 = x0 &+ x4\n      x12 ^= x0\n      x12 = (x12 << 8) | (x12 >> 24)\n      x8 = x8 &+ x12\n      x4 ^= x8\n      x4 = (x4 << 7) | (x4 >> 25)\n      x1 = x1 &+ x5\n      x13 ^= x1\n      x13 = (x13 << 16) | (x13 >> 16)\n      x9 = x9 &+ x13\n      x5 ^= x9\n      x5 = (x5 << 12) | (x5 >> 20)\n      x1 = x1 &+ x5\n      x13 ^= x1\n      x13 = (x13 << 8) | (x13 >> 24)\n      x9 = x9 &+ x13\n      x5 ^= x9\n      x5 = (x5 << 7) | (x5 >> 25)\n      x2 = x2 &+ x6\n      x14 ^= x2\n      x14 = (x14 << 16) | (x14 >> 16)\n      x10 = x10 &+ x14\n      x6 ^= x10\n      x6 = (x6 << 12) | (x6 >> 20)\n      x2 = x2 &+ x6\n      x14 ^= x2\n      x14 = (x14 << 8) | (x14 >> 24)\n      x10 = x10 &+ x14\n      x6 ^= x10\n      x6 = (x6 << 7) | (x6 >> 25)\n      x3 = x3 &+ x7\n      x15 ^= x3\n      x15 = (x15 << 16) | (x15 >> 16)\n      x11 = x11 &+ x15\n      x7 ^= x11\n      x7 = (x7 << 12) | (x7 >> 20)\n      x3 = x3 &+ x7\n      x15 ^= x3\n      x15 = (x15 << 8) | (x15 >> 24)\n      x11 = x11 &+ x15\n      x7 ^= x11\n      x7 = (x7 << 7) | (x7 >> 25)\n      x0 = x0 &+ x5\n      x15 ^= x0\n      x15 = (x15 << 16) | (x15 >> 16)\n      x10 = x10 &+ x15\n      x5 ^= x10\n      x5 = (x5 << 12) | (x5 >> 20)\n      x0 = x0 &+ x5\n      x15 ^= x0\n      x15 = (x15 << 8) | (x15 >> 24)\n      x10 = x10 &+ x15\n      x5 ^= x10\n      x5 = (x5 << 7) | (x5 >> 25)\n      x1 = x1 &+ x6\n      x12 ^= x1\n      x12 = (x12 << 16) | (x12 >> 16)\n      x11 = x11 &+ x12\n      x6 ^= x11\n      x6 = (x6 << 12) | (x6 >> 20)\n      x1 = x1 &+ x6\n      x12 ^= x1\n      x12 = (x12 << 8) | (x12 >> 24)\n      x11 = x11 &+ x12\n      x6 ^= x11\n      x6 = (x6 << 7) | (x6 >> 25)\n      x2 = x2 &+ x7\n      x13 ^= x2\n      x13 = (x13 << 16) | (x13 >> 16)\n      x8 = x8 &+ x13\n      x7 ^= x8\n      x7 = (x7 << 12) | (x7 >> 20)\n      x2 = x2 &+ x7\n      x13 ^= x2\n      x13 = (x13 << 8) | (x13 >> 24)\n      x8 = x8 &+ x13\n      x7 ^= x8\n      x7 = (x7 << 7) | (x7 >> 25)\n      x3 = x3 &+ x4\n      x14 ^= x3\n      x14 = (x14 << 16) | (x14 >> 16)\n      x9 = x9 &+ x14\n      x4 ^= x9\n      x4 = (x4 << 12) | (x4 >> 20)\n      x3 = x3 &+ x4\n      x14 ^= x3\n      x14 = (x14 << 8) | (x14 >> 24)\n      x9 = x9 &+ x14\n      x4 ^= x9\n      x4 = (x4 << 7) | (x4 >> 25)\n    }\n\n    x0 = x0 &+ j0\n    x1 = x1 &+ j1\n    x2 = x2 &+ j2\n    x3 = x3 &+ j3\n    x4 = x4 &+ j4\n    x5 = x5 &+ j5\n    x6 = x6 &+ j6\n    x7 = x7 &+ j7\n    x8 = x8 &+ j8\n    x9 = x9 &+ j9\n    x10 = x10 &+ j10\n    x11 = x11 &+ j11\n    x12 = x12 &+ j12\n    x13 = x13 &+ j13\n    x14 = x14 &+ j14\n    x15 = x15 &+ j15\n\n    block.replaceSubrange(0..<4, with: x0.bigEndian.bytes())\n    block.replaceSubrange(4..<8, with: x1.bigEndian.bytes())\n    block.replaceSubrange(8..<12, with: x2.bigEndian.bytes())\n    block.replaceSubrange(12..<16, with: x3.bigEndian.bytes())\n    block.replaceSubrange(16..<20, with: x4.bigEndian.bytes())\n    block.replaceSubrange(20..<24, with: x5.bigEndian.bytes())\n    block.replaceSubrange(24..<28, with: x6.bigEndian.bytes())\n    block.replaceSubrange(28..<32, with: x7.bigEndian.bytes())\n    block.replaceSubrange(32..<36, with: x8.bigEndian.bytes())\n    block.replaceSubrange(36..<40, with: x9.bigEndian.bytes())\n    block.replaceSubrange(40..<44, with: x10.bigEndian.bytes())\n    block.replaceSubrange(44..<48, with: x11.bigEndian.bytes())\n    block.replaceSubrange(48..<52, with: x12.bigEndian.bytes())\n    block.replaceSubrange(52..<56, with: x13.bigEndian.bytes())\n    block.replaceSubrange(56..<60, with: x14.bigEndian.bytes())\n    block.replaceSubrange(60..<64, with: x15.bigEndian.bytes())\n  }\n\n  // XORKeyStream\n  func process(bytes: ArraySlice<UInt8>, counter: inout Array<UInt8>, key: Array<UInt8>) -> Array<UInt8> {\n    precondition(counter.count == 16)\n    precondition(key.count == 32)\n\n    var block = Array<UInt8>(repeating: 0, count: ChaCha20.blockSize)\n    var bytesSlice = bytes\n    var out = Array<UInt8>(reserveCapacity: bytesSlice.count)\n\n    while bytesSlice.count >= ChaCha20.blockSize {\n      self.core(block: &block, counter: counter, key: key)\n      for (i, x) in block.enumerated() {\n        out.append(bytesSlice[bytesSlice.startIndex + i] ^ x)\n      }\n      var u: UInt32 = 1\n      for i in 0..<4 {\n        u += UInt32(counter[i])\n        counter[i] = UInt8(u & 0xff)\n        u >>= 8\n      }\n      bytesSlice = bytesSlice[bytesSlice.startIndex + ChaCha20.blockSize..<bytesSlice.endIndex]\n    }\n\n    if !bytesSlice.isEmpty {\n      self.core(block: &block, counter: counter, key: key)\n      for (i, v) in bytesSlice.enumerated() {\n        out.append(v ^ block[i])\n      }\n    }\n    return out\n  }\n}\n\n// MARK: Cipher\n\nextension ChaCha20: Cipher {\n  public func encrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    self.process(bytes: bytes, counter: &self.counter, key: Array(self.key))\n  }\n\n  public func decrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    try self.encrypt(bytes)\n  }\n}\n\n// MARK: Encryptor\n\nextension ChaCha20 {\n  public struct ChaChaEncryptor: Cryptor, Updatable {\n    private var accumulated = Array<UInt8>()\n    private let chacha: ChaCha20\n\n    init(chacha: ChaCha20) {\n      self.chacha = chacha\n    }\n\n    public mutating func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = false) throws -> Array<UInt8> {\n      self.accumulated += bytes\n\n      var encrypted = Array<UInt8>()\n      encrypted.reserveCapacity(self.accumulated.count)\n      for chunk in self.accumulated.batched(by: ChaCha20.blockSize) {\n        if isLast || self.accumulated.count >= ChaCha20.blockSize {\n          encrypted += try self.chacha.encrypt(chunk)\n          self.accumulated.removeFirst(chunk.count) // TODO: improve performance\n        }\n      }\n      return encrypted\n    }\n\n    public func seek(to: Int) throws {\n      throw Error.notSupported\n    }\n  }\n}\n\n// MARK: Decryptor\n\nextension ChaCha20 {\n  public struct ChaChaDecryptor: Cryptor, Updatable {\n    private var accumulated = Array<UInt8>()\n\n    private var offset: Int = 0\n    private var offsetToRemove: Int = 0\n    private let chacha: ChaCha20\n\n    init(chacha: ChaCha20) {\n      self.chacha = chacha\n    }\n\n    public mutating func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = true) throws -> Array<UInt8> {\n      // prepend \"offset\" number of bytes at the beginning\n      if self.offset > 0 {\n        self.accumulated += Array<UInt8>(repeating: 0, count: self.offset) + bytes\n        self.offsetToRemove = self.offset\n        self.offset = 0\n      } else {\n        self.accumulated += bytes\n      }\n\n      var plaintext = Array<UInt8>()\n      plaintext.reserveCapacity(self.accumulated.count)\n      for chunk in self.accumulated.batched(by: ChaCha20.blockSize) {\n        if isLast || self.accumulated.count >= ChaCha20.blockSize {\n          plaintext += try self.chacha.decrypt(chunk)\n\n          // remove \"offset\" from the beginning of first chunk\n          if self.offsetToRemove > 0 {\n            plaintext.removeFirst(self.offsetToRemove) // TODO: improve performance\n            self.offsetToRemove = 0\n          }\n\n          self.accumulated.removeFirst(chunk.count)\n        }\n      }\n\n      return plaintext\n    }\n\n    public func seek(to: Int) throws {\n      throw Error.notSupported\n    }\n  }\n}\n\n// MARK: Cryptors\n\nextension ChaCha20: Cryptors {\n  //TODO: Use BlockEncryptor/BlockDecryptor\n\n  public func makeEncryptor() -> Cryptor & Updatable {\n    ChaCha20.ChaChaEncryptor(chacha: self)\n  }\n\n  public func makeDecryptor() -> Cryptor & Updatable {\n    ChaCha20.ChaChaDecryptor(chacha: self)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Checksum.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/// CRC - cyclic redundancy check code.\npublic final class Checksum {\n\n  @usableFromInline\n  static let table32: Array<UInt32> = [\n    0x0000_0000, 0x7707_3096, 0xEE0E_612C, 0x9909_51BA, 0x076D_C419, 0x706A_F48F, 0xE963_A535, 0x9E64_95A3,\n    0x0EDB_8832, 0x79DC_B8A4, 0xE0D5_E91E, 0x97D2_D988, 0x09B6_4C2B, 0x7EB1_7CBD, 0xE7B8_2D07, 0x90BF_1D91,\n    0x1DB7_1064, 0x6AB0_20F2, 0xF3B9_7148, 0x84BE_41DE, 0x1ADA_D47D, 0x6DDD_E4EB, 0xF4D4_B551, 0x83D3_85C7,\n    0x136C_9856, 0x646B_A8C0, 0xFD62_F97A, 0x8A65_C9EC, 0x1401_5C4F, 0x6306_6CD9, 0xFA0F_3D63, 0x8D08_0DF5,\n    0x3B6E_20C8, 0x4C69_105E, 0xD560_41E4, 0xA267_7172, 0x3C03_E4D1, 0x4B04_D447, 0xD20D_85FD, 0xA50A_B56B,\n    0x35B5_A8FA, 0x42B2_986C, 0xDBBB_C9D6, 0xACBC_F940, 0x32D8_6CE3, 0x45DF_5C75, 0xDCD6_0DCF, 0xABD1_3D59,\n    0x26D9_30AC, 0x51DE_003A, 0xC8D7_5180, 0xBFD0_6116, 0x21B4_F4B5, 0x56B3_C423, 0xCFBA_9599, 0xB8BD_A50F,\n    0x2802_B89E, 0x5F05_8808, 0xC60C_D9B2, 0xB10B_E924, 0x2F6F_7C87, 0x5868_4C11, 0xC161_1DAB, 0xB666_2D3D,\n    0x76DC_4190, 0x01DB_7106, 0x98D2_20BC, 0xEFD5_102A, 0x71B1_8589, 0x06B6_B51F, 0x9FBF_E4A5, 0xE8B8_D433,\n    0x7807_C9A2, 0x0F00_F934, 0x9609_A88E, 0xE10E_9818, 0x7F6A_0DBB, 0x086D_3D2D, 0x9164_6C97, 0xE663_5C01,\n    0x6B6B_51F4, 0x1C6C_6162, 0x8565_30D8, 0xF262_004E, 0x6C06_95ED, 0x1B01_A57B, 0x8208_F4C1, 0xF50F_C457,\n    0x65B0_D9C6, 0x12B7_E950, 0x8BBE_B8EA, 0xFCB9_887C, 0x62DD_1DDF, 0x15DA_2D49, 0x8CD3_7CF3, 0xFBD4_4C65,\n    0x4DB2_6158, 0x3AB5_51CE, 0xA3BC_0074, 0xD4BB_30E2, 0x4ADF_A541, 0x3DD8_95D7, 0xA4D1_C46D, 0xD3D6_F4FB,\n    0x4369_E96A, 0x346E_D9FC, 0xAD67_8846, 0xDA60_B8D0, 0x4404_2D73, 0x3303_1DE5, 0xAA0A_4C5F, 0xDD0D_7CC9,\n    0x5005_713C, 0x2702_41AA, 0xBE0B_1010, 0xC90C_2086, 0x5768_B525, 0x206F_85B3, 0xB966_D409, 0xCE61_E49F,\n    0x5EDE_F90E, 0x29D9_C998, 0xB0D0_9822, 0xC7D7_A8B4, 0x59B3_3D17, 0x2EB4_0D81, 0xB7BD_5C3B, 0xC0BA_6CAD,\n    0xEDB8_8320, 0x9ABF_B3B6, 0x03B6_E20C, 0x74B1_D29A, 0xEAD5_4739, 0x9DD2_77AF, 0x04DB_2615, 0x73DC_1683,\n    0xE363_0B12, 0x9464_3B84, 0x0D6D_6A3E, 0x7A6A_5AA8, 0xE40E_CF0B, 0x9309_FF9D, 0x0A00_AE27, 0x7D07_9EB1,\n    0xF00F_9344, 0x8708_A3D2, 0x1E01_F268, 0x6906_C2FE, 0xF762_575D, 0x8065_67CB, 0x196C_3671, 0x6E6B_06E7,\n    0xFED4_1B76, 0x89D3_2BE0, 0x10DA_7A5A, 0x67DD_4ACC, 0xF9B9_DF6F, 0x8EBE_EFF9, 0x17B7_BE43, 0x60B0_8ED5,\n    0xD6D6_A3E8, 0xA1D1_937E, 0x38D8_C2C4, 0x4FDF_F252, 0xD1BB_67F1, 0xA6BC_5767, 0x3FB5_06DD, 0x48B2_364B,\n    0xD80D_2BDA, 0xAF0A_1B4C, 0x3603_4AF6, 0x4104_7A60, 0xDF60_EFC3, 0xA867_DF55, 0x316E_8EEF, 0x4669_BE79,\n    0xCB61_B38C, 0xBC66_831A, 0x256F_D2A0, 0x5268_E236, 0xCC0C_7795, 0xBB0B_4703, 0x2202_16B9, 0x5505_262F,\n    0xC5BA_3BBE, 0xB2BD_0B28, 0x2BB4_5A92, 0x5CB3_6A04, 0xC2D7_FFA7, 0xB5D0_CF31, 0x2CD9_9E8B, 0x5BDE_AE1D,\n    0x9B64_C2B0, 0xEC63_F226, 0x756A_A39C, 0x026D_930A, 0x9C09_06A9, 0xEB0E_363F, 0x7207_6785, 0x0500_5713,\n    0x95BF_4A82, 0xE2B8_7A14, 0x7BB1_2BAE, 0x0CB6_1B38, 0x92D2_8E9B, 0xE5D5_BE0D, 0x7CDC_EFB7, 0x0BDB_DF21,\n    0x86D3_D2D4, 0xF1D4_E242, 0x68DD_B3F8, 0x1FDA_836E, 0x81BE_16CD, 0xF6B9_265B, 0x6FB0_77E1, 0x18B7_4777,\n    0x8808_5AE6, 0xFF0F_6A70, 0x6606_3BCA, 0x1101_0B5C, 0x8F65_9EFF, 0xF862_AE69, 0x616B_FFD3, 0x166C_CF45,\n    0xA00A_E278, 0xD70D_D2EE, 0x4E04_8354, 0x3903_B3C2, 0xA767_2661, 0xD060_16F7, 0x4969_474D, 0x3E6E_77DB,\n    0xAED1_6A4A, 0xD9D6_5ADC, 0x40DF_0B66, 0x37D8_3BF0, 0xA9BC_AE53, 0xDEBB_9EC5, 0x47B2_CF7F, 0x30B5_FFE9,\n    0xBDBD_F21C, 0xCABA_C28A, 0x53B3_9330, 0x24B4_A3A6, 0xBAD0_3605, 0xCDD7_0693, 0x54DE_5729, 0x23D9_67BF,\n    0xB366_7A2E, 0xC461_4AB8, 0x5D68_1B02, 0x2A6F_2B94, 0xB40B_BE37, 0xC30C_8EA1, 0x5A05_DF1B, 0x2D02_EF8D\n  ]\n\n  @usableFromInline\n  static let table32c: Array<UInt32> = [\n    0x0000_0000, 0xF26B_8303, 0xE13B_70F7, 0x1350_F3F4, 0xC79A_971F, 0x35F1_141C, 0x26A1_E7E8, 0xD4CA_64EB,\n    0x8AD9_58CF, 0x78B2_DBCC, 0x6BE2_2838, 0x9989_AB3B, 0x4D43_CFD0, 0xBF28_4CD3, 0xAC78_BF27, 0x5E13_3C24,\n    0x105E_C76F, 0xE235_446C, 0xF165_B798, 0x030E_349B, 0xD7C4_5070, 0x25AF_D373, 0x36FF_2087, 0xC494_A384,\n    0x9A87_9FA0, 0x68EC_1CA3, 0x7BBC_EF57, 0x89D7_6C54, 0x5D1D_08BF, 0xAF76_8BBC, 0xBC26_7848, 0x4E4D_FB4B,\n    0x20BD_8EDE, 0xD2D6_0DDD, 0xC186_FE29, 0x33ED_7D2A, 0xE727_19C1, 0x154C_9AC2, 0x061C_6936, 0xF477_EA35,\n    0xAA64_D611, 0x580F_5512, 0x4B5F_A6E6, 0xB934_25E5, 0x6DFE_410E, 0x9F95_C20D, 0x8CC5_31F9, 0x7EAE_B2FA,\n    0x30E3_49B1, 0xC288_CAB2, 0xD1D8_3946, 0x23B3_BA45, 0xF779_DEAE, 0x0512_5DAD, 0x1642_AE59, 0xE429_2D5A,\n    0xBA3A_117E, 0x4851_927D, 0x5B01_6189, 0xA96A_E28A, 0x7DA0_8661, 0x8FCB_0562, 0x9C9B_F696, 0x6EF0_7595,\n    0x417B_1DBC, 0xB310_9EBF, 0xA040_6D4B, 0x522B_EE48, 0x86E1_8AA3, 0x748A_09A0, 0x67DA_FA54, 0x95B1_7957,\n    0xCBA2_4573, 0x39C9_C670, 0x2A99_3584, 0xD8F2_B687, 0x0C38_D26C, 0xFE53_516F, 0xED03_A29B, 0x1F68_2198,\n    0x5125_DAD3, 0xA34E_59D0, 0xB01E_AA24, 0x4275_2927, 0x96BF_4DCC, 0x64D4_CECF, 0x7784_3D3B, 0x85EF_BE38,\n    0xDBFC_821C, 0x2997_011F, 0x3AC7_F2EB, 0xC8AC_71E8, 0x1C66_1503, 0xEE0D_9600, 0xFD5D_65F4, 0x0F36_E6F7,\n    0x61C6_9362, 0x93AD_1061, 0x80FD_E395, 0x7296_6096, 0xA65C_047D, 0x5437_877E, 0x4767_748A, 0xB50C_F789,\n    0xEB1F_CBAD, 0x1974_48AE, 0x0A24_BB5A, 0xF84F_3859, 0x2C85_5CB2, 0xDEEE_DFB1, 0xCDBE_2C45, 0x3FD5_AF46,\n    0x7198_540D, 0x83F3_D70E, 0x90A3_24FA, 0x62C8_A7F9, 0xB602_C312, 0x4469_4011, 0x5739_B3E5, 0xA552_30E6,\n    0xFB41_0CC2, 0x092A_8FC1, 0x1A7A_7C35, 0xE811_FF36, 0x3CDB_9BDD, 0xCEB0_18DE, 0xDDE0_EB2A, 0x2F8B_6829,\n    0x82F6_3B78, 0x709D_B87B, 0x63CD_4B8F, 0x91A6_C88C, 0x456C_AC67, 0xB707_2F64, 0xA457_DC90, 0x563C_5F93,\n    0x082F_63B7, 0xFA44_E0B4, 0xE914_1340, 0x1B7F_9043, 0xCFB5_F4A8, 0x3DDE_77AB, 0x2E8E_845F, 0xDCE5_075C,\n    0x92A8_FC17, 0x60C3_7F14, 0x7393_8CE0, 0x81F8_0FE3, 0x5532_6B08, 0xA759_E80B, 0xB409_1BFF, 0x4662_98FC,\n    0x1871_A4D8, 0xEA1A_27DB, 0xF94A_D42F, 0x0B21_572C, 0xDFEB_33C7, 0x2D80_B0C4, 0x3ED0_4330, 0xCCBB_C033,\n    0xA24B_B5A6, 0x5020_36A5, 0x4370_C551, 0xB11B_4652, 0x65D1_22B9, 0x97BA_A1BA, 0x84EA_524E, 0x7681_D14D,\n    0x2892_ED69, 0xDAF9_6E6A, 0xC9A9_9D9E, 0x3BC2_1E9D, 0xEF08_7A76, 0x1D63_F975, 0x0E33_0A81, 0xFC58_8982,\n    0xB215_72C9, 0x407E_F1CA, 0x532E_023E, 0xA145_813D, 0x758F_E5D6, 0x87E4_66D5, 0x94B4_9521, 0x66DF_1622,\n    0x38CC_2A06, 0xCAA7_A905, 0xD9F7_5AF1, 0x2B9C_D9F2, 0xFF56_BD19, 0x0D3D_3E1A, 0x1E6D_CDEE, 0xEC06_4EED,\n    0xC38D_26C4, 0x31E6_A5C7, 0x22B6_5633, 0xD0DD_D530, 0x0417_B1DB, 0xF67C_32D8, 0xE52C_C12C, 0x1747_422F,\n    0x4954_7E0B, 0xBB3F_FD08, 0xA86F_0EFC, 0x5A04_8DFF, 0x8ECE_E914, 0x7CA5_6A17, 0x6FF5_99E3, 0x9D9E_1AE0,\n    0xD3D3_E1AB, 0x21B8_62A8, 0x32E8_915C, 0xC083_125F, 0x1449_76B4, 0xE622_F5B7, 0xF572_0643, 0x0719_8540,\n    0x590A_B964, 0xAB61_3A67, 0xB831_C993, 0x4A5A_4A90, 0x9E90_2E7B, 0x6CFB_AD78, 0x7FAB_5E8C, 0x8DC0_DD8F,\n    0xE330_A81A, 0x115B_2B19, 0x020B_D8ED, 0xF060_5BEE, 0x24AA_3F05, 0xD6C1_BC06, 0xC591_4FF2, 0x37FA_CCF1,\n    0x69E9_F0D5, 0x9B82_73D6, 0x88D2_8022, 0x7AB9_0321, 0xAE73_67CA, 0x5C18_E4C9, 0x4F48_173D, 0xBD23_943E,\n    0xF36E_6F75, 0x0105_EC76, 0x1255_1F82, 0xE03E_9C81, 0x34F4_F86A, 0xC69F_7B69, 0xD5CF_889D, 0x27A4_0B9E,\n    0x79B7_37BA, 0x8BDC_B4B9, 0x988C_474D, 0x6AE7_C44E, 0xBE2D_A0A5, 0x4C46_23A6, 0x5F16_D052, 0xAD7D_5351\n  ]\n\n  @usableFromInline\n  static let table16: Array<UInt16> = [\n    0x0000, 0xC0C1, 0xC181, 0x0140, 0xC301, 0x03C0, 0x0280, 0xC241,\n    0xC601, 0x06C0, 0x0780, 0xC741, 0x0500, 0xC5C1, 0xC481, 0x0440,\n    0xCC01, 0x0CC0, 0x0D80, 0xCD41, 0x0F00, 0xCFC1, 0xCE81, 0x0E40,\n    0x0A00, 0xCAC1, 0xCB81, 0x0B40, 0xC901, 0x09C0, 0x0880, 0xC841,\n    0xD801, 0x18C0, 0x1980, 0xD941, 0x1B00, 0xDBC1, 0xDA81, 0x1A40,\n    0x1E00, 0xDEC1, 0xDF81, 0x1F40, 0xDD01, 0x1DC0, 0x1C80, 0xDC41,\n    0x1400, 0xD4C1, 0xD581, 0x1540, 0xD701, 0x17C0, 0x1680, 0xD641,\n    0xD201, 0x12C0, 0x1380, 0xD341, 0x1100, 0xD1C1, 0xD081, 0x1040,\n    0xF001, 0x30C0, 0x3180, 0xF141, 0x3300, 0xF3C1, 0xF281, 0x3240,\n    0x3600, 0xF6C1, 0xF781, 0x3740, 0xF501, 0x35C0, 0x3480, 0xF441,\n    0x3C00, 0xFCC1, 0xFD81, 0x3D40, 0xFF01, 0x3FC0, 0x3E80, 0xFE41,\n    0xFA01, 0x3AC0, 0x3B80, 0xFB41, 0x3900, 0xF9C1, 0xF881, 0x3840,\n    0x2800, 0xE8C1, 0xE981, 0x2940, 0xEB01, 0x2BC0, 0x2A80, 0xEA41,\n    0xEE01, 0x2EC0, 0x2F80, 0xEF41, 0x2D00, 0xEDC1, 0xEC81, 0x2C40,\n    0xE401, 0x24C0, 0x2580, 0xE541, 0x2700, 0xE7C1, 0xE681, 0x2640,\n    0x2200, 0xE2C1, 0xE381, 0x2340, 0xE101, 0x21C0, 0x2080, 0xE041,\n    0xA001, 0x60C0, 0x6180, 0xA141, 0x6300, 0xA3C1, 0xA281, 0x6240,\n    0x6600, 0xA6C1, 0xA781, 0x6740, 0xA501, 0x65C0, 0x6480, 0xA441,\n    0x6C00, 0xACC1, 0xAD81, 0x6D40, 0xAF01, 0x6FC0, 0x6E80, 0xAE41,\n    0xAA01, 0x6AC0, 0x6B80, 0xAB41, 0x6900, 0xA9C1, 0xA881, 0x6840,\n    0x7800, 0xB8C1, 0xB981, 0x7940, 0xBB01, 0x7BC0, 0x7A80, 0xBA41,\n    0xBE01, 0x7EC0, 0x7F80, 0xBF41, 0x7D00, 0xBDC1, 0xBC81, 0x7C40,\n    0xB401, 0x74C0, 0x7580, 0xB541, 0x7700, 0xB7C1, 0xB681, 0x7640,\n    0x7200, 0xB2C1, 0xB381, 0x7340, 0xB101, 0x71C0, 0x7080, 0xB041,\n    0x5000, 0x90C1, 0x9181, 0x5140, 0x9301, 0x53C0, 0x5280, 0x9241,\n    0x9601, 0x56C0, 0x5780, 0x9741, 0x5500, 0x95C1, 0x9481, 0x5440,\n    0x9C01, 0x5CC0, 0x5D80, 0x9D41, 0x5F00, 0x9FC1, 0x9E81, 0x5E40,\n    0x5A00, 0x9AC1, 0x9B81, 0x5B40, 0x9901, 0x59C0, 0x5880, 0x9841,\n    0x8801, 0x48C0, 0x4980, 0x8941, 0x4B00, 0x8BC1, 0x8A81, 0x4A40,\n    0x4E00, 0x8EC1, 0x8F81, 0x4F40, 0x8D01, 0x4DC0, 0x4C80, 0x8C41,\n    0x4400, 0x84C1, 0x8581, 0x4540, 0x8701, 0x47C0, 0x4680, 0x8641,\n    0x8201, 0x42C0, 0x4380, 0x8341, 0x4100, 0x81C1, 0x8081, 0x4040\n  ]\n\n  @usableFromInline\n  init() {\n    //\n  }\n\n  /// Polynomial: 0xEDB88320 (Reversed) - IEEE\n  @inlinable\n  func crc32(_ message: Array<UInt8>, seed: UInt32? = nil, reflect: Bool = true) -> UInt32 {\n    var crc: UInt32 = seed != nil ? seed! : 0xFFFF_FFFF\n    for chunk in message.batched(by: 256) {\n      for b in chunk {\n        let idx = Int((crc ^ UInt32(reflect ? b : reversed(b))) & 0xFF)\n        crc = (crc >> 8) ^ Checksum.table32[idx]\n      }\n    }\n    return (reflect ? crc : reversed(crc)) ^ 0xFFFF_FFFF\n  }\n\n  /// Polynomial: 0x82F63B78 (Reversed) - Castagnoli\n  @inlinable\n  func crc32c(_ message: Array<UInt8>, seed: UInt32? = nil, reflect: Bool = true) -> UInt32 {\n    var crc: UInt32 = seed != nil ? seed! : 0xFFFF_FFFF\n    for chunk in message.batched(by: 256) {\n      for b in chunk {\n        let idx = Int((crc ^ UInt32(reflect ? b : reversed(b))) & 0xFF)\n        crc = (crc >> 8) ^ Checksum.table32c[idx]\n      }\n    }\n    return (reflect ? crc : reversed(crc)) ^ 0xFFFF_FFFF\n  }\n\n  /// Polynomial: 0xA001 (Reversed) - IBM\n  @inlinable\n  func crc16(_ message: Array<UInt8>, seed: UInt16? = nil) -> UInt16 {\n    var crc: UInt16 = seed != nil ? seed! : 0x0000\n    for chunk in message.batched(by: 256) {\n      for b in chunk {\n        crc = (crc >> 8) ^ Checksum.table16[Int((crc ^ UInt16(b)) & 0xFF)]\n      }\n    }\n    return crc\n  }\n}\n\n// MARK: Public interface\n\npublic extension Checksum {\n  /// Calculate CRC32.\n  ///\n  /// - parameter message: Message\n  /// - parameter seed:    Seed value (Optional)\n  /// - parameter reflect: is reflect (default true)\n  ///\n  /// - returns: Calculated code\n  @inlinable\n  static func crc32(_ message: Array<UInt8>, seed: UInt32? = nil, reflect: Bool = true) -> UInt32 {\n    Checksum().crc32(message, seed: seed, reflect: reflect)\n  }\n\n  /// Calculate CRC32C\n  ///\n  /// - parameter message: Message\n  /// - parameter seed:    Seed value (Optional)\n  /// - parameter reflect: is reflect (default true)\n  ///\n  /// - returns: Calculated code\n  @inlinable\n  static func crc32c(_ message: Array<UInt8>, seed: UInt32? = nil, reflect: Bool = true) -> UInt32 {\n    Checksum().crc32c(message, seed: seed, reflect: reflect)\n  }\n\n  /// Calculate CRC16\n  ///\n  /// - parameter message: Message\n  /// - parameter seed:    Seed value (Optional)\n  ///\n  /// - returns: Calculated code\n  @inlinable\n  static func crc16(_ message: Array<UInt8>, seed: UInt16? = nil) -> UInt16 {\n    Checksum().crc16(message, seed: seed)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Cipher.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic enum CipherError: Error {\n  case encrypt\n  case decrypt\n}\n\npublic protocol Cipher: AnyObject {\n  var keySize: Int { get }\n\n  /// Encrypt given bytes at once\n  ///\n  /// - parameter bytes: Plaintext data\n  /// - returns: Encrypted data\n  func encrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8>\n  func encrypt(_ bytes: Array<UInt8>) throws -> Array<UInt8>\n\n  /// Decrypt given bytes at once\n  ///\n  /// - parameter bytes: Ciphertext data\n  /// - returns: Plaintext data\n  func decrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8>\n  func decrypt(_ bytes: Array<UInt8>) throws -> Array<UInt8>\n}\n\nextension Cipher {\n  public func encrypt(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    try self.encrypt(bytes.slice)\n  }\n\n  public func decrypt(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    try self.decrypt(bytes.slice)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Collection+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\nextension Collection where Self.Element == UInt8, Self.Index == Int {\n  // Big endian order\n  @inlinable\n  func toUInt32Array() -> Array<UInt32> {\n    guard !isEmpty else {\n      return []\n    }\n\n    let c = strideCount(from: startIndex, to: endIndex, by: 4)\n    return Array<UInt32>(unsafeUninitializedCapacity: c) { buf, count in\n      var counter = 0\n      for idx in stride(from: startIndex, to: endIndex, by: 4) {\n        let val = UInt32(bytes: self, fromIndex: idx).bigEndian\n        buf[counter] = val\n        counter += 1\n      }\n      count = counter\n      assert(counter == c)\n    }\n  }\n\n  // Big endian order\n  @inlinable\n  func toUInt64Array() -> Array<UInt64> {\n    guard !isEmpty else {\n      return []\n    }\n\n    let c = strideCount(from: startIndex, to: endIndex, by: 8)\n    return Array<UInt64>(unsafeUninitializedCapacity: c) { buf, count in\n      var counter = 0\n      for idx in stride(from: startIndex, to: endIndex, by: 8) {\n        let val = UInt64(bytes: self, fromIndex: idx).bigEndian\n        buf[counter] = val\n        counter += 1\n      }\n      count = counter\n      assert(counter == c)\n    }\n  }\n}\n\n@usableFromInline\nfunc strideCount(from: Int, to: Int, by: Int) -> Int {\n    let count = to - from\n    return count / by + (count % by > 0 ? 1 : 0)\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/CompactMap.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n#if swift(>=4.1)\n// TODO: remove this file when Xcode 9.2 is no longer used\n#else\n  extension Sequence {\n    @inlinable\n    public func compactMap<ElementOfResult>(_ transform: (Element) throws -> ElementOfResult?) rethrows -> [ElementOfResult] {\n      try flatMap(transform)\n    }\n  }\n#endif\n"
  },
  {
    "path": "Sources/CryptoSwift/Cryptor.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/// Cryptor (Encryptor or Decryptor)\npublic protocol Cryptor {\n  /// Seek to position in file, if block mode allows random access.\n  ///\n  /// - parameter to: new value of counter\n  mutating func seek(to: Int) throws\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Cryptors.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(ucrt)\nimport ucrt\n#endif\n\n/// Worker cryptor/decryptor of `Updatable` types\npublic protocol Cryptors: AnyObject {\n\n  /// Cryptor suitable for encryption\n  func makeEncryptor() throws -> Cryptor & Updatable\n\n  /// Cryptor suitable for decryption\n  func makeDecryptor() throws -> Cryptor & Updatable\n\n  /// Generate array of random bytes. Helper function.\n  static func randomIV(_ blockSize: Int) -> Array<UInt8>\n}\n\nextension Cryptors {\n  /// Generate array of random values.\n  /// Convenience helper that uses `Swift.RandomNumberGenerator`.\n  /// - Parameter count: Length of array\n  public static func randomIV(_ count: Int) -> Array<UInt8> {\n    (0..<count).map({ _ in UInt8.random(in: 0...UInt8.max) })\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Digest.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n@available(*, renamed: \"Digest\")\npublic typealias Hash = Digest\n\n/// Hash functions to calculate Digest.\npublic struct Digest {\n  /// Calculate MD5 Digest\n  /// - parameter bytes: input message\n  /// - returns: Digest bytes\n  public static func md5(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    MD5().calculate(for: bytes)\n  }\n\n  /// Calculate SHA1 Digest\n  /// - parameter bytes: input message\n  /// - returns: Digest bytes\n  public static func sha1(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    SHA1().calculate(for: bytes)\n  }\n\n  /// Calculate SHA2-224 Digest\n  /// - parameter bytes: input message\n  /// - returns: Digest bytes\n  public static func sha224(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    self.sha2(bytes, variant: .sha224)\n  }\n\n  /// Calculate SHA2-256 Digest\n  /// - parameter bytes: input message\n  /// - returns: Digest bytes\n  public static func sha256(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    self.sha2(bytes, variant: .sha256)\n  }\n\n  /// Calculate SHA2-384 Digest\n  /// - parameter bytes: input message\n  /// - returns: Digest bytes\n  public static func sha384(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    self.sha2(bytes, variant: .sha384)\n  }\n\n  /// Calculate SHA2-512 Digest\n  /// - parameter bytes: input message\n  /// - returns: Digest bytes\n  public static func sha512(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    self.sha2(bytes, variant: .sha512)\n  }\n\n  /// Calculate SHA2 Digest\n  /// - parameter bytes: input message\n  /// - parameter variant: SHA-2 variant\n  /// - returns: Digest bytes\n  public static func sha2(_ bytes: Array<UInt8>, variant: SHA2.Variant) -> Array<UInt8> {\n    SHA2(variant: variant).calculate(for: bytes)\n  }\n\n  /// Calculate SHA3 Digest\n  /// - parameter bytes: input message\n  /// - parameter variant: SHA-3 variant\n  /// - returns: Digest bytes\n  public static func sha3(_ bytes: Array<UInt8>, variant: SHA3.Variant) -> Array<UInt8> {\n    SHA3(variant: variant).calculate(for: bytes)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/DigestType.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\ninternal protocol DigestType {\n  func calculate(for bytes: Array<UInt8>) -> Array<UInt8>\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/AES+Foundation.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nextension AES {\n  /// Initialize with CBC block mode.\n  ///\n  /// - Parameters:\n  ///   - key: Key as a String.\n  ///   - iv: IV as a String.\n  ///   - padding: Padding\n  /// - Throws: Error\n  ///\n  /// The input is a String, that is treat as sequence of bytes made directly out of String.\n  /// If input is Base64 encoded data (which is a String technically) it is not decoded automatically for you.\n  public convenience init(key: String, iv: String, padding: Padding = .pkcs7) throws {\n    try self.init(key: key.bytes, blockMode: CBC(iv: iv.bytes), padding: padding)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/Array+Foundation.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\npublic extension Array where Element == UInt8 {\n  func toBase64(options: Data.Base64EncodingOptions = []) -> String {\n    Data(self).base64EncodedString(options: options)\n  }\n\n  init(base64: String, options: Data.Base64DecodingOptions = .ignoreUnknownCharacters) {\n    self.init()\n\n    guard let decodedData = Data(base64Encoded: base64, options: options) else {\n      return\n    }\n\n    append(contentsOf: decodedData.byteArray)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/Blowfish+Foundation.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nextension Blowfish {\n  /// Initialize with CBC block mode.\n  public convenience init(key: String, iv: String, padding: Padding = .pkcs7) throws {\n    try self.init(key: key.bytes, blockMode: CBC(iv: iv.bytes), padding: padding)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/ChaCha20+Foundation.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nextension ChaCha20 {\n  public convenience init(key: String, iv: String) throws {\n    try self.init(key: key.bytes, iv: iv.bytes)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/Data+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nextension Data {\n  /// Two octet checksum as defined in RFC-4880. Sum of all octets, mod 65536\n  public func checksum() -> UInt16 {\n    let s = self.withUnsafeBytes { buf in\n        return buf.lazy.map(UInt32.init).reduce(UInt32(0), +)\n    }\n    return UInt16(s % 65535)\n  }\n\n  public func md5() -> Data {\n    Data( Digest.md5(byteArray))\n  }\n\n  public func sha1() -> Data {\n    Data( Digest.sha1(byteArray))\n  }\n\n  public func sha224() -> Data {\n    Data( Digest.sha224(byteArray))\n  }\n\n  public func sha256() -> Data {\n    Data( Digest.sha256(byteArray))\n  }\n\n  public func sha384() -> Data {\n    Data( Digest.sha384(byteArray))\n  }\n\n  public func sha512() -> Data {\n    Data( Digest.sha512(byteArray))\n  }\n\n  public func sha3(_ variant: SHA3.Variant) -> Data {\n    Data( Digest.sha3(byteArray, variant: variant))\n  }\n\n  public func crc32(seed: UInt32? = nil, reflect: Bool = true) -> Data {\n    Data( Checksum.crc32(byteArray, seed: seed, reflect: reflect).bytes())\n  }\n\n  public func crc32c(seed: UInt32? = nil, reflect: Bool = true) -> Data {\n    Data( Checksum.crc32c(byteArray, seed: seed, reflect: reflect).bytes())\n  }\n\n  public func crc16(seed: UInt16? = nil) -> Data {\n    Data( Checksum.crc16(byteArray, seed: seed).bytes())\n  }\n\n  public func encrypt(cipher: Cipher) throws -> Data {\n    Data( try cipher.encrypt(byteArray.slice))\n  }\n\n  public func decrypt(cipher: Cipher) throws -> Data {\n    Data( try cipher.decrypt(byteArray.slice))\n  }\n\n  public func authenticate(with authenticator: Authenticator) throws -> Data {\n    Data( try authenticator.authenticate(byteArray))\n  }\n}\n\nextension Data {\n  public init(hex: String) {\n    self.init(Array<UInt8>(hex: hex))\n  }\n\n  public var byteArray: Array<UInt8> {\n    Array(self)\n  }\n\n  public func toHexString() -> String {\n    self.byteArray.toHexString()\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/HMAC+Foundation.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nextension HMAC {\n  public convenience init(key: String, variant: HMAC.Variant = .md5) throws {\n    self.init(key: key.bytes, variant: variant)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/Rabbit+Foundation.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nextension Rabbit {\n  public convenience init(key: String) throws {\n    try self.init(key: key.bytes)\n  }\n\n  public convenience init(key: String, iv: String) throws {\n    try self.init(key: key.bytes, iv: iv.bytes)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/String+FoundationExtension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nextension String {\n  /// Return Base64 back to String\n  public func decryptBase64ToString(cipher: Cipher) throws -> String {\n    guard let decodedData = Data(base64Encoded: self, options: []) else {\n      throw CipherError.decrypt\n    }\n\n    let decrypted = try decodedData.decrypt(cipher: cipher)\n\n    if let decryptedString = String(data: decrypted, encoding: String.Encoding.utf8) {\n      return decryptedString\n    }\n\n    throw CipherError.decrypt\n  }\n\n  public func decryptBase64(cipher: Cipher) throws -> Array<UInt8> {\n    guard let decodedData = Data(base64Encoded: self, options: []) else {\n      throw CipherError.decrypt\n    }\n\n    return try decodedData.decrypt(cipher: cipher).byteArray\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/Utils+Foundation.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nfunc perf(_ text: String, closure: () -> Void) {\n  let measurementStart = Date()\n\n  closure()\n\n  let measurementStop = Date()\n  let executionTime = measurementStop.timeIntervalSince(measurementStart)\n\n  print(\"\\(text) \\(executionTime)\")\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Foundation/XChaCha20+Foundation.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nextension XChaCha20 {\n  /// Convenience initializer that creates an XChaCha20 instance with the given key and IV\n  /// represented as hex-encoded strings.\n  ///\n  /// - Parameters:\n  ///   - key: The encryption/decryption key as a hex-encoded string.\n  ///   - iv: The initialization vector as a hex-encoded string.\n  /// - Throws: An error if the provided key or IV are of invalid length, format, or not hex-encoded.\n  public convenience init(key: String, iv: String) throws {\n    try self.init(key: key.bytes, iv: iv.bytes)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Generics.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/// Array of bytes. Caution: don't use directly because generic is slow.\n///\n/// - parameter value: integer value\n/// - parameter length: length of output array. By default size of value type\n///\n/// - returns: Array of bytes\n@_specialize(where T == Int)\n@_specialize(where T == UInt)\n@_specialize(where T == UInt8)\n@_specialize(where T == UInt16)\n@_specialize(where T == UInt32)\n@_specialize(where T == UInt64)\n@inlinable\nfunc arrayOfBytes<T: FixedWidthInteger>(value: T, length totalBytes: Int = MemoryLayout<T>.size) -> Array<UInt8> {\n  let valuePointer = UnsafeMutablePointer<T>.allocate(capacity: 1)\n  valuePointer.pointee = value\n\n  let bytesPointer = UnsafeMutablePointer<UInt8>(OpaquePointer(valuePointer))\n  var bytes = Array<UInt8>(repeating: 0, count: totalBytes)\n  for j in 0..<min(MemoryLayout<T>.size, totalBytes) {\n    bytes[totalBytes - 1 - j] = (bytesPointer + j).pointee\n  }\n\n  valuePointer.deinitialize(count: 1)\n  valuePointer.deallocate()\n\n  return bytes\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/HKDF.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  https://www.ietf.org/rfc/rfc5869.txt\n//\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(ucrt)\nimport ucrt\n#elseif canImport(WASILibc)\nimport WASILibc\n#endif\n\n/// A key derivation function.\n///\n/// HKDF   - HMAC-based Extract-and-Expand Key Derivation Function.\npublic struct HKDF {\n  public enum Error: Swift.Error {\n    case invalidInput\n    case derivedKeyTooLong\n  }\n\n  private let numBlocks: Int // l\n  private let dkLen: Int\n  private let info: Array<UInt8>\n  private let prk: Array<UInt8>\n  private let variant: HMAC.Variant\n\n  /// - parameters:\n  ///   - variant: hash variant\n  ///   - salt: optional salt (if not provided, it is set to a sequence of variant.digestLength zeros)\n  ///   - info: optional context and application specific information\n  ///   - keyLength: intended length of derived key\n  public init(password: Array<UInt8>, salt: Array<UInt8>? = nil, info: Array<UInt8>? = nil, keyLength: Int? = nil /* dkLen */, variant: HMAC.Variant = .sha2(.sha256)) throws {\n    guard !password.isEmpty else {\n      throw Error.invalidInput\n    }\n\n    let dkLen = keyLength ?? variant.digestLength\n    let keyLengthFinal = Double(dkLen)\n    let hLen = Double(variant.digestLength)\n    let numBlocks = Int(ceil(keyLengthFinal / hLen)) // l = ceil(keyLength / hLen)\n    guard numBlocks <= 255 else {\n      throw Error.derivedKeyTooLong\n    }\n\n    /// HKDF-Extract(salt, password) -> PRK\n    ///  - PRK - a pseudo-random key; it is used by calculate()\n    self.prk = try HMAC(key: salt ?? [], variant: variant).authenticate(password)\n    self.info = info ?? []\n    self.variant = variant\n    self.dkLen = dkLen\n    self.numBlocks = numBlocks\n  }\n\n  public func calculate() throws -> Array<UInt8> {\n    let hmac = HMAC(key: prk, variant: variant)\n    var ret = Array<UInt8>()\n    ret.reserveCapacity(self.numBlocks * self.variant.digestLength)\n    var value = Array<UInt8>()\n    for i in 1...self.numBlocks {\n      value.append(contentsOf: self.info)\n      value.append(UInt8(i))\n\n      let bytes = try hmac.authenticate(value)\n      ret.append(contentsOf: bytes)\n\n      /// update value to use it as input for next iteration\n      value = bytes\n    }\n    return Array(ret.prefix(self.dkLen))\n  }\n\n  public func callAsFunction() throws -> Array<UInt8> {\n    try calculate()\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/HMAC.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic final class HMAC: Authenticator {\n  public enum Error: Swift.Error {\n    case authenticateError\n    case invalidInput\n  }\n\n  public enum Variant {\n    case md5\n    case sha1\n    case sha2(SHA2.Variant)\n    case sha3(SHA3.Variant)\n\n    @available(*, deprecated, message: \"Use sha2(variant) instead.\")\n    case sha256, sha384, sha512\n\n    var digestLength: Int {\n      switch self {\n        case .sha1:\n          return SHA1.digestLength\n        case .sha256:\n          return SHA2.Variant.sha256.digestLength\n        case .sha384:\n          return SHA2.Variant.sha384.digestLength\n        case .sha512:\n          return SHA2.Variant.sha512.digestLength\n        case .sha2(let variant):\n          return variant.digestLength\n        case .sha3(let variant):\n            return variant.digestLength\n        case .md5:\n          return MD5.digestLength\n      }\n    }\n\n    func calculateHash(_ bytes: Array<UInt8>) -> Array<UInt8> {\n      switch self {\n        case .sha1:\n          return Digest.sha1(bytes)\n        case .sha256:\n          return Digest.sha256(bytes)\n        case .sha384:\n          return Digest.sha384(bytes)\n        case .sha512:\n          return Digest.sha512(bytes)\n        case .sha2(let variant):\n          return Digest.sha2(bytes, variant: variant)\n        case .sha3(let variant):\n          return Digest.sha3(bytes, variant: variant)\n        case .md5:\n          return Digest.md5(bytes)\n      }\n    }\n\n    func blockSize() -> Int {\n      switch self {\n        case .md5:\n          return MD5.blockSize\n        case .sha1:\n          return SHA1.blockSize\n        case .sha256:\n          return SHA2.Variant.sha256.blockSize\n        case .sha384:\n          return SHA2.Variant.sha384.blockSize\n        case .sha512:\n          return SHA2.Variant.sha512.blockSize\n        case .sha2(let variant):\n          return variant.blockSize\n        case .sha3(let variant):\n            return variant.blockSize\n      }\n    }\n  }\n\n  var key: Array<UInt8>\n  let variant: Variant\n\n  public init(key: Array<UInt8>, variant: HMAC.Variant = .md5) {\n    self.variant = variant\n    self.key = key\n\n    if key.count > variant.blockSize() {\n      let hash = variant.calculateHash(key)\n      self.key = hash\n    }\n\n    if key.count < variant.blockSize() {\n      self.key = ZeroPadding().add(to: key, blockSize: variant.blockSize())\n    }\n  }\n\n  // MARK: Authenticator\n\n  public func authenticate(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    var opad = Array<UInt8>(repeating: 0x5c, count: variant.blockSize())\n    for idx in self.key.indices {\n      opad[idx] = self.key[idx] ^ opad[idx]\n    }\n    var ipad = Array<UInt8>(repeating: 0x36, count: variant.blockSize())\n    for idx in self.key.indices {\n      ipad[idx] = self.key[idx] ^ ipad[idx]\n    }\n\n    let ipadAndMessageHash = self.variant.calculateHash(ipad + bytes)\n    let result = self.variant.calculateHash(opad + ipadAndMessageHash)\n\n    // return Array(result[0..<10]) // 80 bits\n    return result\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/ISO10126Padding.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\n/// Padding with random bytes, ending with the number of added bytes.\n/// Read the [Wikipedia](https://en.wikipedia.org/wiki/Padding_(cryptography)#ISO_10126)\n/// and [Crypto-IT](http://www.crypto-it.net/eng/theory/padding.html) articles for more info.\nstruct ISO10126Padding: PaddingProtocol {\n  init() {\n  }\n\n  @inlinable\n  func add(to bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n    let padding = UInt8(blockSize - (bytes.count % blockSize))\n    var withPadding = bytes\n    if padding > 0 {\n      withPadding += (0..<(padding - 1)).map { _ in UInt8.random(in: 0...255) } + [padding]\n    }\n    return withPadding\n  }\n\n  @inlinable\n  func remove(from bytes: Array<UInt8>, blockSize: Int?) -> Array<UInt8> {\n    guard !bytes.isEmpty, let lastByte = bytes.last else {\n      return bytes\n    }\n\n    assert(!bytes.isEmpty, \"Need bytes to remove padding\")\n\n    let padding = Int(lastByte) // last byte\n    let finalLength = bytes.count - padding\n\n    if finalLength < 0 {\n      return bytes\n    }\n\n    if padding >= 1 {\n      return Array(bytes[0..<finalLength])\n    }\n\n    return bytes\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/ISO78164Padding.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\n// First byte is 0x80, rest is zero padding\n// http://www.crypto-it.net/eng/theory/padding.html\n// http://www.embedx.com/pdfs/ISO_STD_7816/info_isoiec7816-4%7Bed21.0%7Den.pdf\nstruct ISO78164Padding: PaddingProtocol {\n  init() {\n  }\n\n  @inlinable\n  func add(to bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n    var padded = Array(bytes)\n    padded.append(0x80)\n\n    while (padded.count % blockSize) != 0 {\n      padded.append(0x00)\n    }\n    return padded\n  }\n\n  @inlinable\n  func remove(from bytes: Array<UInt8>, blockSize _: Int?) -> Array<UInt8> {\n    if let idx = bytes.lastIndex(of: 0x80) {\n      return Array(bytes[..<idx])\n    } else {\n      return bytes\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Int+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Created by Marcin Krzyzanowski on 12/08/14.\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(ucrt)\nimport ucrt\n#endif\n\nextension FixedWidthInteger {\n  @inlinable\n  func bytes(totalBytes: Int = MemoryLayout<Self>.size) -> Array<UInt8> {\n    arrayOfBytes(value: self.littleEndian, length: totalBytes)\n    // TODO: adjust bytes order\n    // var value = self.littleEndian\n    // return withUnsafeBytes(of: &value, Array.init).reversed()\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/MD5.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic final class MD5: DigestType {\n  static let blockSize: Int = 64\n  static let digestLength: Int = 16 // 128 / 8\n  fileprivate static let hashInitialValue: Array<UInt32> = [0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476]\n\n  fileprivate var accumulated = Array<UInt8>()\n  fileprivate var processedBytesTotalCount: Int = 0\n  fileprivate var accumulatedHash: Array<UInt32> = MD5.hashInitialValue\n\n  /** specifies the per-round shift amounts */\n  private let s: Array<UInt32> = [\n    7, 12, 17, 22, 7, 12, 17, 22, 7, 12, 17, 22, 7, 12, 17, 22,\n    5, 9, 14, 20, 5, 9, 14, 20, 5, 9, 14, 20, 5, 9, 14, 20,\n    4, 11, 16, 23, 4, 11, 16, 23, 4, 11, 16, 23, 4, 11, 16, 23,\n    6, 10, 15, 21, 6, 10, 15, 21, 6, 10, 15, 21, 6, 10, 15, 21\n  ]\n\n  /** binary integer part of the sines of integers (Radians) */\n  private let k: Array<UInt32> = [\n    0xd76aa478, 0xe8c7b756, 0x242070db, 0xc1bdceee,\n    0xf57c0faf, 0x4787c62a, 0xa8304613, 0xfd469501,\n    0x698098d8, 0x8b44f7af, 0xffff5bb1, 0x895cd7be,\n    0x6b901122, 0xfd987193, 0xa679438e, 0x49b40821,\n    0xf61e2562, 0xc040b340, 0x265e5a51, 0xe9b6c7aa,\n    0xd62f105d, 0x2441453, 0xd8a1e681, 0xe7d3fbc8,\n    0x21e1cde6, 0xc33707d6, 0xf4d50d87, 0x455a14ed,\n    0xa9e3e905, 0xfcefa3f8, 0x676f02d9, 0x8d2a4c8a,\n    0xfffa3942, 0x8771f681, 0x6d9d6122, 0xfde5380c,\n    0xa4beea44, 0x4bdecfa9, 0xf6bb4b60, 0xbebfbc70,\n    0x289b7ec6, 0xeaa127fa, 0xd4ef3085, 0x4881d05,\n    0xd9d4d039, 0xe6db99e5, 0x1fa27cf8, 0xc4ac5665,\n    0xf4292244, 0x432aff97, 0xab9423a7, 0xfc93a039,\n    0x655b59c3, 0x8f0ccc92, 0xffeff47d, 0x85845dd1,\n    0x6fa87e4f, 0xfe2ce6e0, 0xa3014314, 0x4e0811a1,\n    0xf7537e82, 0xbd3af235, 0x2ad7d2bb, 0xeb86d391\n  ]\n\n  public init() {\n  }\n\n  public func calculate(for bytes: Array<UInt8>) -> Array<UInt8> {\n    do {\n      return try update(withBytes: bytes.slice, isLast: true)\n    } catch {\n      fatalError()\n    }\n  }\n\n  public func callAsFunction(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    calculate(for: bytes)\n  }\n\n\n  // mutating currentHash in place is way faster than returning new result\n  fileprivate func process(block chunk: ArraySlice<UInt8>, currentHash: inout Array<UInt32>) {\n    assert(chunk.count == 16 * 4)\n\n    // Initialize hash value for this chunk:\n    var A: UInt32 = currentHash[0]\n    var B: UInt32 = currentHash[1]\n    var C: UInt32 = currentHash[2]\n    var D: UInt32 = currentHash[3]\n\n    var dTemp: UInt32 = 0\n\n    // Main loop\n    for j in 0..<self.k.count {\n      var g = 0\n      var F: UInt32 = 0\n\n      switch j {\n        case 0...15:\n          F = (B & C) | ((~B) & D)\n          g = j\n        case 16...31:\n          F = (D & B) | (~D & C)\n          g = (5 * j + 1) % 16\n        case 32...47:\n          F = B ^ C ^ D\n          g = (3 * j + 5) % 16\n        case 48...63:\n          F = C ^ (B | (~D))\n          g = (7 * j) % 16\n        default:\n          break\n      }\n      dTemp = D\n      D = C\n      C = B\n\n      // break chunk into sixteen 32-bit words M[j], 0 ≤ j ≤ 15 and get M[g] value\n      let gAdvanced = g << 2\n\n      var Mg = UInt32(chunk[chunk.startIndex &+ gAdvanced])\n      Mg |= UInt32(chunk[chunk.startIndex &+ gAdvanced &+ 1]) << 8\n      Mg |= UInt32(chunk[chunk.startIndex &+ gAdvanced &+ 2]) << 16\n      Mg |= UInt32(chunk[chunk.startIndex &+ gAdvanced &+ 3]) << 24\n\n      B = B &+ rotateLeft(A &+ F &+ self.k[j] &+ Mg, by: self.s[j])\n      A = dTemp\n    }\n\n    currentHash[0] = currentHash[0] &+ A\n    currentHash[1] = currentHash[1] &+ B\n    currentHash[2] = currentHash[2] &+ C\n    currentHash[3] = currentHash[3] &+ D\n  }\n}\n\nextension MD5: Updatable {\n  public func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = false) throws -> Array<UInt8> {\n    self.accumulated += bytes\n\n    if isLast {\n      let lengthInBits = (processedBytesTotalCount + self.accumulated.count) * 8\n      let lengthBytes = lengthInBits.bytes(totalBytes: 64 / 8) // A 64-bit representation of b\n\n      // Step 1. Append padding\n      bitPadding(to: &self.accumulated, blockSize: MD5.blockSize, allowance: 64 / 8)\n\n      // Step 2. Append Length a 64-bit representation of lengthInBits\n      self.accumulated += lengthBytes.reversed()\n    }\n\n    var processedBytes = 0\n    for chunk in self.accumulated.batched(by: MD5.blockSize) {\n      if isLast || (self.accumulated.count - processedBytes) >= MD5.blockSize {\n        self.process(block: chunk, currentHash: &self.accumulatedHash)\n        processedBytes += chunk.count\n      }\n    }\n    self.accumulated.removeFirst(processedBytes)\n    self.processedBytesTotalCount += processedBytes\n\n    // output current hash\n    var result = Array<UInt8>()\n    result.reserveCapacity(MD5.digestLength)\n\n    for hElement in self.accumulatedHash {\n      let hLE = hElement.littleEndian\n      result += Array<UInt8>(arrayLiteral: UInt8(hLE & 0xff), UInt8((hLE >> 8) & 0xff), UInt8((hLE >> 16) & 0xff), UInt8((hLE >> 24) & 0xff))\n    }\n\n    // reset hash value for instance\n    if isLast {\n      self.accumulatedHash = MD5.hashInitialValue\n    }\n\n    return result\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/NoPadding.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nstruct NoPadding: PaddingProtocol {\n  init() {\n  }\n\n  func add(to data: Array<UInt8>, blockSize _: Int) -> Array<UInt8> {\n    data\n  }\n\n  func remove(from data: Array<UInt8>, blockSize _: Int?) -> Array<UInt8> {\n    data\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Operators.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/*\n Bit shifting with overflow protection using overflow operator \"&\".\n Approach is consistent with standard overflow operators &+, &-, &*, &/\n and introduce new overflow operators for shifting: &<<, &>>\n\n Note: Works with unsigned integers values only\n\n Usage\n\n var i = 1       // init\n var j = i &<< 2 //shift left\n j &<<= 2        //shift left and assign\n\n @see: https://medium.com/@krzyzanowskim/swiftly-shift-bits-and-protect-yourself-be33016ce071\n\n This fuctonality is now implemented as part of Swift 3, SE-0104 https://github.com/apple/swift-evolution/blob/master/proposals/0104-improved-integers.md\n */\n"
  },
  {
    "path": "Sources/CryptoSwift/PEM/DER.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\n/// Conform to this protocol if your type can both be instantiated and expressed as an ASN1 DER representation.\ninternal protocol DERCodable: DERDecodable, DEREncodable { }\n\n/// Conform to this protocol if your type can be instantiated from a ASN1 DER representation\ninternal protocol DERDecodable {\n  /// Attempts to instantiate an instance of your Public Key when given a DER representation of your Public Key\n  ///\n  /// - Parameter publicDER: The ASN.1 DER representation of your Public Key\n  init(publicDER: Array<UInt8>) throws\n\n  /// Attempts to instantiate an instance of your Private Key when given a DER representation of your Private Key\n  ///\n  /// - Parameter privateDER: The ASN.1 DER representation of your Private Key\n  init(privateDER: Array<UInt8>) throws\n\n  /// Attempts to instantiate a Key when given the ASN1 DER encoded external representation of the Key\n  ///\n  /// - Parameter rawRepresentation: The ASN1 DER Encoded external representation (either public or private)\n  /// - Note: The external representation is identical to that of `SecKeyCopyExternalRepresentation` function from Apple's `Security` framework\n  init(rawRepresentation: Data) throws\n}\n\n/// Conform to this protocol if your type can be described in an ASN1 DER representation\ninternal protocol DEREncodable {\n  /// Returns the DER encoded representation of the Public Key\n  func publicKeyDER() throws -> Array<UInt8>\n\n  /// Returns the DER encoded representation of the Private Key\n  func privateKeyDER() throws -> Array<UInt8>\n\n  /// A semantically similar function that mimics the `SecKeyCopyExternalRepresentation` function from Apple's `Security` framework\n  /// - Note: If called on a Private Key, this method will return the Private Keys DER Representation. Likewise, if called on a Public Key, this method will return the Public Keys DER Representation\n  /// - Note: If you'd like to export the Public Keys DER from a Private Key, use the `publicKeyExternalRepresentation()` function\n  func externalRepresentation() throws -> Data\n\n  /// A semantically similar function that mimics the `SecKeyCopyExternalRepresentation` function from Apple's `Security` framework\n  /// - Note: This function only ever exports the Public Key's DER representation. If called on a Private Key, the corresponding Public Key will be extracted and exported.\n  func publicKeyExternalRepresentation() throws -> Data\n}\n\nstruct DER {\n  internal enum Error: Swift.Error {\n    /// We were provided invalid DER data\n    case invalidDERFormat\n  }\n\n  /// Integer to Octet String Primitive\n  /// - Parameters:\n  ///   - x: nonnegative integer to be converted\n  ///   - size: intended length of the resulting octet string\n  /// - Returns: corresponding octet string of length xLen\n  /// - Note: https://datatracker.ietf.org/doc/html/rfc3447#section-4.1\n  internal static func i2osp(x: [UInt8], size: Int) -> [UInt8] {\n    var modulus = x\n    while modulus.count < size {\n      modulus.insert(0x00, at: 0)\n    }\n    if modulus[0] >= 0x80 {\n      modulus.insert(0x00, at: 0)\n    }\n    return modulus\n  }\n\n  /// Integer to Octet String Primitive\n  /// - Parameters:\n  ///   - x: nonnegative integer to be converted\n  ///   - size: intended length of the resulting octet string\n  /// - Returns: corresponding octet string of length xLen\n  /// - Note: https://datatracker.ietf.org/doc/html/rfc3447#section-4.1\n  internal static func i2ospData(x: [UInt8], size: Int) -> Data {\n    return Data(DER.i2osp(x: x, size: size))\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/PKCS/PBKDF1.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic extension PKCS5 {\n  /// A key derivation function.\n  ///\n  /// PBKDF1 is recommended only for compatibility with existing\n  /// applications since the keys it produces may not be large enough for\n  /// some applications.\n  struct PBKDF1 {\n    public enum Error: Swift.Error {\n      case invalidInput\n      case derivedKeyTooLong\n    }\n\n    public enum Variant {\n      case md5, sha1\n\n      @usableFromInline\n      var size: Int {\n        switch self {\n          case .md5:\n            return MD5.digestLength\n          case .sha1:\n            return SHA1.digestLength\n        }\n      }\n\n      @usableFromInline\n      func calculateHash(_ bytes: Array<UInt8>) -> Array<UInt8> {\n        switch self {\n          case .sha1:\n            return Digest.sha1(bytes)\n          case .md5:\n            return Digest.md5(bytes)\n        }\n      }\n    }\n\n    @usableFromInline\n    let iterations: Int // c\n\n    @usableFromInline\n    let variant: Variant\n\n    @usableFromInline\n    let keyLength: Int\n\n    @usableFromInline\n    let t1: Array<UInt8>\n\n    /// - parameters:\n    ///   - salt: salt, an eight-bytes\n    ///   - variant: hash variant\n    ///   - iterations: iteration count, a positive integer\n    ///   - keyLength: intended length of derived key\n    public init(password: Array<UInt8>, salt: Array<UInt8>, variant: Variant = .sha1, iterations: Int = 4096 /* c */, keyLength: Int? = nil /* dkLen */ ) throws {\n      precondition(iterations > 0)\n      precondition(salt.count == 8)\n\n      let keyLength = keyLength ?? variant.size\n\n      if keyLength > variant.size {\n        throw Error.derivedKeyTooLong\n      }\n\n      let t1 = variant.calculateHash(password + salt)\n\n      self.iterations = iterations\n      self.variant = variant\n      self.keyLength = keyLength\n      self.t1 = t1\n    }\n\n    /// Apply the underlying hash function Hash for c iterations\n    @inlinable\n    public func calculate() -> Array<UInt8> {\n      var t = self.t1\n      for _ in 2...self.iterations {\n        t = self.variant.calculateHash(t)\n      }\n      return Array(t[0..<self.keyLength])\n    }\n\n    public func callAsFunction() -> Array<UInt8> {\n      calculate()\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/PKCS/PBKDF2.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  https://www.ietf.org/rfc/rfc2898.txt\n//\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(ucrt)\nimport ucrt\n#elseif canImport(WASILibc)\nimport WASILibc\n#endif\n\npublic extension PKCS5 {\n  /// A key derivation function.\n  ///\n  /// PBKDF2 - Password-Based Key Derivation Function 2. Key stretching technique.\n  ///          DK = PBKDF2(PRF, Password, Salt, c, dkLen)\n  struct PBKDF2 {\n    public enum Error: Swift.Error {\n      case invalidInput\n      case derivedKeyTooLong\n    }\n\n    private let salt: Array<UInt8> // S\n    fileprivate let iterations: Int // c\n    private let numBlocks: Int // l\n    private let dkLen: Int\n    fileprivate let prf: HMAC\n\n    /// - parameters:\n    ///   - salt: salt\n    ///   - variant: hash variant\n    ///   - iterations: iteration count, a positive integer\n    ///   - keyLength: intended length of derived key\n    ///   - variant: MAC variant. Defaults to SHA256\n    public init(password: Array<UInt8>, salt: Array<UInt8>, iterations: Int = 4096 /* c */, keyLength: Int? = nil /* dkLen */, variant: HMAC.Variant = .sha2(.sha256)) throws {\n      precondition(iterations > 0)\n\n      let prf = HMAC(key: password, variant: variant)\n\n      guard iterations > 0 && !salt.isEmpty else {\n        throw Error.invalidInput\n      }\n\n      self.dkLen = keyLength ?? variant.digestLength\n      let keyLengthFinal = Double(dkLen)\n      let hLen = Double(prf.variant.digestLength)\n      if keyLengthFinal > (pow(2, 32) - 1) * hLen {\n        throw Error.derivedKeyTooLong\n      }\n\n      self.salt = salt\n      self.iterations = iterations\n      self.prf = prf\n\n      self.numBlocks = Int(ceil(Double(keyLengthFinal) / hLen)) // l = ceil(keyLength / hLen)\n    }\n\n    public func calculate() throws -> Array<UInt8> {\n      var ret = Array<UInt8>()\n      ret.reserveCapacity(self.numBlocks * self.prf.variant.digestLength)\n      for i in 1...self.numBlocks {\n        // for each block T_i = U_1 ^ U_2 ^ ... ^ U_iter\n        if let value = try calculateBlock(self.salt, blockNum: i) {\n          ret.append(contentsOf: value)\n        }\n      }\n      return Array(ret.prefix(self.dkLen))\n    }\n\n    public func callAsFunction() throws -> Array<UInt8> {\n      try calculate()\n    }\n  }\n}\n\nprivate extension PKCS5.PBKDF2 {\n  func ARR(_ i: Int) -> Array<UInt8> {\n    var inti = Array<UInt8>(repeating: 0, count: 4)\n    inti[0] = UInt8((i >> 24) & 0xff)\n    inti[1] = UInt8((i >> 16) & 0xff)\n    inti[2] = UInt8((i >> 8) & 0xff)\n    inti[3] = UInt8(i & 0xff)\n    return inti\n  }\n\n  // F (P, S, c, i) = U_1 \\xor U_2 \\xor ... \\xor U_c\n  // U_1 = PRF (P, S || INT (i))\n  func calculateBlock(_ salt: Array<UInt8>, blockNum: Int) throws -> Array<UInt8>? {\n    guard let u1 = try? prf.authenticate(salt + ARR(blockNum)) else { // blockNum.bytes() is slower\n      return nil\n    }\n\n    var u = u1\n    var ret = u\n    if iterations > 1 {\n      // U_2 = PRF (P, U_1) ,\n      // U_c = PRF (P, U_{c-1}) .\n      for _ in 2...iterations {\n        u = try prf.authenticate(u)\n        for x in 0..<ret.count {\n          ret[x] = ret[x] ^ u[x]\n        }\n      }\n    }\n    return ret\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/PKCS/PKCS1v15.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  PKCS is a group of public-key cryptography standards devised\n//  and published by RSA Security Inc, starting in the early 1990s.\n//\n\n/// EMSA PKCS1 v1.5 Padding Scheme\n///\n/// The EMSA Version of the PKCS1 v1.5 padding scheme is **deterministic** (it pads the messages contents with 255 value bytes)\n/// ```\n/// // The returned structure\n/// // - PS is the applied padding\n/// // - M is your original Message\n/// EM = 0x00 || 0x01 || PS || 0x00 || M.\n/// ```\n/// - Note: This Padding scheme is intended to be used for encoding RSA Signatures\n///\n/// [EMSA-PKCS1v1_5 IETF Spec](https://datatracker.ietf.org/doc/html/rfc8017#section-9.2)\nstruct EMSAPKCS1v15Padding: PaddingProtocol {\n\n  init() {\n  }\n\n  @inlinable\n  func add(to bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n    var r = blockSize - ((bytes.count + 3) % blockSize)\n    if r <= 0 { r = blockSize - 3 }\n\n    return [0x00, 0x01] + Array<UInt8>(repeating: 0xFF, count: r) + [0x00] + bytes\n  }\n\n  @inlinable\n  func remove(from bytes: Array<UInt8>, blockSize _: Int?) -> Array<UInt8> {\n    assert(!bytes.isEmpty, \"Need bytes to remove padding\")\n\n    assert(bytes.prefix(2) == [0x00, 0x01], \"Invalid padding prefix\")\n\n    guard let paddingLength = bytes.dropFirst(2).firstIndex(of: 0x00) else { return bytes }\n\n    guard (paddingLength + 1) <= bytes.count else { return bytes }\n\n    return Array(bytes[(paddingLength + 1)...])\n  }\n}\n\n/// EME PKCS1 v1.5 Padding Scheme\n///\n/// The EME Version of the PKCS1 v1.5 padding scheme is **non deterministic** (it pads the messages contents with pseudo-random bytes)\n/// ```\n/// // The returned structure\n/// // - PS is the applied padding\n/// // - M is your original Message\n/// EM = 0x00 || 0x02 || PS || 0x00 || M.\n/// ```\n/// - Note: This Padding scheme is intended to be used for encoding messages before RSA Encryption\n///\n/// [EME-PKCS1v1_5 IETF Spec](https://datatracker.ietf.org/doc/html/rfc8017#section-7.2.1)\nstruct EMEPKCS1v15Padding: PaddingProtocol {\n\n  init() {\n  }\n\n  @inlinable\n  func add(to bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n    var r = blockSize - ((bytes.count + 3) % blockSize)\n    if r <= 0 { r = blockSize - 3 }\n\n    return [0x00, 0x02] + (0..<r).map { _ in UInt8.random(in: 1...UInt8.max) } + [0x00] + bytes\n  }\n\n  @inlinable\n  func remove(from bytes: Array<UInt8>, blockSize _: Int?) -> Array<UInt8> {\n    assert(!bytes.isEmpty, \"Need bytes to remove padding\")\n\n    assert(bytes.prefix(2) == [0x00, 0x02], \"Invalid padding prefix\")\n\n    guard let paddingLength = bytes.dropFirst(2).firstIndex(of: 0x00) else { return bytes }\n\n    guard (paddingLength + 1) <= bytes.count else { return bytes }\n\n    return Array(bytes[(paddingLength + 1)...])\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/PKCS/PKCS5.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  PKCS is a group of public-key cryptography standards devised\n//  and published by RSA Security Inc, starting in the early 1990s.\n//\n\npublic enum PKCS5 {\n  typealias Padding = PKCS7Padding\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/PKCS/PKCS7.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic enum PKCS7 {\n  typealias Padding = PKCS7Padding\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/PKCS/PKCS7Padding.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  PKCS is a group of public-key cryptography standards devised\n//  and published by RSA Security Inc, starting in the early 1990s.\n//\n\nstruct PKCS7Padding: PaddingProtocol {\n  enum Error: Swift.Error {\n    case invalidPaddingValue\n  }\n\n  init() {\n  }\n\n  @inlinable\n  func add(to bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n    let padding = UInt8(blockSize - (bytes.count % blockSize))\n    // The value of each added byte is the number of bytes that are added\n    return bytes + Array<UInt8>(repeating: padding, count: Int(padding))\n  }\n\n  @inlinable\n  func remove(from bytes: Array<UInt8>, blockSize _: Int?) -> Array<UInt8> {\n    guard !bytes.isEmpty, let lastByte = bytes.last else {\n      return bytes\n    }\n\n    assert(!bytes.isEmpty, \"Need bytes to remove padding\")\n\n    let padding = Int(lastByte) // last byte\n    let finalLength = bytes.count - padding\n\n    if finalLength < 0 {\n      return bytes\n    }\n\n    if padding >= 1 {\n      return Array(bytes[0..<finalLength])\n    }\n    return bytes\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Padding.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic protocol PaddingProtocol {\n  func add(to: Array<UInt8>, blockSize: Int) -> Array<UInt8>\n  func remove(from: Array<UInt8>, blockSize: Int?) -> Array<UInt8>\n}\n\npublic enum Padding: PaddingProtocol {\n  case noPadding, zeroPadding, pkcs7, pkcs5, eme_pkcs1v15, emsa_pkcs1v15, iso78164, iso10126\n\n  public func add(to: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n    switch self {\n      case .noPadding:\n        return to // NoPadding().add(to: to, blockSize: blockSize)\n      case .zeroPadding:\n        return ZeroPadding().add(to: to, blockSize: blockSize)\n      case .pkcs7:\n        return PKCS7.Padding().add(to: to, blockSize: blockSize)\n      case .pkcs5:\n        return PKCS5.Padding().add(to: to, blockSize: blockSize)\n      case .eme_pkcs1v15:\n        return EMEPKCS1v15Padding().add(to: to, blockSize: blockSize)\n      case .emsa_pkcs1v15:\n        return EMSAPKCS1v15Padding().add(to: to, blockSize: blockSize)\n      case .iso78164:\n        return ISO78164Padding().add(to: to, blockSize: blockSize)\n      case .iso10126:\n        return ISO10126Padding().add(to: to, blockSize: blockSize)\n    }\n  }\n\n  public func remove(from: Array<UInt8>, blockSize: Int?) -> Array<UInt8> {\n    switch self {\n      case .noPadding:\n        return from //NoPadding().remove(from: from, blockSize: blockSize)\n      case .zeroPadding:\n        return ZeroPadding().remove(from: from, blockSize: blockSize)\n      case .pkcs7:\n        return PKCS7.Padding().remove(from: from, blockSize: blockSize)\n      case .pkcs5:\n        return PKCS5.Padding().remove(from: from, blockSize: blockSize)\n      case .eme_pkcs1v15:\n        return EMEPKCS1v15Padding().remove(from: from, blockSize: blockSize)\n      case .emsa_pkcs1v15:\n        return EMSAPKCS1v15Padding().remove(from: from, blockSize: blockSize)\n      case .iso78164:\n        return ISO78164Padding().remove(from: from, blockSize: blockSize)\n      case .iso10126:\n        return ISO10126Padding().remove(from: from, blockSize: blockSize)\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Poly1305.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  http://tools.ietf.org/html/draft-agl-tls-chacha20poly1305-04#section-4\n//  nacl/crypto_onetimeauth/poly1305/ref/auth.c\n//\n///  Poly1305 takes a 32-byte, one-time key and a message and produces a 16-byte tag that authenticates the\n///  message such that an attacker has a negligible chance of producing a valid tag for an inauthentic message.\n\npublic final class Poly1305: Authenticator {\n  public enum Error: Swift.Error {\n    case authenticateError\n  }\n\n  public static let blockSize: Int = 16\n\n  private let key: SecureBytes\n\n  /// - parameter key: 32-byte key\n  public init(key: Array<UInt8>) {\n    self.key = SecureBytes(bytes: key)\n  }\n\n  private func squeeze(h: inout Array<UInt32>) {\n    assert(h.count == 17)\n    var u: UInt32 = 0\n    for j in 0..<16 {\n      u = u &+ h[j]\n      h[j] = u & 255\n      u = u >> 8\n    }\n\n    u = u &+ h[16]\n    h[16] = u & 3\n    u = 5 * (u >> 2)\n\n    for j in 0..<16 {\n      u = u &+ h[j]\n      h[j] = u & 255\n      u = u >> 8\n    }\n\n    u = u &+ h[16]\n    h[16] = u\n  }\n\n  private func add(h: inout Array<UInt32>, c: Array<UInt32>) {\n    assert(h.count == 17 && c.count == 17)\n\n    var u: UInt32 = 0\n    for j in 0..<17 {\n      u = u &+ (h[j] &+ c[j])\n      h[j] = u & 255\n      u = u >> 8\n    }\n  }\n\n  private func mulmod(h: inout Array<UInt32>, r: Array<UInt32>) {\n    var hr = Array<UInt32>(repeating: 0, count: 17)\n    var u: UInt32 = 0\n    for i in 0..<17 {\n      u = 0\n      for j in 0...i {\n        u = u &+ (h[j] * r[i &- j])\n      }\n      for j in (i + 1)..<17 {\n        u = u &+ (320 * h[j] * r[i &+ 17 &- j])\n      }\n      hr[i] = u\n    }\n    h = hr\n    self.squeeze(h: &h)\n  }\n\n  private func freeze(h: inout Array<UInt32>) {\n    let horig = h\n    self.add(h: &h, c: [5, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 252])\n    let negative = UInt32(bitPattern: -Int32(h[16] >> 7))\n    for j in 0..<17 {\n      h[j] ^= negative & (horig[j] ^ h[j])\n    }\n  }\n\n  /// the key is partitioned into two parts, called \"r\" and \"s\"\n  fileprivate func onetimeauth(message input: Array<UInt8>, key k: Array<UInt8>) -> Array<UInt8> {\n    // clamp\n    var r = Array<UInt32>(repeating: 0, count: 17)\n    var h = Array<UInt32>(repeating: 0, count: 17)\n    var c = Array<UInt32>(repeating: 0, count: 17)\n\n    r[0] = UInt32(k[0])\n    r[1] = UInt32(k[1])\n    r[2] = UInt32(k[2])\n    r[3] = UInt32(k[3] & 15)\n    r[4] = UInt32(k[4] & 252)\n    r[5] = UInt32(k[5])\n    r[6] = UInt32(k[6])\n    r[7] = UInt32(k[7] & 15)\n    r[8] = UInt32(k[8] & 252)\n    r[9] = UInt32(k[9])\n    r[10] = UInt32(k[10])\n    r[11] = UInt32(k[11] & 15)\n    r[12] = UInt32(k[12] & 252)\n    r[13] = UInt32(k[13])\n    r[14] = UInt32(k[14])\n    r[15] = UInt32(k[15] & 15)\n    r[16] = 0\n\n    var inlen = input.count\n    var inpos = 0\n    while inlen > 0 {\n      for j in 0..<c.count {\n        c[j] = 0\n      }\n\n      let maxj = min(inlen, 16)\n      for j in 0..<maxj {\n        c[j] = UInt32(input[inpos + j])\n      }\n      c[maxj] = 1\n      inpos = inpos + maxj\n      inlen = inlen - maxj\n      self.add(h: &h, c: c)\n      self.mulmod(h: &h, r: r)\n    }\n\n    self.freeze(h: &h)\n\n    for j in 0..<16 {\n      c[j] = UInt32(k[j + 16])\n    }\n    c[16] = 0\n    self.add(h: &h, c: c)\n\n    return h[0..<16].map {\n      UInt8($0 & 0xff)\n    }\n  }\n\n  // MARK: - Authenticator\n\n  /**\n   Calculate Message Authentication Code (MAC) for message.\n   Calculation context is discarder on instance deallocation.\n\n   - parameter bytes: Message\n\n   - returns: 16-byte tag that authenticates the message\n   */\n  public func authenticate(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    self.onetimeauth(message: bytes, key: Array(self.key))\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/PrivacyInfo.xcprivacy",
    "content": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">\n<plist version=\"1.0\">\n<dict>\n\t<key>NSPrivacyTracking</key>\n\t<false/>\n\t<key>NSPrivacyTrackingDomains</key>\n\t<array/>\n\t<key>NSPrivacyCollectedDataTypes</key>\n\t<array/>\n\t<key>NSPrivacyAccessedAPITypes</key>\n\t<array/>\n</dict>\n</plist>\n"
  },
  {
    "path": "Sources/CryptoSwift/RSA/RSA+Cipher.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\n// MARK: Cipher\n\nextension RSA: Cipher {\n\n  @inlinable\n  public func encrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    return try self.encrypt(Array<UInt8>(bytes), variant: .pksc1v15)\n  }\n\n  @inlinable\n  public func encrypt(_ bytes: Array<UInt8>, variant: RSAEncryptionVariant) throws -> Array<UInt8> {\n    // Prepare the data for the specified variant\n    let preparedData = try variant.prepare(bytes, blockSize: self.keySizeBytes)\n\n    // Encrypt the prepared data\n    return try variant.formatEncryptedBytes(self.encryptPreparedBytes(preparedData), blockSize: self.keySizeBytes)\n  }\n\n  @inlinable\n  internal func encryptPreparedBytes(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    // Calculate encrypted data\n    return BigUInteger(Data(bytes)).power(self.e, modulus: self.n).serialize().byteArray\n  }\n\n  @inlinable\n  public func decrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    return try self.decrypt(Array<UInt8>(bytes), variant: .pksc1v15)\n  }\n\n  @inlinable\n  public func decrypt(_ bytes: Array<UInt8>, variant: RSAEncryptionVariant) throws -> Array<UInt8> {\n    // Decrypt the data\n    let decrypted = try self.decryptPreparedBytes(bytes)\n\n    // Remove padding / unstructure data and return the raw plaintext\n    return variant.removePadding(decrypted, blockSize: self.keySizeBytes)\n  }\n\n  @inlinable\n  internal func decryptPreparedBytes(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    // Check for Private Exponent presence\n    guard let d = d else { throw RSA.Error.noPrivateKey }\n\n    // Calculate decrypted data\n    return BigUInteger(Data(bytes)).power(d, modulus: self.n).serialize().byteArray\n  }\n}\n\nextension RSA {\n  /// RSA Encryption Block Types\n  /// - [RFC2313 8.1 - Encryption block formatting](https://datatracker.ietf.org/doc/html/rfc2313#section-8.1)\n  @frozen\n  public enum RSAEncryptionVariant {\n    /// The `unsafe` encryption variant, is fully deterministic and doesn't format the inbound data in any way.\n    ///\n    /// - Warning: This is considered an unsafe method of encryption.\n    case unsafe\n    /// The `raw` encryption variant formats the inbound data with a deterministic padding scheme.\n    ///\n    /// - Warning: This is also considered to be an unsafe method of encryption, but matches the `Security` frameworks functionality.\n    case raw\n    /// The `pkcs1v15` encryption variant formats the inbound data with a non deterministic pseudo random padding scheme.\n    ///\n    /// [EME PKCS1v1.5 Padding Scheme Spec](https://datatracker.ietf.org/doc/html/rfc2313#section-8.1)\n    case pksc1v15\n\n    @inlinable\n    internal func prepare(_ bytes: Array<UInt8>, blockSize: Int) throws -> Array<UInt8> {\n      switch self {\n        case .unsafe:\n          return bytes\n        case .raw:\n          // We need at least 11 bytes of padding in order to safely encrypt messages\n          // - block types 1 and 2 have this minimum padding requirement, block type 0 isn't specified, but we enforce the minimum padding length here to be safe.\n          guard blockSize >= bytes.count + 11 else { throw RSA.Error.invalidMessageLengthForEncryption }\n          return Array(repeating: 0x00, count: blockSize - bytes.count) + bytes\n        case .pksc1v15:\n          // The `Security` framework refuses to encrypt a zero byte message using the pkcs1v15 padding scheme, so we do the same\n          guard !bytes.isEmpty else { throw RSA.Error.invalidMessageLengthForEncryption }\n          // We need at least 11 bytes of random padding in order to safely encrypt messages (RFC2313 Section 8.1 - Note 6)\n          guard blockSize >= bytes.count + 11 else { throw RSA.Error.invalidMessageLengthForEncryption }\n          return Padding.eme_pkcs1v15.add(to: bytes, blockSize: blockSize)\n      }\n    }\n\n    @inlinable\n    internal func formatEncryptedBytes(_ bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n      switch self {\n        case .unsafe:\n          return bytes\n        case .raw, .pksc1v15:\n          // Format the encrypted bytes before returning\n          return Array<UInt8>(repeating: 0x00, count: blockSize - bytes.count) + bytes\n      }\n    }\n\n    @inlinable\n    internal func removePadding(_ bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n      switch self {\n        case .unsafe:\n          return bytes\n        case .raw:\n          return bytes\n        case .pksc1v15:\n          // Convert the Octet String into an Integer Primitive using the BigInteger `serialize` method\n          // (this effectively just prefixes the data with a 0x00 byte indicating that its a positive integer)\n          return Padding.eme_pkcs1v15.remove(from: [0x00] + bytes, blockSize: blockSize)\n      }\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/RSA/RSA+Signature.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\n// MARK: Signatures & Verification\n\nextension RSA: Signature {\n  public func sign(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    try self.sign(Array(bytes), variant: .message_pkcs1v15_SHA256)\n  }\n\n  /// Signs the data using the Private key and the specified signature variant\n  /// - Parameters:\n  ///   - bytes: The data to be signed\n  ///   - variant: The variant to use (`digest` variants expect a pre-hashed digest matching that of the specified hash function, `message` variants will hash the data using the specified hash function before signing it)\n  /// - Returns: The signature of the data\n  public func sign(_ bytes: Array<UInt8>, variant: SignatureVariant) throws -> Array<UInt8> {\n    // Check for Private Exponent presence\n    guard let d = d else { throw RSA.Error.noPrivateKey }\n\n    // Hash & Encode Message\n    let hashedAndEncoded = try RSA.hashedAndEncoded(bytes, variant: variant, keySizeInBytes: self.keySizeBytes)\n\n    /// Calculate the Signature\n    let signedData = BigUInteger(Data(hashedAndEncoded)).power(d, modulus: self.n).serialize().byteArray\n\n    return variant.formatSignedBytes(signedData, blockSize: self.keySizeBytes)\n  }\n\n  public func verify(signature: ArraySlice<UInt8>, for expectedData: ArraySlice<UInt8>) throws -> Bool {\n    try self.verify(signature: Array(signature), for: Array(expectedData), variant: .message_pkcs1v15_SHA256)\n  }\n\n  /// Verifies whether a Signature is valid for the provided data\n  /// - Parameters:\n  ///   - signature: The signature to verify\n  ///   - expectedData: The original data that you expected to have been signed\n  ///   - variant: The variant used to sign the data\n  /// - Returns: `True` when the signature is valid for the expected data, `False` otherwise.\n  ///\n  /// [IETF Verification Spec](https://datatracker.ietf.org/doc/html/rfc8017#section-8.2.2)\n  public func verify(signature: Array<UInt8>, for bytes: Array<UInt8>, variant: SignatureVariant) throws -> Bool {\n    /// Step 1: Ensure the signature is the same length as the key's modulus\n    guard signature.count == self.keySizeBytes else { throw Error.invalidSignatureLength }\n\n    /// Prepare the expected message for signature comparison\n    var expectedData = try RSA.hashedAndEncoded(bytes, variant: variant, keySizeInBytes: self.keySizeBytes)\n    if expectedData.count == self.keySizeBytes && expectedData.prefix(1) == [0x00] { expectedData = Array(expectedData.dropFirst()) }\n\n    /// Step 2: 'Decrypt' the signature\n    let signatureResult = BigUInteger(Data(signature)).power(self.e, modulus: self.n).serialize().byteArray\n\n    /// Step 3: Compare the 'decrypted' signature with the prepared / encoded expected message....\n    guard signatureResult == expectedData else { return false }\n\n    return true\n  }\n\n  /// Hashes and Encodes a message for signing and verifying\n  ///\n  /// - Note: [EMSA-PKCS1-v1_5](https://datatracker.ietf.org/doc/html/rfc8017#section-9.2)\n  fileprivate static func hashedAndEncoded(_ bytes: [UInt8], variant: SignatureVariant, keySizeInBytes: Int) throws -> Array<UInt8> {\n    /// 1.  Apply the hash function to the message M to produce a hash\n    let hashedMessage = variant.calculateHash(bytes)\n\n    guard variant.enforceLength(hashedMessage, keySizeInBytes: keySizeInBytes) else { throw RSA.Error.invalidMessageLengthForSigning }\n\n    /// 2. Encode the algorithm ID for the hash function and the hash value into an ASN.1 value of type DigestInfo\n    /// PKCS#1_15 DER Structure (OID == sha256WithRSAEncryption)\n    let t = variant.encode(hashedMessage)\n\n    if case .raw = variant { return t }\n\n    /// 3.  If emLen < tLen + 11, output \"intended encoded message length too short\" and stop\n    if keySizeInBytes < t.count + 11 { throw RSA.Error.invalidMessageLengthForSigning }\n\n    /// 4.  Generate an octet string PS consisting of emLen - tLen - 3\n    /// octets with hexadecimal value 0xff. The length of PS will be\n    /// at least 8 octets.\n    /// 5.  Concatenate PS, the DER encoding T, and other padding to form\n    /// the encoded message EM as EM = 0x00 || 0x01 || PS || 0x00 || T.\n    let padded = variant.pad(bytes: t, to: keySizeInBytes)\n\n    /// Ensure the signature is of the correct length\n    guard padded.count == keySizeInBytes else { throw RSA.Error.invalidMessageLengthForSigning }\n\n    return padded\n  }\n}\n\nextension RSA {\n  public enum SignatureVariant {\n    /// rsaSignatureRaw\n    case raw\n    /// Hashes the raw message using MD5 before signing the data\n    case message_pkcs1v15_MD5\n    /// Hashes the raw message using SHA1 before signing the data\n    case message_pkcs1v15_SHA1\n    /// Hashes the raw message using SHA224 before signing the data\n    case message_pkcs1v15_SHA224\n    /// Hashes the raw message using SHA256 before signing the data\n    case message_pkcs1v15_SHA256\n    /// Hashes the raw message using SHA384 before signing the data\n    case message_pkcs1v15_SHA384\n    /// Hashes the raw message using SHA512 before signing the data\n    case message_pkcs1v15_SHA512\n    /// Hashes the raw message using SHA512-224 before signing the data\n    case message_pkcs1v15_SHA512_224\n    /// Hashes the raw message using SHA512-256 before signing the data\n    case message_pkcs1v15_SHA512_256\n    /// Hashes the raw message using SHA3_256 before signing the data\n    case message_pkcs1v15_SHA3_256\n    /// Hashes the raw message using SHA3_384 before signing the data\n    case message_pkcs1v15_SHA3_384\n    /// Hashes the raw message using SHA3_512 before signing the data\n    case message_pkcs1v15_SHA3_512\n    /// This variant isn't supported yet\n    case digest_pkcs1v15_RAW\n    /// This variant expects that the data to be signed is a valid MD5 Hash Digest\n    case digest_pkcs1v15_MD5\n    /// This variant expects that the data to be signed is a valid SHA1 Hash Digest\n    case digest_pkcs1v15_SHA1\n    /// This variant expects that the data to be signed is a valid SHA224 Hash Digest\n    case digest_pkcs1v15_SHA224\n    /// This variant expects that the data to be signed is a valid SHA256 Hash Digest\n    case digest_pkcs1v15_SHA256\n    /// This variant expects that the data to be signed is a valid SHA384 Hash Digest\n    case digest_pkcs1v15_SHA384\n    /// This variant expects that the data to be signed is a valid SHA512 Hash Digest\n    case digest_pkcs1v15_SHA512\n    /// This variant expects that the data to be signed is a valid SHA512-224 Hash Digest\n    case digest_pkcs1v15_SHA512_224\n    /// This variant expects that the data to be signed is a valid SHA512-256 Hash Digest\n    case digest_pkcs1v15_SHA512_256\n    /// This variant expects that the data to be signed is a valid SHA3-256 Hash Digest\n    case digest_pkcs1v15_SHA3_256\n    /// This variant expects that the data to be signed is a valid SHA3-384 Hash Digest\n    case digest_pkcs1v15_SHA3_384\n    /// This variant expects that the data to be signed is a valid SHA3-512 Hash Digest\n    case digest_pkcs1v15_SHA3_512\n    \n    internal var identifier: Array<UInt8> {\n      switch self {\n        case .raw, .digest_pkcs1v15_RAW: return []\n        case .message_pkcs1v15_MD5, .digest_pkcs1v15_MD5: return Array<UInt8>(arrayLiteral: 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x02, 0x05)\n        case .message_pkcs1v15_SHA1, .digest_pkcs1v15_SHA1: return Array<UInt8>(arrayLiteral: 0x2b, 0x0e, 0x03, 0x02, 0x1a)\n        case .message_pkcs1v15_SHA256, .digest_pkcs1v15_SHA256: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01)\n        case .message_pkcs1v15_SHA384, .digest_pkcs1v15_SHA384: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x02)\n        case .message_pkcs1v15_SHA512, .digest_pkcs1v15_SHA512: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x03)\n        case .message_pkcs1v15_SHA224, .digest_pkcs1v15_SHA224: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x04)\n        case .message_pkcs1v15_SHA512_224, .digest_pkcs1v15_SHA512_224: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x05)\n        case .message_pkcs1v15_SHA512_256, .digest_pkcs1v15_SHA512_256: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x06)\n        case .message_pkcs1v15_SHA3_256, .digest_pkcs1v15_SHA3_256: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x08)\n        case .message_pkcs1v15_SHA3_384, .digest_pkcs1v15_SHA3_384: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x09)\n        case .message_pkcs1v15_SHA3_512, .digest_pkcs1v15_SHA3_512: return Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x0A)\n      }\n    }\n    \n    internal func calculateHash(_ bytes: Array<UInt8>) -> Array<UInt8> {\n      switch self {\n        case .message_pkcs1v15_MD5:\n          return Digest.md5(bytes)\n        case .message_pkcs1v15_SHA1:\n          return Digest.sha1(bytes)\n        case .message_pkcs1v15_SHA224:\n          return Digest.sha224(bytes)\n        case .message_pkcs1v15_SHA256:\n          return Digest.sha256(bytes)\n        case .message_pkcs1v15_SHA384:\n          return Digest.sha384(bytes)\n        case .message_pkcs1v15_SHA512:\n          return Digest.sha512(bytes)\n        case .message_pkcs1v15_SHA512_224:\n          return Digest.sha2(bytes, variant: .sha224)\n        case .message_pkcs1v15_SHA512_256:\n          return Digest.sha2(bytes, variant: .sha256)\n        case .message_pkcs1v15_SHA3_256:\n          return Digest.sha3(bytes, variant: .sha256)\n        case .message_pkcs1v15_SHA3_384:\n          return Digest.sha3(bytes, variant: .sha384)\n        case .message_pkcs1v15_SHA3_512:\n          return Digest.sha3(bytes, variant: .sha512)\n        case .raw,\n            .digest_pkcs1v15_RAW,\n            .digest_pkcs1v15_MD5,\n            .digest_pkcs1v15_SHA1,\n            .digest_pkcs1v15_SHA224,\n            .digest_pkcs1v15_SHA256,\n            .digest_pkcs1v15_SHA384,\n            .digest_pkcs1v15_SHA512,\n            .digest_pkcs1v15_SHA512_224,\n            .digest_pkcs1v15_SHA512_256,\n            .digest_pkcs1v15_SHA3_256,\n            .digest_pkcs1v15_SHA3_384,\n            .digest_pkcs1v15_SHA3_512:\n        return bytes\n      }\n    }\n    \n    internal func enforceLength(_ bytes: Array<UInt8>, keySizeInBytes: Int) -> Bool {\n      switch self {\n        case .raw, .digest_pkcs1v15_RAW:\n          return bytes.count <= keySizeInBytes\n        case .digest_pkcs1v15_MD5:\n          return bytes.count <= 16\n        case .digest_pkcs1v15_SHA1:\n          return bytes.count <= 20\n        case .digest_pkcs1v15_SHA224:\n          return bytes.count <= 28\n        case .digest_pkcs1v15_SHA256, .digest_pkcs1v15_SHA3_256:\n          return bytes.count <= 32\n        case .digest_pkcs1v15_SHA384, .digest_pkcs1v15_SHA3_384:\n          return bytes.count <= 48\n        case .digest_pkcs1v15_SHA512, .digest_pkcs1v15_SHA3_512:\n          return bytes.count <= 64\n        case .digest_pkcs1v15_SHA512_224:\n          return bytes.count <= 28\n        case .digest_pkcs1v15_SHA512_256:\n          return bytes.count <= 32\n        case .message_pkcs1v15_MD5,\n            .message_pkcs1v15_SHA1,\n            .message_pkcs1v15_SHA224,\n            .message_pkcs1v15_SHA256,\n            .message_pkcs1v15_SHA384,\n            .message_pkcs1v15_SHA512,\n            .message_pkcs1v15_SHA512_224,\n            .message_pkcs1v15_SHA512_256,\n            .message_pkcs1v15_SHA3_256,\n            .message_pkcs1v15_SHA3_384,\n            .message_pkcs1v15_SHA3_512:\n        return true\n      }\n    }\n\n    internal func encode(_ bytes: Array<UInt8>) -> Array<UInt8> {\n      switch self {\n        case .raw, .digest_pkcs1v15_RAW:\n          return bytes\n\n        default:\n          let asn: ASN1.Node = .sequence(nodes: [\n            .sequence(nodes: [\n              .objectIdentifier(data: Data(self.identifier)),\n              .null\n            ]),\n            .octetString(data: Data(bytes))\n          ])\n\n          return ASN1.Encoder.encode(asn)\n      }\n    }\n\n    /// Right now the only Padding Scheme supported is [EMCS-PKCS1v15](https://www.rfc-editor.org/rfc/rfc8017#section-9.2) (others include [EMSA-PSS](https://www.rfc-editor.org/rfc/rfc8017#section-9.1))\n    internal func pad(bytes: Array<UInt8>, to blockSize: Int) -> Array<UInt8> {\n      switch self {\n        case .raw:\n          return bytes\n        default:\n          return Padding.emsa_pkcs1v15.add(to: bytes, blockSize: blockSize)\n      }\n    }\n\n    /// Zero pads a signature to the specified block size\n    /// - Parameters:\n    ///   - bytes: The signed bytes\n    ///   - blockSize: The block size to pad until\n    /// - Returns: A zero padded (prepended) bytes array of length blockSize\n    internal func formatSignedBytes(_ bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n      switch self {\n        default:\n          // Format the encrypted bytes before returning\n          return Array<UInt8>(repeating: 0x00, count: blockSize - bytes.count) + bytes\n      }\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/RSA/RSA.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// Foundation is required for `Data` to be found\nimport Foundation\n\n// Note: The `BigUInt` struct was copied from:\n// https://github.com/attaswift/BigInt\n// It allows fast calculation for RSA big numbers\n\npublic final class RSA: DERCodable {\n  /// RSA Key Errors\n  public enum Error: Swift.Error {\n    /// No private key specified\n    case noPrivateKey\n    /// Failed to calculate the inverse e and phi\n    case invalidInverseNotCoprimes\n    /// We only support Version 0 RSA keys (we don't support Version 1 introduced in RFC 3447)\n    case unsupportedRSAVersion\n    /// Failed to verify primes during initialiization (the provided primes don't reproduce the provided private exponent)\n    case invalidPrimes\n    /// We attempted to export a private key without our underlying primes\n    case noPrimes\n    /// Unable to calculate the coefficient during a private key import / export\n    case unableToCalculateCoefficient\n    /// The signature to verify is of an invalid length\n    case invalidSignatureLength\n    /// The message to be signed is of an invalid length\n    case invalidMessageLengthForSigning\n    /// The message to be encrypted is of an invalid length\n    case invalidMessageLengthForEncryption\n    /// The error thrown when Decryption fails\n    case invalidDecryption\n  }\n\n  /// RSA Modulus\n  public let n: BigUInteger\n\n  /// RSA Public Exponent\n  public let e: BigUInteger\n\n  /// RSA Private Exponent\n  public let d: BigUInteger?\n\n  /// The size of the modulus, in bits\n  public let keySize: Int\n\n  /// The size of the modulus, in bytes (rounded up to the nearest full byte)\n  public let keySizeBytes: Int\n\n  /// The underlying primes used to generate the Private Exponent\n  public let primes: (p: BigUInteger, q: BigUInteger)?\n\n  /// Initialize with RSA parameters\n  /// - Parameters:\n  ///   - n: The RSA Modulus\n  ///   - e: The RSA Public Exponent\n  ///   - d: The RSA Private Exponent (or nil if unknown, e.g. if only public key is known)\n  public init(n: BigUInteger, e: BigUInteger, d: BigUInteger? = nil) {\n    self.n = n\n    self.e = e\n    self.d = d\n    self.primes = nil\n\n    self.keySize = n.bitWidth\n    self.keySizeBytes = n.byteWidth\n  }\n\n  /// Initialize with RSA parameters\n  /// - Parameters:\n  ///   - n: The RSA Modulus\n  ///   - e: The RSA Public Exponent\n  ///   - d: The RSA Private Exponent (or nil if unknown, e.g. if only public key is known)\n  public convenience init(n: Array<UInt8>, e: Array<UInt8>, d: Array<UInt8>? = nil) {\n    if let d = d {\n      self.init(n: BigUInteger(Data(n)), e: BigUInteger(Data(e)), d: BigUInteger(Data(d)))\n    } else {\n      self.init(n: BigUInteger(Data(n)), e: BigUInteger(Data(e)))\n    }\n  }\n\n  /// Initialize with a generated key pair\n  /// - Parameter keySize: The size of the modulus\n  public convenience init(keySize: Int) throws {\n    // Generate prime numbers\n    let p = BigUInteger.generatePrime(keySize / 2)\n    let q = BigUInteger.generatePrime(keySize / 2)\n\n    // Calculate modulus\n    let n = p * q\n\n    // Calculate public and private exponent\n    let e: BigUInteger = 65537\n    let phi = (p - 1) * (q - 1)\n    guard let d = e.inverse(phi) else {\n      throw RSA.Error.invalidInverseNotCoprimes\n    }\n\n    // Initialize\n    try self.init(n: n, e: e, d: d, p: p, q: q)\n  }\n\n  /// Initialize with RSA parameters\n  /// - Parameters:\n  ///   - n: The RSA Modulus\n  ///   - e: The RSA Public Exponent\n  ///   - d: The RSA Private Exponent\n  ///   - p: The 1st Prime used to generate the Private Exponent\n  ///   - q: The 2nd Prime used to generate the Private Exponent\n  public init(n: BigUInteger, e: BigUInteger, d: BigUInteger, p: BigUInteger, q: BigUInteger) throws {\n    // Ensure the supplied parameters are correct...\n    // Calculate modulus\n    guard n == p * q else { throw Error.invalidPrimes }\n\n    // Calculate public and private exponent\n    let phi = (p - 1) * (q - 1)\n    guard d == e.inverse(phi) else { throw Error.invalidPrimes }\n\n    // Regular initialization\n    self.n = n\n    self.e = e\n    self.d = d\n    self.primes = (p, q)\n\n    self.keySize = n.bitWidth\n    self.keySizeBytes = n.byteWidth\n  }\n}\n\n// MARK: BigUInt Extension\n\ninternal extension CS.BigUInt {\n  /// The minimum number of bytes required to represent this integer in binary.\n  var byteWidth: Int {\n    let bytes = self.bitWidth / 8\n    return self.bitWidth % 8 == 0 ? bytes : bytes + 1\n  }\n}\n\n// MARK: DER Initializers (See #892)\n\nextension RSA {\n  /// Decodes the provided data into a Public RSA Key\n  ///\n  /// [IETF Spec RFC2313](https://datatracker.ietf.org/doc/html/rfc2313#section-7.1)\n  /// ```\n  /// =========================\n  ///  RSA PublicKey Structure\n  /// =========================\n  ///\n  /// RSAPublicKey ::= SEQUENCE {\n  ///   modulus           INTEGER,  -- n\n  ///   publicExponent    INTEGER,  -- e\n  /// }\n  /// ```\n  internal convenience init(publicDER der: Array<UInt8>) throws {\n    let asn = try ASN1.Decoder.decode(data: Data(der))\n\n    // Enforce the above ASN Structure\n    guard case .sequence(let params) = asn else { throw DER.Error.invalidDERFormat }\n    guard params.count == 2 else { throw DER.Error.invalidDERFormat }\n\n    guard case .integer(let modulus) = params[0] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let publicExponent) = params[1] else { throw DER.Error.invalidDERFormat }\n\n    self.init(n: BigUInteger(modulus), e: BigUInteger(publicExponent))\n  }\n\n  /// Decodes the provided data into a Private RSA Key\n  ///\n  /// [IETF Spec RFC2313](https://datatracker.ietf.org/doc/html/rfc2313#section-7.2)\n  /// ```\n  /// ==========================\n  ///  RSA PrivateKey Structure\n  /// ==========================\n  ///\n  /// RSAPrivateKey ::= SEQUENCE {\n  ///   version           Version,\n  ///   modulus           INTEGER,  -- n\n  ///   publicExponent    INTEGER,  -- e\n  ///   privateExponent   INTEGER,  -- d\n  ///   prime1            INTEGER,  -- p\n  ///   prime2            INTEGER,  -- q\n  ///   exponent1         INTEGER,  -- d mod (p-1)\n  ///   exponent2         INTEGER,  -- d mod (q-1)\n  ///   coefficient       INTEGER,  -- (inverse of q) mod p\n  /// }\n  /// ```\n  internal convenience init(privateDER der: Array<UInt8>) throws {\n    let asn = try ASN1.Decoder.decode(data: Data(der))\n\n    // Enforce the above ASN Structure (do we need to extract and verify the eponents and coefficients?)\n    guard case .sequence(let params) = asn else { throw DER.Error.invalidDERFormat }\n    guard params.count == 9 else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let version) = params[0] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let modulus) = params[1] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let publicExponent) = params[2] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let privateExponent) = params[3] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let prime1) = params[4] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let prime2) = params[5] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let exponent1) = params[6] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let exponent2) = params[7] else { throw DER.Error.invalidDERFormat }\n    guard case .integer(let coefficient) = params[8] else { throw DER.Error.invalidDERFormat }\n\n    // We only support version 0x00 == RFC2313 at the moment\n    // - TODO: Support multiple primes 0x01 version defined in [RFC3447](https://www.rfc-editor.org/rfc/rfc3447#appendix-A.1.2)\n    guard version == Data(hex: \"0x00\") else { throw Error.unsupportedRSAVersion }\n\n    // Calculate public and private exponent\n    let phi = (BigUInteger(prime1) - 1) * (BigUInteger(prime2) - 1)\n    guard let d = BigUInteger(publicExponent).inverse(phi) else { throw Error.invalidPrimes }\n    guard BigUInteger(privateExponent) == d else { throw Error.invalidPrimes }\n\n    // Ensure the provided coefficient is correct (derived from the primes)\n    guard let calculatedCoefficient = BigUInteger(prime2).inverse(BigUInteger(prime1)) else { throw RSA.Error.unableToCalculateCoefficient }\n    guard calculatedCoefficient == BigUInteger(coefficient) else { throw RSA.Error.invalidPrimes }\n\n    // Ensure the provided exponents are correct as well\n    guard (d % (BigUInteger(prime1) - 1)) == BigUInteger(exponent1) else { throw RSA.Error.invalidPrimes }\n    guard (d % (BigUInteger(prime2) - 1)) == BigUInteger(exponent2) else { throw RSA.Error.invalidPrimes }\n\n    // Proceed with regular initialization\n    try self.init(n: BigUInteger(modulus), e: BigUInteger(publicExponent), d: BigUInteger(privateExponent), p: BigUInteger(prime1), q: BigUInteger(prime2))\n  }\n\n  /// Attempts to instantiate an RSA Key when given the ASN1 DER encoded external representation of the Key\n  ///\n  /// An example of importing a SecKey RSA key (from Apple's `Security` framework) for use within CryptoSwift\n  /// ```\n  /// /// Starting with a SecKey RSA Key\n  /// let rsaSecKey:SecKey\n  ///\n  /// /// Copy the External Representation\n  /// var externalRepError:Unmanaged<CFError>?\n  /// guard let externalRep = SecKeyCopyExternalRepresentation(rsaSecKey, &externalRepError) as? Data else {\n  ///     /// Failed to copy external representation for RSA SecKey\n  ///     return\n  /// }\n  ///\n  /// /// Instantiate the RSA Key from the raw external representation\n  /// let rsaKey = try RSA(rawRepresentation: externalRep)\n  ///\n  /// /// You now have a CryptoSwift RSA Key\n  /// // rsaKey.encrypt(...)\n  /// // rsaKey.decrypt(...)\n  /// // rsaKey.sign(...)\n  /// // rsaKey.verify(...)\n  /// ```\n  public convenience init(rawRepresentation raw: Data) throws {\n    do { try self.init(privateDER: raw.byteArray) } catch {\n      try self.init(publicDER: raw.byteArray)\n    }\n  }\n}\n\n// MARK: DER Exports (See #892)\n\nextension RSA {\n  /// The DER representation of this public key\n  ///\n  /// [IETF Spec RFC2313](https://datatracker.ietf.org/doc/html/rfc2313#section-7.1)\n  /// ```\n  /// =========================\n  ///  RSA PublicKey Structure\n  /// =========================\n  ///\n  /// RSAPublicKey ::= SEQUENCE {\n  ///   modulus           INTEGER,  -- n\n  ///   publicExponent    INTEGER   -- e\n  /// }\n  /// ```\n  func publicKeyDER() throws -> Array<UInt8> {\n    let mod = self.n.serialize()\n    let exp = self.e.serialize()\n    let pubKeyAsnNode: ASN1.Node =\n      .sequence(nodes: [\n        .integer(data: DER.i2ospData(x: mod.byteArray, size: self.keySizeBytes)),\n        .integer(data: DER.i2ospData(x: exp.byteArray, size: exp.byteArray.count))\n      ])\n    return ASN1.Encoder.encode(pubKeyAsnNode)\n  }\n\n  /// The DER representation of this private key\n  ///\n  /// [IETF Spec RFC2313](https://datatracker.ietf.org/doc/html/rfc2313#section-7.2)\n  /// ```\n  /// ==========================\n  ///  RSA PrivateKey Structure\n  /// ==========================\n  ///\n  /// RSAPrivateKey ::= SEQUENCE {\n  ///   version           Version,\n  ///   modulus           INTEGER,  -- n\n  ///   publicExponent    INTEGER,  -- e\n  ///   privateExponent   INTEGER,  -- d\n  ///   prime1            INTEGER,  -- p\n  ///   prime2            INTEGER,  -- q\n  ///   exponent1         INTEGER,  -- d mod (p-1)\n  ///   exponent2         INTEGER,  -- d mod (q-1)\n  ///   coefficient       INTEGER,  -- (inverse of q) mod p\n  /// }\n  /// ```\n  func privateKeyDER() throws -> Array<UInt8> {\n    // Make sure we have a private key\n    guard let d = d else { throw RSA.Error.noPrivateKey }\n    // Make sure we have access to our primes\n    guard let primes = primes else { throw RSA.Error.noPrimes }\n    // Make sure we can calculate our coefficient (inverse of q mod p)\n    guard let coefficient = primes.q.inverse(primes.p) else { throw RSA.Error.unableToCalculateCoefficient }\n\n    let paramWidth = self.keySizeBytes / 2\n    // Structure the data (according to RFC2313, version 0x00 RSA Private Key Syntax)\n    let mod = self.n.serialize()\n    let privateKeyAsnNode: ASN1.Node =\n      .sequence(nodes: [\n        .integer(data: Data(hex: \"0x00\")),\n        .integer(data: DER.i2ospData(x: mod.byteArray, size: self.keySizeBytes)),\n        .integer(data: DER.i2ospData(x: self.e.serialize().byteArray, size: 3)),\n        .integer(data: DER.i2ospData(x: d.serialize().byteArray, size: self.keySizeBytes)),\n        .integer(data: DER.i2ospData(x: primes.p.serialize().byteArray, size: paramWidth)),\n        .integer(data: DER.i2ospData(x: primes.q.serialize().byteArray, size: paramWidth)),\n        .integer(data: DER.i2ospData(x: (d % (primes.p - 1)).serialize().byteArray, size: paramWidth)),\n        .integer(data: DER.i2ospData(x: (d % (primes.q - 1)).serialize().byteArray, size: paramWidth)),\n        .integer(data: DER.i2ospData(x: coefficient.serialize().byteArray, size: paramWidth))\n      ])\n\n    // Encode and return the data\n    return ASN1.Encoder.encode(privateKeyAsnNode)\n  }\n\n  /// This method returns the DER encoding of the RSA Key.\n  ///\n  /// - Returns: The ASN1 DER Encoding of the Public or Private RSA Key\n  /// - Note: If the RSA Key is a private key, the private key representation is returned\n  /// - Note: If the RSA Key is a public key, the public key representation is returned\n  /// - Note: If you'd like to only export the public DER of an RSA Key call the `publicKeyExternalRepresentation()` method\n  /// - Note: This method returns the same data as Apple's `SecKeyCopyExternalRepresentation` method.\n  ///\n  /// An example of converting a CryptoSwift RSA key to a SecKey RSA key\n  /// ```\n  /// /// Starting with a CryptoSwift RSA Key\n  /// let rsaKey = try RSA(keySize: 1024)\n  ///\n  /// /// Define your Keys attributes\n  /// let attributes: [String:Any] = [\n  ///   kSecAttrKeyType as String: kSecAttrKeyTypeRSA,\n  ///   kSecAttrKeyClass as String: kSecAttrKeyClassPrivate, // or kSecAttrKeyClassPublic\n  ///   kSecAttrKeySizeInBits as String: 1024, // The appropriate bits\n  ///   kSecAttrIsPermanent as String: false\n  /// ]\n  /// var error:Unmanaged<CFError>? = nil\n  /// guard let rsaSecKey = try SecKeyCreateWithData(rsaKey.externalRepresentation() as CFData, attributes as CFDictionary, &error) else {\n  ///   /// Error constructing SecKey from raw key data\n  ///   return\n  /// }\n  ///\n  /// /// You now have an RSA SecKey for use with Apple's Security framework\n  /// ```\n  ///\n  /// An example of converting a SecKey RSA key to a CryptoSwift RSA key\n  /// ```\n  /// /// Starting with a SecKey RSA Key\n  /// let rsaSecKey:SecKey\n  ///\n  /// /// Copy External Representation\n  /// var externalRepError:Unmanaged<CFError>?\n  /// guard let cfdata = SecKeyCopyExternalRepresentation(rsaSecKey, &externalRepError) else {\n  ///     /// Failed to copy external representation for RSA SecKey\n  ///     return\n  /// }\n  ///\n  /// /// Instantiate the RSA Key from the raw external representation\n  /// let rsaKey = try RSA(rawRepresentation: cfdata as Data)\n  ///\n  /// /// You now have a CryptoSwift RSA Key\n  /// ```\n  ///\n  public func externalRepresentation() throws -> Data {\n    if self.d != nil {\n      return try Data(self.privateKeyDER())\n    } else {\n      return try Data(self.publicKeyDER())\n    }\n  }\n\n  public func publicKeyExternalRepresentation() throws -> Data {\n    return try Data(self.publicKeyDER())\n  }\n}\n\n// MARK: CS.BigUInt extension\n\nextension BigUInteger {\n\n  public static func generatePrime(_ width: Int) -> BigUInteger {\n    // Note: Need to find a better way to generate prime numbers\n    while true {\n      var random = BigUInteger.randomInteger(withExactWidth: width)\n      random |= BigUInteger(1)\n      if random.isPrime() {\n        return random\n      }\n    }\n  }\n}\n\n// MARK: CustomStringConvertible Conformance\n\nextension RSA: CustomStringConvertible {\n  public var description: String {\n    if self.d != nil {\n      return \"CryptoSwift.RSA.PrivateKey<\\(self.keySize)>\"\n    } else {\n      return \"CryptoSwift.RSA.PublicKey<\\(self.keySize)>\"\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Rabbit.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic final class Rabbit: BlockCipher {\n  public enum Error: Swift.Error {\n    case invalidKeyOrInitializationVector\n  }\n\n  /// Size of IV in bytes\n  public static let ivSize = 64 / 8\n\n  /// Size of key in bytes\n  public static let keySize = 128 / 8\n\n  /// Size of block in bytes\n  public static let blockSize = 128 / 8\n\n  public var keySize: Int {\n    self.key.count\n  }\n\n  /// Key\n  private let key: Key\n\n  /// IV (optional)\n  private let iv: Array<UInt8>?\n\n  /// State variables\n  private var x = Array<UInt32>(repeating: 0, count: 8)\n\n  /// Counter variables\n  private var c = Array<UInt32>(repeating: 0, count: 8)\n\n  /// Counter carry\n  private var p7: UInt32 = 0\n\n  /// 'a' constants\n  private var a: Array<UInt32> = [\n    0x4d34d34d,\n    0xd34d34d3,\n    0x34d34d34,\n    0x4d34d34d,\n    0xd34d34d3,\n    0x34d34d34,\n    0x4d34d34d,\n    0xd34d34d3\n  ]\n\n  // MARK: - Initializers\n\n  public convenience init(key: Array<UInt8>) throws {\n    try self.init(key: key, iv: nil)\n  }\n\n  public init(key: Array<UInt8>, iv: Array<UInt8>?) throws {\n    self.key = Key(bytes: key)\n    self.iv = iv\n\n    guard key.count == Rabbit.keySize && (iv == nil || iv!.count == Rabbit.ivSize) else {\n      throw Error.invalidKeyOrInitializationVector\n    }\n  }\n\n  // MARK: -\n\n  fileprivate func setup() {\n    self.p7 = 0\n\n    // Key divided into 8 subkeys\n    let k = Array<UInt32>(unsafeUninitializedCapacity: 8) { buf, count in\n      for j in 0..<8 {\n        buf[j] = UInt32(self.key[Rabbit.blockSize - (2 * j + 1)]) | (UInt32(self.key[Rabbit.blockSize - (2 * j + 2)]) << 8)\n      }\n      count = 8\n    }\n\n    // Initialize state and counter variables from subkeys\n    for j in 0..<8 {\n      if j % 2 == 0 {\n        self.x[j] = (k[(j + 1) % 8] << 16) | k[j]\n        self.c[j] = (k[(j + 4) % 8] << 16) | k[(j + 5) % 8]\n      } else {\n        self.x[j] = (k[(j + 5) % 8] << 16) | k[(j + 4) % 8]\n        self.c[j] = (k[j] << 16) | k[(j + 1) % 8]\n      }\n    }\n\n    // Iterate system four times\n    self.nextState()\n    self.nextState()\n    self.nextState()\n    self.nextState()\n\n    // Reinitialize counter variables\n    for j in 0..<8 {\n      self.c[j] = self.c[j] ^ self.x[(j + 4) % 8]\n    }\n\n    if let iv = iv {\n      self.setupIV(iv)\n    }\n  }\n\n  private func setupIV(_ iv: Array<UInt8>) {\n    // 63...56 55...48 47...40 39...32 31...24 23...16 15...8 7...0 IV bits\n    //    0       1       2       3       4       5       6     7   IV bytes in array\n    let iv0 = UInt32(bytes: [iv[4], iv[5], iv[6], iv[7]])\n    let iv1 = UInt32(bytes: [iv[0], iv[1], iv[4], iv[5]])\n    let iv2 = UInt32(bytes: [iv[0], iv[1], iv[2], iv[3]])\n    let iv3 = UInt32(bytes: [iv[2], iv[3], iv[6], iv[7]])\n\n    // Modify the counter state as function of the IV\n    c[0] = self.c[0] ^ iv0\n    self.c[1] = self.c[1] ^ iv1\n    self.c[2] = self.c[2] ^ iv2\n    self.c[3] = self.c[3] ^ iv3\n    self.c[4] = self.c[4] ^ iv0\n    self.c[5] = self.c[5] ^ iv1\n    self.c[6] = self.c[6] ^ iv2\n    self.c[7] = self.c[7] ^ iv3\n\n    // Iterate system four times\n    self.nextState()\n    self.nextState()\n    self.nextState()\n    self.nextState()\n  }\n\n  private func nextState() {\n    // Before an iteration the counters are incremented\n    var carry = self.p7\n    for j in 0..<8 {\n      let prev = self.c[j]\n      self.c[j] = prev &+ self.a[j] &+ carry\n      carry = prev > self.c[j] ? 1 : 0 // detect overflow\n    }\n    self.p7 = carry // save last carry bit\n\n    // Iteration of the system\n    self.x = Array<UInt32>(unsafeUninitializedCapacity: 8) { newX, count in\n      newX[0] = self.g(0) &+ rotateLeft(self.g(7), by: 16) &+ rotateLeft(self.g(6), by: 16)\n      newX[1] = self.g(1) &+ rotateLeft(self.g(0), by: 8) &+ self.g(7)\n      newX[2] = self.g(2) &+ rotateLeft(self.g(1), by: 16) &+ rotateLeft(self.g(0), by: 16)\n      newX[3] = self.g(3) &+ rotateLeft(self.g(2), by: 8) &+ self.g(1)\n      newX[4] = self.g(4) &+ rotateLeft(self.g(3), by: 16) &+ rotateLeft(self.g(2), by: 16)\n      newX[5] = self.g(5) &+ rotateLeft(self.g(4), by: 8) &+ self.g(3)\n      newX[6] = self.g(6) &+ rotateLeft(self.g(5), by: 16) &+ rotateLeft(self.g(4), by: 16)\n      newX[7] = self.g(7) &+ rotateLeft(self.g(6), by: 8) &+ self.g(5)\n      count = 8\n    }\n  }\n\n  private func g(_ j: Int) -> UInt32 {\n    let sum = self.x[j] &+ self.c[j]\n    let square = UInt64(sum) * UInt64(sum)\n    return UInt32(truncatingIfNeeded: square ^ (square >> 32))\n  }\n\n  fileprivate func nextOutput() -> Array<UInt8> {\n    self.nextState()\n\n    var output16 = Array<UInt16>(repeating: 0, count: Rabbit.blockSize / 2)\n    output16[7] = UInt16(truncatingIfNeeded: self.x[0]) ^ UInt16(truncatingIfNeeded: self.x[5] >> 16)\n    output16[6] = UInt16(truncatingIfNeeded: self.x[0] >> 16) ^ UInt16(truncatingIfNeeded: self.x[3])\n    output16[5] = UInt16(truncatingIfNeeded: self.x[2]) ^ UInt16(truncatingIfNeeded: self.x[7] >> 16)\n    output16[4] = UInt16(truncatingIfNeeded: self.x[2] >> 16) ^ UInt16(truncatingIfNeeded: self.x[5])\n    output16[3] = UInt16(truncatingIfNeeded: self.x[4]) ^ UInt16(truncatingIfNeeded: self.x[1] >> 16)\n    output16[2] = UInt16(truncatingIfNeeded: self.x[4] >> 16) ^ UInt16(truncatingIfNeeded: self.x[7])\n    output16[1] = UInt16(truncatingIfNeeded: self.x[6]) ^ UInt16(truncatingIfNeeded: self.x[3] >> 16)\n    output16[0] = UInt16(truncatingIfNeeded: self.x[6] >> 16) ^ UInt16(truncatingIfNeeded: self.x[1])\n\n    var output8 = Array<UInt8>(repeating: 0, count: Rabbit.blockSize)\n    for j in 0..<output16.count {\n      output8[j * 2] = UInt8(truncatingIfNeeded: output16[j] >> 8)\n      output8[j * 2 + 1] = UInt8(truncatingIfNeeded: output16[j])\n    }\n    return output8\n  }\n}\n\n// MARK: Cipher\n\nextension Rabbit: Cipher {\n  public func encrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    self.setup()\n\n    return Array<UInt8>(unsafeUninitializedCapacity: bytes.count) { result, count in\n      var output = self.nextOutput()\n      var byteIdx = 0\n      var outputIdx = 0\n      while byteIdx < bytes.count {\n        if outputIdx == Rabbit.blockSize {\n          output = self.nextOutput()\n          outputIdx = 0\n        }\n\n        result[byteIdx] = bytes[byteIdx] ^ output[outputIdx]\n\n        byteIdx += 1\n        outputIdx += 1\n      }\n      count = bytes.count\n    }\n  }\n\n  public func decrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    try self.encrypt(bytes)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/SHA1.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic final class SHA1: DigestType {\n\n  @usableFromInline\n  static let digestLength: Int = 20 // 160 / 8\n\n  @usableFromInline\n  static let blockSize: Int = 64\n\n  @usableFromInline\n  static let hashInitialValue: ContiguousArray<UInt32> = [0x67452301, 0xefcdab89, 0x98badcfe, 0x10325476, 0xc3d2e1f0]\n\n  @usableFromInline\n  var accumulated = Array<UInt8>()\n\n  @usableFromInline\n  var processedBytesTotalCount: Int = 0\n\n  @usableFromInline\n  var accumulatedHash: ContiguousArray<UInt32> = SHA1.hashInitialValue\n\n  public init() {\n  }\n\n  @inlinable\n  public func calculate(for bytes: Array<UInt8>) -> Array<UInt8> {\n    do {\n      return try update(withBytes: bytes.slice, isLast: true)\n    } catch {\n      return []\n    }\n  }\n\n  public func callAsFunction(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    calculate(for: bytes)\n  }\n\n  @usableFromInline\n  func process(block chunk: ArraySlice<UInt8>, currentHash hh: inout ContiguousArray<UInt32>) {\n    // break chunk into sixteen 32-bit words M[j], 0 ≤ j ≤ 15, big-endian\n    // Extend the sixteen 32-bit words into eighty 32-bit words:\n    let M = UnsafeMutablePointer<UInt32>.allocate(capacity: 80)\n    M.initialize(repeating: 0, count: 80)\n    defer {\n      M.deinitialize(count: 80)\n      M.deallocate()\n    }\n\n    for x in 0..<80 {\n      switch x {\n        case 0...15:\n          let start = chunk.startIndex.advanced(by: x * 4) // * MemoryLayout<UInt32>.size\n          M[x] = UInt32(bytes: chunk, fromIndex: start)\n        default:\n          M[x] = rotateLeft(M[x - 3] ^ M[x - 8] ^ M[x - 14] ^ M[x - 16], by: 1)\n      }\n    }\n\n    var A = hh[0]\n    var B = hh[1]\n    var C = hh[2]\n    var D = hh[3]\n    var E = hh[4]\n\n    // Main loop\n    for j in 0...79 {\n      var f: UInt32 = 0\n      var k: UInt32 = 0\n\n      switch j {\n        case 0...19:\n          f = (B & C) | ((~B) & D)\n          k = 0x5a827999\n        case 20...39:\n          f = B ^ C ^ D\n          k = 0x6ed9eba1\n        case 40...59:\n          f = (B & C) | (B & D) | (C & D)\n          k = 0x8f1bbcdc\n        case 60...79:\n          f = B ^ C ^ D\n          k = 0xca62c1d6\n        default:\n          break\n      }\n\n      let temp = rotateLeft(A, by: 5) &+ f &+ E &+ M[j] &+ k\n      E = D\n      D = C\n      C = rotateLeft(B, by: 30)\n      B = A\n      A = temp\n    }\n\n    hh[0] = hh[0] &+ A\n    hh[1] = hh[1] &+ B\n    hh[2] = hh[2] &+ C\n    hh[3] = hh[3] &+ D\n    hh[4] = hh[4] &+ E\n  }\n}\n\nextension SHA1: Updatable {\n  @discardableResult @inlinable\n  public func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = false) throws -> Array<UInt8> {\n    self.accumulated += bytes\n\n    if isLast {\n      let lengthInBits = (processedBytesTotalCount + self.accumulated.count) * 8\n      let lengthBytes = lengthInBits.bytes(totalBytes: 64 / 8) // A 64-bit representation of b\n\n      // Step 1. Append padding\n      bitPadding(to: &self.accumulated, blockSize: SHA1.blockSize, allowance: 64 / 8)\n\n      // Step 2. Append Length a 64-bit representation of lengthInBits\n      self.accumulated += lengthBytes\n    }\n\n    var processedBytes = 0\n    for chunk in self.accumulated.batched(by: SHA1.blockSize) {\n      if isLast || (self.accumulated.count - processedBytes) >= SHA1.blockSize {\n        self.process(block: chunk, currentHash: &self.accumulatedHash)\n        processedBytes += chunk.count\n      }\n    }\n    self.accumulated.removeFirst(processedBytes)\n    self.processedBytesTotalCount += processedBytes\n\n    // output current hash\n    var result = Array<UInt8>(repeating: 0, count: SHA1.digestLength)\n    var pos = 0\n    for idx in 0..<self.accumulatedHash.count {\n      let h = self.accumulatedHash[idx]\n      result[pos + 0] = UInt8((h >> 24) & 0xff)\n      result[pos + 1] = UInt8((h >> 16) & 0xff)\n      result[pos + 2] = UInt8((h >> 8) & 0xff)\n      result[pos + 3] = UInt8(h & 0xff)\n      pos += 4\n    }\n\n    // reset hash value for instance\n    if isLast {\n      self.accumulatedHash = SHA1.hashInitialValue\n    }\n\n    return result\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/SHA2.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  TODO: generic for process32/64 (UInt32/UInt64)\n//\n\npublic final class SHA2: DigestType {\n  @usableFromInline\n  let variant: Variant\n\n  @usableFromInline\n  let size: Int\n\n  @usableFromInline\n  let blockSize: Int\n\n  @usableFromInline\n  let digestLength: Int\n\n  private let k: Array<UInt64>\n\n  @usableFromInline\n  var accumulated = Array<UInt8>()\n\n  @usableFromInline\n  var processedBytesTotalCount: Int = 0\n\n  @usableFromInline\n  var accumulatedHash32 = Array<UInt32>()\n\n  @usableFromInline\n  var accumulatedHash64 = Array<UInt64>()\n\n  @frozen\n  public enum Variant: RawRepresentable {\n    case sha224, sha256, sha384, sha512\n\n    public var digestLength: Int {\n      self.rawValue / 8\n    }\n\n    public var blockSize: Int {\n      switch self {\n        case .sha224, .sha256:\n          return 64\n        case .sha384, .sha512:\n          return 128\n      }\n    }\n\n    public typealias RawValue = Int\n    public var rawValue: RawValue {\n      switch self {\n        case .sha224:\n          return 224\n        case .sha256:\n          return 256\n        case .sha384:\n          return 384\n        case .sha512:\n          return 512\n      }\n    }\n\n    public init?(rawValue: RawValue) {\n      switch rawValue {\n        case 224:\n          self = .sha224\n        case 256:\n          self = .sha256\n        case 384:\n          self = .sha384\n        case 512:\n          self = .sha512\n        default:\n          return nil\n      }\n    }\n\n    @usableFromInline\n    var h: Array<UInt64> {\n      switch self {\n        case .sha224:\n          return [0xc1059ed8, 0x367cd507, 0x3070dd17, 0xf70e5939, 0xffc00b31, 0x68581511, 0x64f98fa7, 0xbefa4fa4]\n        case .sha256:\n          return [0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a, 0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19]\n        case .sha384:\n          return [0xcbbb9d5dc1059ed8, 0x629a292a367cd507, 0x9159015a3070dd17, 0x152fecd8f70e5939, 0x67332667ffc00b31, 0x8eb44a8768581511, 0xdb0c2e0d64f98fa7, 0x47b5481dbefa4fa4]\n        case .sha512:\n          return [0x6a09e667f3bcc908, 0xbb67ae8584caa73b, 0x3c6ef372fe94f82b, 0xa54ff53a5f1d36f1, 0x510e527fade682d1, 0x9b05688c2b3e6c1f, 0x1f83d9abfb41bd6b, 0x5be0cd19137e2179]\n      }\n    }\n\n    @usableFromInline\n    var finalLength: Int {\n      switch self {\n        case .sha224:\n          return 7\n        case .sha384:\n          return 6\n        default:\n          return Int.max\n      }\n    }\n  }\n\n  public init(variant: SHA2.Variant) {\n    self.variant = variant\n    switch self.variant {\n      case .sha224, .sha256:\n        self.accumulatedHash32 = variant.h.map { UInt32($0) } // FIXME: UInt64 for process64\n        self.blockSize = variant.blockSize\n        self.size = variant.rawValue\n        self.digestLength = variant.digestLength\n        self.k = [\n          0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1, 0x923f82a4, 0xab1c5ed5,\n          0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3, 0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174,\n          0xe49b69c1, 0xefbe4786, 0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,\n          0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147, 0x06ca6351, 0x14292967,\n          0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13, 0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85,\n          0xa2bfe8a1, 0xa81a664b, 0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,\n          0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a, 0x5b9cca4f, 0x682e6ff3,\n          0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208, 0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2\n        ]\n      case .sha384, .sha512:\n        self.accumulatedHash64 = variant.h\n        self.blockSize = variant.blockSize\n        self.size = variant.rawValue\n        self.digestLength = variant.digestLength\n        self.k = [\n          0x428a2f98d728ae22, 0x7137449123ef65cd, 0xb5c0fbcfec4d3b2f, 0xe9b5dba58189dbbc, 0x3956c25bf348b538,\n          0x59f111f1b605d019, 0x923f82a4af194f9b, 0xab1c5ed5da6d8118, 0xd807aa98a3030242, 0x12835b0145706fbe,\n          0x243185be4ee4b28c, 0x550c7dc3d5ffb4e2, 0x72be5d74f27b896f, 0x80deb1fe3b1696b1, 0x9bdc06a725c71235,\n          0xc19bf174cf692694, 0xe49b69c19ef14ad2, 0xefbe4786384f25e3, 0x0fc19dc68b8cd5b5, 0x240ca1cc77ac9c65,\n          0x2de92c6f592b0275, 0x4a7484aa6ea6e483, 0x5cb0a9dcbd41fbd4, 0x76f988da831153b5, 0x983e5152ee66dfab,\n          0xa831c66d2db43210, 0xb00327c898fb213f, 0xbf597fc7beef0ee4, 0xc6e00bf33da88fc2, 0xd5a79147930aa725,\n          0x06ca6351e003826f, 0x142929670a0e6e70, 0x27b70a8546d22ffc, 0x2e1b21385c26c926, 0x4d2c6dfc5ac42aed,\n          0x53380d139d95b3df, 0x650a73548baf63de, 0x766a0abb3c77b2a8, 0x81c2c92e47edaee6, 0x92722c851482353b,\n          0xa2bfe8a14cf10364, 0xa81a664bbc423001, 0xc24b8b70d0f89791, 0xc76c51a30654be30, 0xd192e819d6ef5218,\n          0xd69906245565a910, 0xf40e35855771202a, 0x106aa07032bbd1b8, 0x19a4c116b8d2d0c8, 0x1e376c085141ab53,\n          0x2748774cdf8eeb99, 0x34b0bcb5e19b48a8, 0x391c0cb3c5c95a63, 0x4ed8aa4ae3418acb, 0x5b9cca4f7763e373,\n          0x682e6ff3d6b2b8a3, 0x748f82ee5defb2fc, 0x78a5636f43172f60, 0x84c87814a1f0ab72, 0x8cc702081a6439ec,\n          0x90befffa23631e28, 0xa4506cebde82bde9, 0xbef9a3f7b2c67915, 0xc67178f2e372532b, 0xca273eceea26619c,\n          0xd186b8c721c0c207, 0xeada7dd6cde0eb1e, 0xf57d4f7fee6ed178, 0x06f067aa72176fba, 0x0a637dc5a2c898a6,\n          0x113f9804bef90dae, 0x1b710b35131c471b, 0x28db77f523047d84, 0x32caab7b40c72493, 0x3c9ebe0a15c9bebc,\n          0x431d67c49c100d4c, 0x4cc5d4becb3e42b6, 0x597f299cfc657e2a, 0x5fcb6fab3ad6faec, 0x6c44198c4a475817\n        ]\n    }\n  }\n\n  @inlinable\n  public func calculate(for bytes: Array<UInt8>) -> Array<UInt8> {\n    do {\n      return try update(withBytes: bytes.slice, isLast: true)\n    } catch {\n      return []\n    }\n  }\n\n  public func callAsFunction(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    calculate(for: bytes)\n  }\n\n  @usableFromInline\n  func process64(block chunk: ArraySlice<UInt8>, currentHash hh: inout Array<UInt64>) {\n    // break chunk into sixteen 64-bit words M[j], 0 ≤ j ≤ 15, big-endian\n    // Extend the sixteen 64-bit words into eighty 64-bit words:\n    let M = UnsafeMutablePointer<UInt64>.allocate(capacity: self.k.count)\n    M.initialize(repeating: 0, count: self.k.count)\n    defer {\n      M.deinitialize(count: self.k.count)\n      M.deallocate()\n    }\n    for x in 0..<self.k.count {\n      switch x {\n        case 0...15:\n          let start = chunk.startIndex.advanced(by: x * 8) // * MemoryLayout<UInt64>.size\n          M[x] = UInt64(bytes: chunk, fromIndex: start)\n        default:\n          let s0 = rotateRight(M[x - 15], by: 1) ^ rotateRight(M[x - 15], by: 8) ^ (M[x - 15] >> 7)\n          let s1 = rotateRight(M[x - 2], by: 19) ^ rotateRight(M[x - 2], by: 61) ^ (M[x - 2] >> 6)\n          M[x] = M[x - 16] &+ s0 &+ M[x - 7] &+ s1\n      }\n    }\n\n    var A = hh[0]\n    var B = hh[1]\n    var C = hh[2]\n    var D = hh[3]\n    var E = hh[4]\n    var F = hh[5]\n    var G = hh[6]\n    var H = hh[7]\n\n    // Main loop\n    for j in 0..<self.k.count {\n      let s0 = rotateRight(A, by: 28) ^ rotateRight(A, by: 34) ^ rotateRight(A, by: 39)\n      let maj = (A & B) ^ (A & C) ^ (B & C)\n      let t2 = s0 &+ maj\n      let s1 = rotateRight(E, by: 14) ^ rotateRight(E, by: 18) ^ rotateRight(E, by: 41)\n      let ch = (E & F) ^ ((~E) & G)\n      let t1 = H &+ s1 &+ ch &+ self.k[j] &+ UInt64(M[j])\n\n      H = G\n      G = F\n      F = E\n      E = D &+ t1\n      D = C\n      C = B\n      B = A\n      A = t1 &+ t2\n    }\n\n    hh[0] = (hh[0] &+ A)\n    hh[1] = (hh[1] &+ B)\n    hh[2] = (hh[2] &+ C)\n    hh[3] = (hh[3] &+ D)\n    hh[4] = (hh[4] &+ E)\n    hh[5] = (hh[5] &+ F)\n    hh[6] = (hh[6] &+ G)\n    hh[7] = (hh[7] &+ H)\n  }\n\n  // mutating currentHash in place is way faster than returning new result\n  @usableFromInline\n  func process32(block chunk: ArraySlice<UInt8>, currentHash hh: inout Array<UInt32>) {\n    // break chunk into sixteen 32-bit words M[j], 0 ≤ j ≤ 15, big-endian\n    // Extend the sixteen 32-bit words into sixty-four 32-bit words:\n    let M = UnsafeMutablePointer<UInt32>.allocate(capacity: self.k.count)\n    M.initialize(repeating: 0, count: self.k.count)\n    defer {\n      M.deinitialize(count: self.k.count)\n      M.deallocate()\n    }\n\n    for x in 0..<self.k.count {\n      switch x {\n        case 0...15:\n          let start = chunk.startIndex.advanced(by: x * 4) // * MemoryLayout<UInt32>.size\n          M[x] = UInt32(bytes: chunk, fromIndex: start)\n        default:\n          let s0 = rotateRight(M[x - 15], by: 7) ^ rotateRight(M[x - 15], by: 18) ^ (M[x - 15] >> 3)\n          let s1 = rotateRight(M[x - 2], by: 17) ^ rotateRight(M[x - 2], by: 19) ^ (M[x - 2] >> 10)\n          M[x] = M[x - 16] &+ s0 &+ M[x - 7] &+ s1\n      }\n    }\n\n    var A = hh[0]\n    var B = hh[1]\n    var C = hh[2]\n    var D = hh[3]\n    var E = hh[4]\n    var F = hh[5]\n    var G = hh[6]\n    var H = hh[7]\n\n    // Main loop\n    for j in 0..<self.k.count {\n      let s0 = rotateRight(A, by: 2) ^ rotateRight(A, by: 13) ^ rotateRight(A, by: 22)\n      let maj = (A & B) ^ (A & C) ^ (B & C)\n      let t2 = s0 &+ maj\n      let s1 = rotateRight(E, by: 6) ^ rotateRight(E, by: 11) ^ rotateRight(E, by: 25)\n      let ch = (E & F) ^ ((~E) & G)\n      let t1 = H &+ s1 &+ ch &+ UInt32(self.k[j]) &+ M[j]\n\n      H = G\n      G = F\n      F = E\n      E = D &+ t1\n      D = C\n      C = B\n      B = A\n      A = t1 &+ t2\n    }\n\n    hh[0] = hh[0] &+ A\n    hh[1] = hh[1] &+ B\n    hh[2] = hh[2] &+ C\n    hh[3] = hh[3] &+ D\n    hh[4] = hh[4] &+ E\n    hh[5] = hh[5] &+ F\n    hh[6] = hh[6] &+ G\n    hh[7] = hh[7] &+ H\n  }\n}\n\nextension SHA2: Updatable {\n\n  @inlinable\n  public func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = false) throws -> Array<UInt8> {\n    self.accumulated += bytes\n\n    if isLast {\n      let lengthInBits = (processedBytesTotalCount + self.accumulated.count) * 8\n      let lengthBytes = lengthInBits.bytes(totalBytes: self.blockSize / 8) // A 64-bit/128-bit representation of b. blockSize fit by accident.\n\n      // Step 1. Append padding\n      bitPadding(to: &self.accumulated, blockSize: self.blockSize, allowance: self.blockSize / 8)\n\n      // Step 2. Append Length a 64-bit representation of lengthInBits\n      self.accumulated += lengthBytes\n    }\n\n    var processedBytes = 0\n    for chunk in self.accumulated.batched(by: self.blockSize) {\n      if isLast || (self.accumulated.count - processedBytes) >= self.blockSize {\n        switch self.variant {\n          case .sha224, .sha256:\n            self.process32(block: chunk, currentHash: &self.accumulatedHash32)\n          case .sha384, .sha512:\n            self.process64(block: chunk, currentHash: &self.accumulatedHash64)\n          }\n        processedBytes += chunk.count\n      }\n    }\n    self.accumulated.removeFirst(processedBytes)\n    self.processedBytesTotalCount += processedBytes\n\n    // output current hash\n    var result = Array<UInt8>(repeating: 0, count: variant.digestLength)\n    switch self.variant {\n      case .sha224, .sha256:\n        var pos = 0\n        for idx in 0..<self.accumulatedHash32.count where idx < self.variant.finalLength {\n          let h = accumulatedHash32[idx]\n          result[pos + 0] = UInt8((h >> 24) & 0xff)\n          result[pos + 1] = UInt8((h >> 16) & 0xff)\n          result[pos + 2] = UInt8((h >> 8) & 0xff)\n          result[pos + 3] = UInt8(h & 0xff)\n          pos += 4\n        }\n      case .sha384, .sha512:\n        var pos = 0\n        for idx in 0..<self.accumulatedHash64.count where idx < self.variant.finalLength {\n          let h = accumulatedHash64[idx]\n          result[pos + 0] = UInt8((h >> 56) & 0xff)\n          result[pos + 1] = UInt8((h >> 48) & 0xff)\n          result[pos + 2] = UInt8((h >> 40) & 0xff)\n          result[pos + 3] = UInt8((h >> 32) & 0xff)\n          result[pos + 4] = UInt8((h >> 24) & 0xff)\n          result[pos + 5] = UInt8((h >> 16) & 0xff)\n          result[pos + 6] = UInt8((h >> 8) & 0xff)\n          result[pos + 7] = UInt8(h & 0xff)\n          pos += 8\n        }\n    }\n\n    // reset hash value for instance\n    if isLast {\n      switch self.variant {\n        case .sha224, .sha256:\n          self.accumulatedHash32 = self.variant.h.lazy.map { UInt32($0) } // FIXME: UInt64 for process64\n        case .sha384, .sha512:\n          self.accumulatedHash64 = self.variant.h\n      }\n    }\n\n    return result\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/SHA3.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//  http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf\n//  http://keccak.noekeon.org/specs_summary.html\n//\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(ucrt)\nimport ucrt\n#endif\n\npublic final class SHA3: DigestType {\n  let round_constants: Array<UInt64> = [\n    0x0000000000000001, 0x0000000000008082, 0x800000000000808a, 0x8000000080008000,\n    0x000000000000808b, 0x0000000080000001, 0x8000000080008081, 0x8000000000008009,\n    0x000000000000008a, 0x0000000000000088, 0x0000000080008009, 0x000000008000000a,\n    0x000000008000808b, 0x800000000000008b, 0x8000000000008089, 0x8000000000008003,\n    0x8000000000008002, 0x8000000000000080, 0x000000000000800a, 0x800000008000000a,\n    0x8000000080008081, 0x8000000000008080, 0x0000000080000001, 0x8000000080008008\n  ]\n\n  public let blockSize: Int\n  public let digestLength: Int\n  public let markByte: UInt8\n\n  @usableFromInline\n  var accumulated = Array<UInt8>()\n\n\n  @usableFromInline\n  var accumulatedHash: Array<UInt64>\n\n  public enum Variant {\n    case sha224, sha256, sha384, sha512, keccak224, keccak256, keccak384, keccak512\n\n    var digestLength: Int {\n      100 - (self.blockSize / 2)\n    }\n\n    var blockSize: Int {\n      (1600 - self.outputLength * 2) / 8\n    }\n\n    var markByte: UInt8 {\n      switch self {\n        case .sha224, .sha256, .sha384, .sha512:\n          return 0x06 // 0x1F for SHAKE\n        case .keccak224, .keccak256, .keccak384, .keccak512:\n          return 0x01\n      }\n    }\n\n    public var outputLength: Int {\n      switch self {\n        case .sha224, .keccak224:\n          return 224\n        case .sha256, .keccak256:\n          return 256\n        case .sha384, .keccak384:\n          return 384\n        case .sha512, .keccak512:\n          return 512\n      }\n    }\n  }\n\n  public init(variant: SHA3.Variant) {\n    self.blockSize = variant.blockSize\n    self.digestLength = variant.digestLength\n    self.markByte = variant.markByte\n    self.accumulatedHash = Array<UInt64>(repeating: 0, count: self.digestLength)\n  }\n\n  @inlinable\n  public func calculate(for bytes: Array<UInt8>) -> Array<UInt8> {\n    do {\n      return try update(withBytes: bytes.slice, isLast: true)\n    } catch {\n      return []\n    }\n  }\n\n  public func callAsFunction(_ bytes: Array<UInt8>) -> Array<UInt8> {\n    calculate(for: bytes)\n  }\n\n  ///  1. For all pairs (x,z) such that 0≤x<5 and 0≤z<w, let\n  ///     C[x,z]=A[x, 0,z] ⊕ A[x, 1,z] ⊕ A[x, 2,z] ⊕ A[x, 3,z] ⊕ A[x, 4,z].\n  ///  2. For all pairs (x, z) such that 0≤x<5 and 0≤z<w let\n  ///     D[x,z]=C[(x1) mod 5, z] ⊕ C[(x+1) mod 5, (z –1) mod w].\n  ///  3. For all triples (x, y, z) such that 0≤x<5, 0≤y<5, and 0≤z<w, let\n  ///     A′[x, y,z] = A[x, y,z] ⊕ D[x,z].\n  private func θ(_ a: inout Array<UInt64>) {\n    let c = UnsafeMutablePointer<UInt64>.allocate(capacity: 5)\n    c.initialize(repeating: 0, count: 5)\n    defer {\n      c.deinitialize(count: 5)\n      c.deallocate()\n    }\n    let d = UnsafeMutablePointer<UInt64>.allocate(capacity: 5)\n    d.initialize(repeating: 0, count: 5)\n    defer {\n      d.deinitialize(count: 5)\n      d.deallocate()\n    }\n\n    for i in 0..<5 {\n      c[i] = a[i] ^ a[i &+ 5] ^ a[i &+ 10] ^ a[i &+ 15] ^ a[i &+ 20]\n    }\n\n    d[0] = rotateLeft(c[1], by: 1) ^ c[4]\n    d[1] = rotateLeft(c[2], by: 1) ^ c[0]\n    d[2] = rotateLeft(c[3], by: 1) ^ c[1]\n    d[3] = rotateLeft(c[4], by: 1) ^ c[2]\n    d[4] = rotateLeft(c[0], by: 1) ^ c[3]\n\n    for i in 0..<5 {\n      a[i] ^= d[i]\n      a[i &+ 5] ^= d[i]\n      a[i &+ 10] ^= d[i]\n      a[i &+ 15] ^= d[i]\n      a[i &+ 20] ^= d[i]\n    }\n  }\n\n  /// A′[x, y, z]=A[(x &+ 3y) mod 5, x, z]\n  private func π(_ a: inout Array<UInt64>) {\n    let a1 = a[1]\n    a[1] = a[6]\n    a[6] = a[9]\n    a[9] = a[22]\n    a[22] = a[14]\n    a[14] = a[20]\n    a[20] = a[2]\n    a[2] = a[12]\n    a[12] = a[13]\n    a[13] = a[19]\n    a[19] = a[23]\n    a[23] = a[15]\n    a[15] = a[4]\n    a[4] = a[24]\n    a[24] = a[21]\n    a[21] = a[8]\n    a[8] = a[16]\n    a[16] = a[5]\n    a[5] = a[3]\n    a[3] = a[18]\n    a[18] = a[17]\n    a[17] = a[11]\n    a[11] = a[7]\n    a[7] = a[10]\n    a[10] = a1\n  }\n\n  /// For all triples (x, y, z) such that 0≤x<5, 0≤y<5, and 0≤z<w, let\n  /// A′[x, y,z] = A[x, y,z] ⊕ ((A[(x+1) mod 5, y, z] ⊕ 1) ⋅ A[(x+2) mod 5, y, z])\n  private func χ(_ a: inout Array<UInt64>) {\n    for i in stride(from: 0, to: 25, by: 5) {\n      let a0 = a[0 &+ i]\n      let a1 = a[1 &+ i]\n      a[0 &+ i] ^= ~a1 & a[2 &+ i]\n      a[1 &+ i] ^= ~a[2 &+ i] & a[3 &+ i]\n      a[2 &+ i] ^= ~a[3 &+ i] & a[4 &+ i]\n      a[3 &+ i] ^= ~a[4 &+ i] & a0\n      a[4 &+ i] ^= ~a0 & a1\n    }\n  }\n\n  private func ι(_ a: inout Array<UInt64>, round: Int) {\n    a[0] ^= self.round_constants[round]\n  }\n\n  @usableFromInline\n  func process(block chunk: ArraySlice<UInt64>, currentHash hh: inout Array<UInt64>) {\n    // expand\n    hh[0] ^= chunk[0].littleEndian\n    hh[1] ^= chunk[1].littleEndian\n    hh[2] ^= chunk[2].littleEndian\n    hh[3] ^= chunk[3].littleEndian\n    hh[4] ^= chunk[4].littleEndian\n    hh[5] ^= chunk[5].littleEndian\n    hh[6] ^= chunk[6].littleEndian\n    hh[7] ^= chunk[7].littleEndian\n    hh[8] ^= chunk[8].littleEndian\n    if self.blockSize > 72 { // 72 / 8, sha-512\n      hh[9] ^= chunk[9].littleEndian\n      hh[10] ^= chunk[10].littleEndian\n      hh[11] ^= chunk[11].littleEndian\n      hh[12] ^= chunk[12].littleEndian\n      if self.blockSize > 104 { // 104 / 8, sha-384\n        hh[13] ^= chunk[13].littleEndian\n        hh[14] ^= chunk[14].littleEndian\n        hh[15] ^= chunk[15].littleEndian\n        hh[16] ^= chunk[16].littleEndian\n        if self.blockSize > 136 { // 136 / 8, sha-256\n          hh[17] ^= chunk[17].littleEndian\n          // FULL_SHA3_FAMILY_SUPPORT\n          if self.blockSize > 144 { // 144 / 8, sha-224\n            hh[18] ^= chunk[18].littleEndian\n            hh[19] ^= chunk[19].littleEndian\n            hh[20] ^= chunk[20].littleEndian\n            hh[21] ^= chunk[21].littleEndian\n            hh[22] ^= chunk[22].littleEndian\n            hh[23] ^= chunk[23].littleEndian\n            hh[24] ^= chunk[24].littleEndian\n          }\n        }\n      }\n    }\n\n    // Keccak-f\n    for round in 0..<24 {\n      self.θ(&hh)\n\n      hh[1] = rotateLeft(hh[1], by: 1)\n      hh[2] = rotateLeft(hh[2], by: 62)\n      hh[3] = rotateLeft(hh[3], by: 28)\n      hh[4] = rotateLeft(hh[4], by: 27)\n      hh[5] = rotateLeft(hh[5], by: 36)\n      hh[6] = rotateLeft(hh[6], by: 44)\n      hh[7] = rotateLeft(hh[7], by: 6)\n      hh[8] = rotateLeft(hh[8], by: 55)\n      hh[9] = rotateLeft(hh[9], by: 20)\n      hh[10] = rotateLeft(hh[10], by: 3)\n      hh[11] = rotateLeft(hh[11], by: 10)\n      hh[12] = rotateLeft(hh[12], by: 43)\n      hh[13] = rotateLeft(hh[13], by: 25)\n      hh[14] = rotateLeft(hh[14], by: 39)\n      hh[15] = rotateLeft(hh[15], by: 41)\n      hh[16] = rotateLeft(hh[16], by: 45)\n      hh[17] = rotateLeft(hh[17], by: 15)\n      hh[18] = rotateLeft(hh[18], by: 21)\n      hh[19] = rotateLeft(hh[19], by: 8)\n      hh[20] = rotateLeft(hh[20], by: 18)\n      hh[21] = rotateLeft(hh[21], by: 2)\n      hh[22] = rotateLeft(hh[22], by: 61)\n      hh[23] = rotateLeft(hh[23], by: 56)\n      hh[24] = rotateLeft(hh[24], by: 14)\n\n      self.π(&hh)\n      self.χ(&hh)\n      self.ι(&hh, round: round)\n    }\n  }\n}\n\nextension SHA3: Updatable {\n\n  @inlinable\n  public func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = false) throws -> Array<UInt8> {\n    self.accumulated += bytes\n\n    if isLast {\n      // Add padding\n      let markByteIndex = self.accumulated.count\n\n      // We need to always pad the input. Even if the input is a multiple of blockSize.\n      let r = self.blockSize * 8\n      let q = (r / 8) - (accumulated.count % (r / 8))\n      self.accumulated += Array<UInt8>(repeating: 0, count: q)\n\n      self.accumulated[markByteIndex] |= self.markByte\n      self.accumulated[self.accumulated.count - 1] |= 0x80\n    }\n\n    var processedBytes = 0\n    for chunk in self.accumulated.batched(by: self.blockSize) {\n      if isLast || (self.accumulated.count - processedBytes) >= self.blockSize {\n        self.process(block: chunk.toUInt64Array().slice, currentHash: &self.accumulatedHash)\n        processedBytes += chunk.count\n      }\n    }\n    self.accumulated.removeFirst(processedBytes)\n\n    // TODO: verify performance, reduce vs for..in\n    let result = self.accumulatedHash.reduce(into: Array<UInt8>()) { (result, value) in\n      result += value.bigEndian.bytes()\n    }\n\n    // reset hash value for instance\n    if isLast {\n      self.accumulatedHash = Array<UInt64>(repeating: 0, count: self.digestLength)\n    }\n\n    return Array(result[0..<self.digestLength])\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Scrypt.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n//\n// https://tools.ietf.org/html/rfc7914\n//\n\n/// Implementation of the scrypt key derivation function.\npublic final class Scrypt {\n  enum Error: Swift.Error {\n    case nIsTooLarge\n    case rIsTooLarge\n    case nMustBeAPowerOf2GreaterThan1\n    case invalidInput\n  }\n\n  /// Configuration parameters.\n  private let salt: SecureBytes\n  private let password: SecureBytes\n  private let blocksize: Int // 128 * r\n  private let salsaBlock = UnsafeMutableRawPointer.allocate(byteCount: 64, alignment: 64)\n  private let dkLen: Int\n  private let N: Int\n  private let r: Int\n  private let p: Int\n\n  /// - parameters:\n  ///   - password: password\n  ///   - salt: salt\n  ///   - dkLen: output length\n  ///   - N: determines extra memory used\n  ///   - r: determines a block size\n  ///   - p: determines parallelicity degree\n  public init(password: Array<UInt8>, salt: Array<UInt8>, dkLen: Int, N: Int, r: Int, p: Int) throws {\n    precondition(dkLen > 0)\n    precondition(N > 0)\n    precondition(r > 0)\n    precondition(p > 0)\n\n    guard !(N < 2 || (N & (N - 1)) != 0) else { throw Error.nMustBeAPowerOf2GreaterThan1 }\n\n    guard N <= .max / 128 / r else { throw Error.nIsTooLarge }\n    guard r <= .max / 128 / p else { throw Error.rIsTooLarge }\n\n    guard !salt.isEmpty else {\n      throw Error.invalidInput\n    }\n\n    self.blocksize = 128 * r\n    self.N = N\n    self.r = r\n    self.p = p\n    self.password = SecureBytes(bytes: password)\n    self.salt = SecureBytes(bytes: salt)\n    self.dkLen = dkLen\n  }\n\n  deinit {\n    salsaBlock.deallocate()\n  }\n\n  /// Runs the key derivation function with a specific password.\n  public func calculate() throws -> [UInt8] {\n    // Allocate memory (as bytes for now) for further use in mixing steps\n    let B = UnsafeMutableRawPointer.allocate(byteCount: 128 * self.r * self.p, alignment: 64)\n    let XY = UnsafeMutableRawPointer.allocate(byteCount: 256 * self.r + 64, alignment: 64)\n    let V = UnsafeMutableRawPointer.allocate(byteCount: 128 * self.r * self.N, alignment: 64)\n\n    // Deallocate memory when done\n    defer {\n      B.deallocate()\n      XY.deallocate()\n      V.deallocate()\n    }\n\n    /* 1: (B_0 ... B_{p-1}) <-- PBKDF2(P, S, 1, p * MFLen) */\n    // Expand the initial key\n    let barray = try PKCS5.PBKDF2(password: Array(self.password), salt: Array(self.salt), iterations: 1, keyLength: self.p * 128 * self.r, variant: .sha2(.sha256)).calculate()\n    barray.withUnsafeBytes { bufferPointer in\n      guard let baseAddress = bufferPointer.baseAddress else { return }\n      B.copyMemory(from: baseAddress, byteCount: barray.count)\n    }\n\n    /* 2: for i = 0 to p - 1 do */\n    // do the mixing\n    for i in 0 ..< self.p {\n      /* 3: B_i <-- MF(B_i, N) */\n      smix(B + i * 128 * self.r, V.assumingMemoryBound(to: UInt32.self), XY.assumingMemoryBound(to: UInt32.self))\n    }\n\n    /* 5: DK <-- PBKDF2(P, B, 1, dkLen) */\n    let pointer = B.assumingMemoryBound(to: UInt8.self)\n    let bufferPointer = UnsafeBufferPointer(start: pointer, count: p * 128 * self.r)\n    let block = [UInt8](bufferPointer)\n    return try PKCS5.PBKDF2(password: Array(self.password), salt: block, iterations: 1, keyLength: self.dkLen, variant: .sha2(.sha256)).calculate()\n  }\n\n  public func callAsFunction() throws -> Array<UInt8> {\n    try calculate()\n  }\n\n}\n\nprivate extension Scrypt {\n  /// Computes `B = SMix_r(B, N)`.\n  ///\n  /// The input `block` must be `128*r` bytes in length; the temporary storage `v` must be `128*r*n` bytes in length;\n  /// the temporary storage `xy` must be `256*r + 64` bytes in length. The arrays `block`, `v`, and `xy` must be\n  /// aligned to a multiple of 64 bytes.\n  @inline(__always) func smix(_ block: UnsafeMutableRawPointer, _ v: UnsafeMutablePointer<UInt32>, _ xy: UnsafeMutablePointer<UInt32>) {\n    let X = xy\n    let Y = xy + 32 * self.r\n    let Z = xy + 64 * self.r\n\n    /* 1: X <-- B */\n    let typedBlock = block.assumingMemoryBound(to: UInt32.self)\n#if compiler(>=5.8)\n    X.update(from: typedBlock, count: 32 * self.r)\n#else\n    X.assign(from: typedBlock, count: 32 * self.r)\n#endif\n\n    /* 2: for i = 0 to N - 1 do */\n    for i in stride(from: 0, to: self.N, by: 2) {\n      /* 3: V_i <-- X */\n      UnsafeMutableRawPointer(v + i * (32 * self.r)).copyMemory(from: X, byteCount: 128 * self.r)\n\n      /* 4: X <-- H(X) */\n      self.blockMixSalsa8(X, Y, Z)\n\n      /* 3: V_i <-- X */\n      UnsafeMutableRawPointer(v + (i + 1) * (32 * self.r)).copyMemory(from: Y, byteCount: 128 * self.r)\n\n      /* 4: X <-- H(X) */\n      self.blockMixSalsa8(Y, X, Z)\n    }\n\n    /* 6: for i = 0 to N - 1 do */\n    for _ in stride(from: 0, to: self.N, by: 2) {\n      /*\n       7: j <-- Integerify (X) mod N\n       where Integerify (B[0] ... B[2 * r - 1]) is defined\n       as the result of interpreting B[2 * r - 1] as a little-endian integer.\n       */\n      var j = Int(integerify(X) & UInt64(self.N - 1))\n\n      /* 8: X <-- H(X \\xor V_j) */\n      self.blockXor(X, v + j * 32 * self.r, 128 * self.r)\n      self.blockMixSalsa8(X, Y, Z)\n\n      /* 7: j <-- Integerify(X) mod N */\n      j = Int(self.integerify(Y) & UInt64(self.N - 1))\n\n      /* 8: X <-- H(X \\xor V_j) */\n      self.blockXor(Y, v + j * 32 * self.r, 128 * self.r)\n      self.blockMixSalsa8(Y, X, Z)\n    }\n\n    /* 10: B' <-- X */\n    for k in 0 ..< 32 * self.r {\n      UnsafeMutableRawPointer(block + 4 * k).storeBytes(of: X[k], as: UInt32.self)\n    }\n  }\n\n  /// Returns the result of parsing `B_{2r-1}` as a little-endian integer.\n  @inline(__always) func integerify(_ block: UnsafeRawPointer) -> UInt64 {\n    let bi = block + (2 * self.r - 1) * 64\n    return bi.load(as: UInt64.self).littleEndian\n  }\n\n  /// Compute `bout = BlockMix_{salsa20/8, r}(bin)`.\n  ///\n  /// The input `bin` must be `128*r` bytes in length; the output `bout` must also be the same size. The temporary\n  /// space `x` must be 64 bytes.\n  @inline(__always) func blockMixSalsa8(_ bin: UnsafePointer<UInt32>, _ bout: UnsafeMutablePointer<UInt32>, _ x: UnsafeMutablePointer<UInt32>) {\n    /* 1: X <-- B_{2r - 1} */\n    UnsafeMutableRawPointer(x).copyMemory(from: bin + (2 * self.r - 1) * 16, byteCount: 64)\n\n    /* 2: for i = 0 to 2r - 1 do */\n    for i in stride(from: 0, to: 2 * self.r, by: 2) {\n      /* 3: X <-- H(X \\xor B_i) */\n      self.blockXor(x, bin + i * 16, 64)\n      self.salsa20_8_typed(x)\n\n      /* 4: Y_i <-- X */\n      /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */\n      UnsafeMutableRawPointer(bout + i * 8).copyMemory(from: x, byteCount: 64)\n\n      /* 3: X <-- H(X \\xor B_i) */\n      self.blockXor(x, bin + i * 16 + 16, 64)\n      self.salsa20_8_typed(x)\n\n      /* 4: Y_i <-- X */\n      /* 6: B' <-- (Y_0, Y_2 ... Y_{2r-2}, Y_1, Y_3 ... Y_{2r-1}) */\n      UnsafeMutableRawPointer(bout + i * 8 + self.r * 16).copyMemory(from: x, byteCount: 64)\n    }\n  }\n\n  @inline(__always) func salsa20_8_typed(_ block: UnsafeMutablePointer<UInt32>) {\n    self.salsaBlock.copyMemory(from: UnsafeRawPointer(block), byteCount: 64)\n    let salsaBlockTyped = self.salsaBlock.assumingMemoryBound(to: UInt32.self)\n\n    for _ in stride(from: 0, to: 8, by: 2) {\n      salsaBlockTyped[4] ^= rotateLeft(salsaBlockTyped[0] &+ salsaBlockTyped[12], by: 7)\n      salsaBlockTyped[8] ^= rotateLeft(salsaBlockTyped[4] &+ salsaBlockTyped[0], by: 9)\n      salsaBlockTyped[12] ^= rotateLeft(salsaBlockTyped[8] &+ salsaBlockTyped[4], by: 13)\n      salsaBlockTyped[0] ^= rotateLeft(salsaBlockTyped[12] &+ salsaBlockTyped[8], by: 18)\n\n      salsaBlockTyped[9] ^= rotateLeft(salsaBlockTyped[5] &+ salsaBlockTyped[1], by: 7)\n      salsaBlockTyped[13] ^= rotateLeft(salsaBlockTyped[9] &+ salsaBlockTyped[5], by: 9)\n      salsaBlockTyped[1] ^= rotateLeft(salsaBlockTyped[13] &+ salsaBlockTyped[9], by: 13)\n      salsaBlockTyped[5] ^= rotateLeft(salsaBlockTyped[1] &+ salsaBlockTyped[13], by: 18)\n\n      salsaBlockTyped[14] ^= rotateLeft(salsaBlockTyped[10] &+ salsaBlockTyped[6], by: 7)\n      salsaBlockTyped[2] ^= rotateLeft(salsaBlockTyped[14] &+ salsaBlockTyped[10], by: 9)\n      salsaBlockTyped[6] ^= rotateLeft(salsaBlockTyped[2] &+ salsaBlockTyped[14], by: 13)\n      salsaBlockTyped[10] ^= rotateLeft(salsaBlockTyped[6] &+ salsaBlockTyped[2], by: 18)\n\n      salsaBlockTyped[3] ^= rotateLeft(salsaBlockTyped[15] &+ salsaBlockTyped[11], by: 7)\n      salsaBlockTyped[7] ^= rotateLeft(salsaBlockTyped[3] &+ salsaBlockTyped[15], by: 9)\n      salsaBlockTyped[11] ^= rotateLeft(salsaBlockTyped[7] &+ salsaBlockTyped[3], by: 13)\n      salsaBlockTyped[15] ^= rotateLeft(salsaBlockTyped[11] &+ salsaBlockTyped[7], by: 18)\n\n      salsaBlockTyped[1] ^= rotateLeft(salsaBlockTyped[0] &+ salsaBlockTyped[3], by: 7)\n      salsaBlockTyped[2] ^= rotateLeft(salsaBlockTyped[1] &+ salsaBlockTyped[0], by: 9)\n      salsaBlockTyped[3] ^= rotateLeft(salsaBlockTyped[2] &+ salsaBlockTyped[1], by: 13)\n      salsaBlockTyped[0] ^= rotateLeft(salsaBlockTyped[3] &+ salsaBlockTyped[2], by: 18)\n\n      salsaBlockTyped[6] ^= rotateLeft(salsaBlockTyped[5] &+ salsaBlockTyped[4], by: 7)\n      salsaBlockTyped[7] ^= rotateLeft(salsaBlockTyped[6] &+ salsaBlockTyped[5], by: 9)\n      salsaBlockTyped[4] ^= rotateLeft(salsaBlockTyped[7] &+ salsaBlockTyped[6], by: 13)\n      salsaBlockTyped[5] ^= rotateLeft(salsaBlockTyped[4] &+ salsaBlockTyped[7], by: 18)\n\n      salsaBlockTyped[11] ^= rotateLeft(salsaBlockTyped[10] &+ salsaBlockTyped[9], by: 7)\n      salsaBlockTyped[8] ^= rotateLeft(salsaBlockTyped[11] &+ salsaBlockTyped[10], by: 9)\n      salsaBlockTyped[9] ^= rotateLeft(salsaBlockTyped[8] &+ salsaBlockTyped[11], by: 13)\n      salsaBlockTyped[10] ^= rotateLeft(salsaBlockTyped[9] &+ salsaBlockTyped[8], by: 18)\n\n      salsaBlockTyped[12] ^= rotateLeft(salsaBlockTyped[15] &+ salsaBlockTyped[14], by: 7)\n      salsaBlockTyped[13] ^= rotateLeft(salsaBlockTyped[12] &+ salsaBlockTyped[15], by: 9)\n      salsaBlockTyped[14] ^= rotateLeft(salsaBlockTyped[13] &+ salsaBlockTyped[12], by: 13)\n      salsaBlockTyped[15] ^= rotateLeft(salsaBlockTyped[14] &+ salsaBlockTyped[13], by: 18)\n    }\n    for i in 0 ..< 16 {\n      block[i] = block[i] &+ salsaBlockTyped[i]\n    }\n  }\n\n  @inline(__always) func blockXor(_ dest: UnsafeMutableRawPointer, _ src: UnsafeRawPointer, _ len: Int) {\n    let D = dest.assumingMemoryBound(to: UInt64.self)\n    let S = src.assumingMemoryBound(to: UInt64.self)\n    let L = len / MemoryLayout<UInt64>.size\n\n    for i in 0 ..< L {\n      D[i] ^= S[i]\n    }\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/SecureBytes.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(WinSDK)\nimport WinSDK\n#endif\n\ntypealias Key = SecureBytes\n\n///  Keeps bytes in memory. Because this is class, bytes are not copied\n///  and memory area is locked as long as referenced, then unlocked on deinit\nfinal class SecureBytes {\n  private let bytes: Array<UInt8>\n  let count: Int\n\n  init(bytes: Array<UInt8>) {\n    self.bytes = bytes\n    self.count = bytes.count\n    self.bytes.withUnsafeBufferPointer { (pointer) -> Void in\n      guard let baseAddress = pointer.baseAddress else { return }\n      #if os(Windows)\n        VirtualLock(UnsafeMutableRawPointer(mutating: baseAddress), SIZE_T(pointer.count))\n      #elseif os(WASI)\n        // not supported on WASI\n      #elseif os(Android)\n        mlock(baseAddress, pointer.count)\n      #else\n        mlock(baseAddress, pointer.count)\n      #endif\n    }\n  }\n\n  deinit {\n    self.bytes.withUnsafeBufferPointer { (pointer) -> Void in\n      guard let baseAddress = pointer.baseAddress else { return }\n      #if os(Windows)\n        VirtualUnlock(UnsafeMutableRawPointer(mutating: baseAddress), SIZE_T(pointer.count))\n      #elseif os(WASI)\n        // not supported on WASI\n      #elseif os(Android)\n        munlock(baseAddress, pointer.count)\n      #else\n        munlock(baseAddress, pointer.count)\n      #endif\n    }\n  }\n}\n\nextension SecureBytes: Collection {\n  typealias Index = Int\n\n  var endIndex: Int {\n    self.bytes.endIndex\n  }\n\n  var startIndex: Int {\n    self.bytes.startIndex\n  }\n\n  subscript(position: Index) -> UInt8 {\n    self.bytes[position]\n  }\n\n  subscript(bounds: Range<Index>) -> ArraySlice<UInt8> {\n    self.bytes[bounds]\n  }\n\n  func formIndex(after i: inout Int) {\n    self.bytes.formIndex(after: &i)\n  }\n\n  func index(after i: Int) -> Int {\n    self.bytes.index(after: i)\n  }\n}\n\nextension SecureBytes: ExpressibleByArrayLiteral {\n  public convenience init(arrayLiteral elements: UInt8...) {\n    self.init(bytes: elements)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Signature.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\npublic enum SignatureError: Error {\n  case sign\n  case verify\n}\n\npublic protocol Signature: AnyObject {\n  var keySize: Int { get }\n\n  /// Sign the given bytes at once\n  ///\n  /// - parameter bytes: Plaintext data to be signed\n  /// - returns: The signed data\n  func sign(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8>\n  /// Sign the given bytes at once\n  ///\n  /// - parameter bytes: Plaintext data to be signed\n  /// - returns: The signed data\n  func sign(_ bytes: Array<UInt8>) throws -> Array<UInt8>\n\n  /// Verify the given bytes against the expected data\n  ///\n  /// - parameter signature: Signature data\n  /// - parameter expectedData: The original data that you expected to be signed\n  /// - returns: `True` when the signature is valid for the expected data, `False` otherwise.\n  func verify(signature: ArraySlice<UInt8>, for expectedData: ArraySlice<UInt8>) throws -> Bool\n  /// Verify the given bytes against the expected data\n  ///\n  /// - parameter signature: Signature data\n  /// - parameter expectedData: The original data that you expected to be signed\n  /// - returns: `True` when the signature is valid for the expected data, `False` otherwise.\n  func verify(signature: Array<UInt8>, for expectedData: Array<UInt8>) throws -> Bool\n}\n\nextension Signature {\n  /// Sign the given bytes at once\n  ///\n  /// - parameter bytes: Plaintext data to be signed\n  /// - returns: The signed data\n  public func sign(_ bytes: Array<UInt8>) throws -> Array<UInt8> {\n    try self.sign(bytes.slice)\n  }\n\n  /// Verify the given bytes against the expected data\n  ///\n  /// - parameter signature: Signature data\n  /// - parameter expectedData: The original data that you expected to be signed\n  /// - returns: `True` when the signature is valid for the expected data, `False` otherwise.\n  public func verify(signature: Array<UInt8>, for expectedData: Array<UInt8>) throws -> Bool {\n    try self.verify(signature: signature.slice, for: expectedData.slice)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/StreamDecryptor.swift",
    "content": "//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n@usableFromInline\nfinal class StreamDecryptor: Cryptor, Updatable {\n\n  @usableFromInline\n  enum Error: Swift.Error {\n    case unsupported\n  }\n\n  @usableFromInline\n  internal let blockSize: Int\n\n  @usableFromInline\n  internal var worker: CipherModeWorker\n\n  @usableFromInline\n  internal let padding: Padding\n\n  @usableFromInline\n  internal var accumulated = Array<UInt8>()\n\n  @usableFromInline\n  internal var lastBlockRemainder = 0\n\n  @usableFromInline\n  init(blockSize: Int, padding: Padding, _ worker: CipherModeWorker) throws {\n    self.blockSize = blockSize\n    self.padding = padding\n    self.worker = worker\n  }\n\n  // MARK: Updatable\n\n  @inlinable\n  public func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool) throws -> Array<UInt8> {\n    self.accumulated += bytes\n\n    let toProcess = self.accumulated.prefix(max(self.accumulated.count - self.worker.additionalBufferSize, 0))\n\n    if var finalizingWorker = worker as? FinalizingDecryptModeWorker, isLast == true {\n      // will truncate suffix if needed\n      try finalizingWorker.willDecryptLast(bytes: self.accumulated.slice)\n    }\n\n    var processedBytesCount = 0\n    var plaintext = Array<UInt8>(reserveCapacity: bytes.count + self.worker.additionalBufferSize)\n    for chunk in toProcess.batched(by: self.blockSize) {\n      plaintext += self.worker.decrypt(block: chunk)\n      processedBytesCount += chunk.count\n    }\n\n    if var finalizingWorker = worker as? FinalizingDecryptModeWorker, isLast == true {\n      plaintext = Array(try finalizingWorker.didDecryptLast(bytes: plaintext.slice))\n    }\n\n    // omit unnecessary calculation if not needed\n    if self.padding != .noPadding {\n      self.lastBlockRemainder = plaintext.count.quotientAndRemainder(dividingBy: self.blockSize).remainder\n    }\n\n    if isLast {\n      // CTR doesn't need padding. Really. Add padding to the last block if really want. but... don't.\n      plaintext = self.padding.remove(from: plaintext, blockSize: self.blockSize - self.lastBlockRemainder)\n    }\n\n    self.accumulated.removeFirst(processedBytesCount) // super-slow\n\n    if var finalizingWorker = worker as? FinalizingDecryptModeWorker, isLast == true {\n      plaintext = Array(try finalizingWorker.finalize(decrypt: plaintext.slice))\n    }\n\n    return plaintext\n  }\n\n  @inlinable\n  public func seek(to position: Int) throws {\n    guard var worker = self.worker as? SeekableModeWorker else {\n      throw Error.unsupported\n    }\n\n    try worker.seek(to: position)\n    self.worker = worker\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/StreamEncryptor.swift",
    "content": "//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n@usableFromInline\nfinal class StreamEncryptor: Cryptor, Updatable {\n\n  @usableFromInline\n  enum Error: Swift.Error {\n    case unsupported\n  }\n\n  @usableFromInline\n  internal let blockSize: Int\n\n  @usableFromInline\n  internal var worker: CipherModeWorker\n\n  @usableFromInline\n  internal let padding: Padding\n\n  @usableFromInline\n  internal var lastBlockRemainder = 0\n\n  @usableFromInline\n  init(blockSize: Int, padding: Padding, _ worker: CipherModeWorker) throws {\n    self.blockSize = blockSize\n    self.padding = padding\n    self.worker = worker\n  }\n\n  // MARK: Updatable\n\n  @inlinable\n  public func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool) throws -> Array<UInt8> {\n    var accumulated = Array(bytes)\n    if isLast {\n      // CTR doesn't need padding. Really. Add padding to the last block if really want. but... don't.\n      accumulated = self.padding.add(to: accumulated, blockSize: self.blockSize - self.lastBlockRemainder)\n    }\n\n    var encrypted = Array<UInt8>(reserveCapacity: bytes.count)\n    for chunk in accumulated.batched(by: self.blockSize) {\n      encrypted += self.worker.encrypt(block: chunk)\n    }\n\n    // omit unnecessary calculation if not needed\n    if self.padding != .noPadding {\n      self.lastBlockRemainder = encrypted.count.quotientAndRemainder(dividingBy: self.blockSize).remainder\n    }\n\n    if var finalizingWorker = worker as? FinalizingEncryptModeWorker, isLast == true {\n      encrypted = Array(try finalizingWorker.finalize(encrypt: encrypted.slice))\n    }\n\n    return encrypted\n  }\n\n  @usableFromInline\n  func seek(to: Int) throws {\n    throw Error.unsupported\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/String+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\n/** String extension */\nextension String {\n\n  @inlinable\n  public var bytes: Array<UInt8> {\n    data(using: String.Encoding.utf8, allowLossyConversion: true)?.byteArray ?? Array(utf8)\n  }\n\n  @inlinable\n  public func md5() -> String {\n    self.bytes.md5().toHexString()\n  }\n\n  @inlinable\n  public func sha1() -> String {\n    self.bytes.sha1().toHexString()\n  }\n\n  @inlinable\n  public func sha224() -> String {\n    self.bytes.sha224().toHexString()\n  }\n\n  @inlinable\n  public func sha256() -> String {\n    self.bytes.sha256().toHexString()\n  }\n\n  @inlinable\n  public func sha384() -> String {\n    self.bytes.sha384().toHexString()\n  }\n\n  @inlinable\n  public func sha512() -> String {\n    self.bytes.sha512().toHexString()\n  }\n\n  @inlinable\n  public func sha3(_ variant: SHA3.Variant) -> String {\n    self.bytes.sha3(variant).toHexString()\n  }\n\n  @inlinable\n  public func crc32(seed: UInt32? = nil, reflect: Bool = true) -> String {\n    self.bytes.crc32(seed: seed, reflect: reflect).bytes().toHexString()\n  }\n\n  @inlinable\n  public func crc32c(seed: UInt32? = nil, reflect: Bool = true) -> String {\n    self.bytes.crc32c(seed: seed, reflect: reflect).bytes().toHexString()\n  }\n\n  @inlinable\n  public func crc16(seed: UInt16? = nil) -> String {\n    self.bytes.crc16(seed: seed).bytes().toHexString()\n  }\n\n  /// - parameter cipher: Instance of `Cipher`\n  /// - returns: hex string of bytes\n  @inlinable\n  public func encrypt(cipher: Cipher) throws -> String {\n    try self.bytes.encrypt(cipher: cipher).toHexString()\n  }\n\n  /// - parameter cipher: Instance of `Cipher`\n  /// - returns: base64 encoded string of encrypted bytes\n  @inlinable\n  public func encryptToBase64(cipher: Cipher) throws -> String {\n    try self.bytes.encrypt(cipher: cipher).toBase64()\n  }\n\n  // decrypt() does not make sense for String\n\n  /// - parameter authenticator: Instance of `Authenticator`\n  /// - returns: hex string of string\n  @inlinable\n  public func authenticate<A: Authenticator>(with authenticator: A) throws -> String {\n    try self.bytes.authenticate(with: authenticator).toHexString()\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/UInt128.swift",
    "content": "//\n//  UInt128.swift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\nstruct UInt128: Equatable, ExpressibleByIntegerLiteral {\n  let i: (a: UInt64, b: UInt64)\n\n  typealias IntegerLiteralType = UInt64\n\n  init(integerLiteral value: IntegerLiteralType) {\n    self = UInt128(value)\n  }\n\n  init(_ raw: Array<UInt8>) {\n    precondition(raw.count >= 16, \"UInt128 requires at least 16 bytes\")\n    let a = UInt64(raw[0]) << 56 | UInt64(raw[1]) << 48 | UInt64(raw[2]) << 40 | UInt64(raw[3]) << 32 |\n            UInt64(raw[4]) << 24 | UInt64(raw[5]) << 16 | UInt64(raw[6]) << 8  | UInt64(raw[7])\n    let b = UInt64(raw[8]) << 56 | UInt64(raw[9]) << 48 | UInt64(raw[10]) << 40 | UInt64(raw[11]) << 32 |\n            UInt64(raw[12]) << 24 | UInt64(raw[13]) << 16 | UInt64(raw[14]) << 8  | UInt64(raw[15])\n    self.init((a, b))\n  }\n\n  init(_ raw: ArraySlice<UInt8>) {\n    self.init(Array(raw))\n  }\n\n  init(_ i: (a: UInt64, b: UInt64)) {\n    self.i = i\n  }\n\n  init(a: UInt64, b: UInt64) {\n    self.init((a, b))\n  }\n\n  init(_ b: UInt64) {\n    self.init((0, b))\n  }\n\n  // Bytes\n  var bytes: Array<UInt8> {\n    var at = self.i.a.bigEndian\n    var bt = self.i.b.bigEndian\n\n    let ar = Data(bytes: &at, count: MemoryLayout.size(ofValue: at))\n    let br = Data(bytes: &bt, count: MemoryLayout.size(ofValue: bt))\n\n    var result = Data()\n    result.append(ar)\n    result.append(br)\n    return result.byteArray\n  }\n\n  static func ^ (n1: UInt128, n2: UInt128) -> UInt128 {\n    UInt128((n1.i.a ^ n2.i.a, n1.i.b ^ n2.i.b))\n  }\n\n  static func & (n1: UInt128, n2: UInt128) -> UInt128 {\n    UInt128((n1.i.a & n2.i.a, n1.i.b & n2.i.b))\n  }\n\n  static func >> (value: UInt128, by: Int) -> UInt128 {\n    var result = value\n    for _ in 0..<by {\n      let a = result.i.a >> 1\n      let b = result.i.b >> 1 + ((result.i.a & 1) << 63)\n      result = UInt128((a, b))\n    }\n    return result\n  }\n\n  // Equatable.\n  static func == (lhs: UInt128, rhs: UInt128) -> Bool {\n    lhs.i == rhs.i\n  }\n\n  static func != (lhs: UInt128, rhs: UInt128) -> Bool {\n    !(lhs == rhs)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/UInt16+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/** array of bytes */\nextension UInt16 {\n  @_specialize(where T == ArraySlice<UInt8>)\n  init<T: Collection>(bytes: T) where T.Element == UInt8, T.Index == Int {\n    self = UInt16(bytes: bytes, fromIndex: bytes.startIndex)\n  }\n\n  @_specialize(where T == ArraySlice<UInt8>)\n  init<T: Collection>(bytes: T, fromIndex index: T.Index) where T.Element == UInt8, T.Index == Int {\n    if bytes.isEmpty {\n      self = 0\n      return\n    }\n\n    let count = bytes.count\n\n    let val0 = count > 0 ? UInt16(bytes[index.advanced(by: 0)]) << 8 : 0\n    let val1 = count > 1 ? UInt16(bytes[index.advanced(by: 1)]) : 0\n\n    self = val0 | val1\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/UInt32+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(ucrt)\nimport ucrt\n#endif\n\nprotocol _UInt32Type {}\nextension UInt32: _UInt32Type {}\n\n/** array of bytes */\nextension UInt32 {\n  @_specialize(where T == ArraySlice<UInt8>)\n  init<T: Collection>(bytes: T) where T.Element == UInt8, T.Index == Int {\n    self = UInt32(bytes: bytes, fromIndex: bytes.startIndex)\n  }\n\n  @_specialize(where T == ArraySlice<UInt8>)\n  @inlinable\n  init<T: Collection>(bytes: T, fromIndex index: T.Index) where T.Element == UInt8, T.Index == Int {\n    if bytes.isEmpty {\n      self = 0\n      return\n    }\n\n    let count = bytes.count\n\n    let val0 = count > 0 ? UInt32(bytes[index.advanced(by: 0)]) << 24 : 0\n    let val1 = count > 1 ? UInt32(bytes[index.advanced(by: 1)]) << 16 : 0\n    let val2 = count > 2 ? UInt32(bytes[index.advanced(by: 2)]) << 8 : 0\n    let val3 = count > 3 ? UInt32(bytes[index.advanced(by: 3)]) : 0\n\n    self = val0 | val1 | val2 | val3\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/UInt64+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/** array of bytes */\nextension UInt64 {\n  @_specialize(where T == ArraySlice<UInt8>)\n  init<T: Collection>(bytes: T) where T.Element == UInt8, T.Index == Int {\n    self = UInt64(bytes: bytes, fromIndex: bytes.startIndex)\n  }\n\n  @_specialize(where T == ArraySlice<UInt8>)\n  @inlinable\n  init<T: Collection>(bytes: T, fromIndex index: T.Index) where T.Element == UInt8, T.Index == Int {\n    if bytes.isEmpty {\n      self = 0\n      return\n    }\n\n    let count = bytes.count\n\n    let val0 = count > 0 ? UInt64(bytes[index.advanced(by: 0)]) << 56 : 0\n    let val1 = count > 1 ? UInt64(bytes[index.advanced(by: 1)]) << 48 : 0\n    let val2 = count > 2 ? UInt64(bytes[index.advanced(by: 2)]) << 40 : 0\n    let val3 = count > 3 ? UInt64(bytes[index.advanced(by: 3)]) << 32 : 0\n    let val4 = count > 4 ? UInt64(bytes[index.advanced(by: 4)]) << 24 : 0\n    let val5 = count > 5 ? UInt64(bytes[index.advanced(by: 5)]) << 16 : 0\n    let val6 = count > 6 ? UInt64(bytes[index.advanced(by: 6)]) << 8 : 0\n    let val7 = count > 7 ? UInt64(bytes[index.advanced(by: 7)]) : 0\n\n    self = val0 | val1 | val2 | val3 | val4 | val5 | val6 | val7\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/UInt8+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n#if canImport(Darwin)\nimport Darwin\n#elseif canImport(Android)\nimport Android\n#elseif canImport(Glibc)\nimport Glibc\n#elseif canImport(Musl)\nimport Musl\n#elseif canImport(ucrt)\nimport ucrt\n#endif\n\npublic protocol _UInt8Type {}\nextension UInt8: _UInt8Type {}\n\n/** casting */\nextension UInt8 {\n  /** cast because UInt8(<UInt32>) because std initializer crash if value is > byte */\n  static func with(value: UInt64) -> UInt8 {\n    let tmp = value & 0xff\n    return UInt8(tmp)\n  }\n\n  static func with(value: UInt32) -> UInt8 {\n    let tmp = value & 0xff\n    return UInt8(tmp)\n  }\n\n  static func with(value: UInt16) -> UInt8 {\n    let tmp = value & 0xff\n    return UInt8(tmp)\n  }\n}\n\n/** Bits */\nextension UInt8 {\n  /** array of bits */\n  public func bits() -> [Bit] {\n    let totalBitsCount = MemoryLayout<UInt8>.size * 8\n\n    var bitsArray = [Bit](repeating: Bit.zero, count: totalBitsCount)\n\n    for j in 0..<totalBitsCount {\n      let bitVal: UInt8 = 1 << UInt8(totalBitsCount - 1 - j)\n      let check = self & bitVal\n\n      if check != 0 {\n        bitsArray[j] = Bit.one\n      }\n    }\n    return bitsArray\n  }\n\n  public func bits() -> String {\n    var s = String()\n    let arr: [Bit] = self.bits()\n    for idx in arr.indices {\n      s += (arr[idx] == Bit.one ? \"1\" : \"0\")\n      if idx.advanced(by: 1) % 8 == 0 { s += \" \" }\n    }\n    return s\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Updatable.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/// A type that supports incremental updates. For example Digest or Cipher may be updatable\n/// and calculate result incerementally.\npublic protocol Updatable {\n  /// Update given bytes in chunks.\n  ///\n  /// - parameter bytes: Bytes to process.\n  /// - parameter isLast: Indicate if given chunk is the last one. No more updates after this call.\n  /// - returns: Processed partial result data or empty array.\n  mutating func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool) throws -> Array<UInt8>\n\n  /// Update given bytes in chunks.\n  ///\n  /// - Parameters:\n  ///   - bytes: Bytes to process.\n  ///   - isLast: Indicate if given chunk is the last one. No more updates after this call.\n  ///   - output: Resulting bytes callback.\n  /// - Returns: Processed partial result data or empty array.\n  mutating func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool, output: (_ bytes: Array<UInt8>) -> Void) throws\n}\n\nextension Updatable {\n  @inlinable\n  public mutating func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = false, output: (_ bytes: Array<UInt8>) -> Void) throws {\n    let processed = try update(withBytes: bytes, isLast: isLast)\n    if !processed.isEmpty {\n      output(processed)\n    }\n  }\n\n  @inlinable\n  public mutating func update(withBytes bytes: ArraySlice<UInt8>, isLast: Bool = false) throws -> Array<UInt8> {\n    try self.update(withBytes: bytes, isLast: isLast)\n  }\n\n  @inlinable\n  public mutating func update(withBytes bytes: Array<UInt8>, isLast: Bool = false) throws -> Array<UInt8> {\n    try self.update(withBytes: bytes.slice, isLast: isLast)\n  }\n\n  @inlinable\n  public mutating func update(withBytes bytes: Array<UInt8>, isLast: Bool = false, output: (_ bytes: Array<UInt8>) -> Void) throws {\n    try self.update(withBytes: bytes.slice, isLast: isLast, output: output)\n  }\n\n  /// Finish updates. This may apply padding.\n  /// - parameter bytes: Bytes to process\n  /// - returns: Processed data.\n  @inlinable\n  public mutating func finish(withBytes bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    try self.update(withBytes: bytes, isLast: true)\n  }\n\n  @inlinable\n  public mutating func finish(withBytes bytes: Array<UInt8>) throws -> Array<UInt8> {\n    try self.finish(withBytes: bytes.slice)\n  }\n\n  /// Finish updates. May add padding.\n  ///\n  /// - Returns: Processed data\n  /// - Throws: Error\n  @inlinable\n  public mutating func finish() throws -> Array<UInt8> {\n    try self.update(withBytes: [], isLast: true)\n  }\n\n  /// Finish updates. This may apply padding.\n  /// - parameter bytes: Bytes to process\n  /// - parameter output: Resulting data\n  /// - returns: Processed data.\n  @inlinable\n  public mutating func finish(withBytes bytes: ArraySlice<UInt8>, output: (_ bytes: Array<UInt8>) -> Void) throws {\n    let processed = try update(withBytes: bytes, isLast: true)\n    if !processed.isEmpty {\n      output(processed)\n    }\n  }\n\n  @inlinable\n  public mutating func finish(withBytes bytes: Array<UInt8>, output: (_ bytes: Array<UInt8>) -> Void) throws {\n    try self.finish(withBytes: bytes.slice, output: output)\n  }\n\n  /// Finish updates. May add padding.\n  ///\n  /// - Parameter output: Processed data\n  /// - Throws: Error\n  @inlinable\n  public mutating func finish(output: (Array<UInt8>) -> Void) throws {\n    try self.finish(withBytes: [], output: output)\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/Utils.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n@inlinable\nfunc rotateLeft(_ value: UInt8, by: UInt8) -> UInt8 {\n  ((value << by) & 0xff) | (value >> (8 - by))\n}\n\n@inlinable\nfunc rotateLeft(_ value: UInt16, by: UInt16) -> UInt16 {\n  ((value << by) & 0xffff) | (value >> (16 - by))\n}\n\n@inlinable\nfunc rotateLeft(_ value: UInt32, by: UInt32) -> UInt32 {\n  ((value << by) & 0xffffffff) | (value >> (32 - by))\n}\n\n@inlinable\nfunc rotateLeft(_ value: UInt64, by: UInt64) -> UInt64 {\n  (value << by) | (value >> (64 - by))\n}\n\n@inlinable\nfunc rotateRight(_ value: UInt16, by: UInt16) -> UInt16 {\n  (value >> by) | (value << (16 - by))\n}\n\n@inlinable\nfunc rotateRight(_ value: UInt32, by: UInt32) -> UInt32 {\n  (value >> by) | (value << (32 - by))\n}\n\n@inlinable\nfunc rotateRight(_ value: UInt64, by: UInt64) -> UInt64 {\n  ((value >> by) | (value << (64 - by)))\n}\n\n@inlinable\nfunc reversed(_ uint8: UInt8) -> UInt8 {\n  var v = uint8\n  v = (v & 0xf0) >> 4 | (v & 0x0f) << 4\n  v = (v & 0xcc) >> 2 | (v & 0x33) << 2\n  v = (v & 0xaa) >> 1 | (v & 0x55) << 1\n  return v\n}\n\n@inlinable\nfunc reversed(_ uint32: UInt32) -> UInt32 {\n  var v = uint32\n  v = ((v >> 1) & 0x55555555) | ((v & 0x55555555) << 1)\n  v = ((v >> 2) & 0x33333333) | ((v & 0x33333333) << 2)\n  v = ((v >> 4) & 0x0f0f0f0f) | ((v & 0x0f0f0f0f) << 4)\n  v = ((v >> 8) & 0x00ff00ff) | ((v & 0x00ff00ff) << 8)\n  v = ((v >> 16) & 0xffff) | ((v & 0xffff) << 16)\n  return v\n}\n\n@inlinable\nfunc xor<T, V>(_ left: T, _ right: V) -> ArraySlice<UInt8> where T: RandomAccessCollection, V: RandomAccessCollection, T.Element == UInt8, T.Index == Int, V.Element == UInt8, V.Index == Int {\n  return xor(left, right).slice\n}\n\n@inlinable\nfunc xor<T, V>(_ left: T, _ right: V) -> Array<UInt8> where T: RandomAccessCollection, V: RandomAccessCollection, T.Element == UInt8, T.Index == Int, V.Element == UInt8, V.Index == Int {\n  let length = Swift.min(left.count, right.count)\n\n  let buf = UnsafeMutablePointer<UInt8>.allocate(capacity: length)\n  buf.initialize(repeating: 0, count: length)\n  defer {\n    buf.deinitialize(count: length)\n    buf.deallocate()\n  }\n\n  // xor\n  for i in 0..<length {\n    buf[i] = left[left.startIndex.advanced(by: i)] ^ right[right.startIndex.advanced(by: i)]\n  }\n\n  return Array(UnsafeBufferPointer(start: buf, count: length))\n}\n\n/**\n ISO/IEC 9797-1 Padding method 2.\n Add a single bit with value 1 to the end of the data.\n If necessary add bits with value 0 to the end of the data until the padded data is a multiple of blockSize.\n - parameters:\n - blockSize: Padding size in bytes.\n - allowance: Excluded trailing number of bytes.\n */\n@inline(__always) @inlinable\nfunc bitPadding(to data: inout Array<UInt8>, blockSize: Int, allowance: Int = 0) {\n  let msgLength = data.count\n  // Step 1. Append Padding Bits\n  // append one bit (UInt8 with one bit) to message\n  data.append(0x80)\n\n  // Step 2. append \"0\" bit until message length in bits ≡ 448 (mod 512)\n  let max = blockSize - allowance // 448, 986\n  if msgLength % blockSize < max { // 448\n    data += Array<UInt8>(repeating: 0, count: max - 1 - (msgLength % blockSize))\n  } else {\n    data += Array<UInt8>(repeating: 0, count: blockSize + max - 1 - (msgLength % blockSize))\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/XChaCha20.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/// XChaCha20 is a Swift implementation of the XChaCha20 stream cipher, which is an extension of the ChaCha20 cipher\n/// that uses a 192-bit nonce instead of the original 64-bit nonce. XChaCha20 provides a higher security level by\n/// allowing a larger number of safe random nonces, reducing the risk of nonce reuse.\n///\n/// For more information about the XChaCha20 algorithm, refer to the IETF draft: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha\npublic final class XChaCha20: BlockCipher, BlockMode {\n\n  public enum Error: Swift.Error {\n    case invalidKeyOrInitializationVector\n    case notSupported\n  }\n\n  fileprivate var chacha20: ChaCha20\n\n  // MARK: BlockCipher\n\n  public static let blockSize = 64 // 512 / 8\n\n  // MARK: Cipher\n\n  public let keySize: Int\n\n  /// Initializes a new instance of XChaCha20 with the provided key, nonce, and optional block counter.\n  /// - Parameters:\n  ///   - key: A 256-bit (32-byte) key for the XChaCha20 cipher.\n  ///   - nonce: A 192-bit (24-byte) nonce for the XChaCha20 cipher.\n  ///   - blockCounter: An optional initial block counter value, defaulting to 0.\n  /// - Throws: Error.invalidKeyOrInitializationVector if the key or nonce lengths are not valid.\n  public init(key: Array<UInt8>, iv nonce: Array<UInt8>, blockCounter: UInt32 = 0) throws {\n    guard key.count == 32 && nonce.count == 24 else {\n      throw Error.invalidKeyOrInitializationVector\n    }\n\n    self.keySize = key.count\n\n    // From https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha#section-2.3\n    //  XChaCha20 can be constructed from an existing ChaCha20 implementation\n    //   and HChaCha20.  All one needs to do is:\n    //\n    //   1.  Pass the key and the first 16 bytes of the 24-byte nonce to\n    //       HChaCha20 to obtain the subkey.\n    //\n    //   2.  Use the subkey and remaining 8 byte nonce with ChaCha20 as normal\n    //       (prefixed by 4 NUL bytes, since [RFC8439] specifies a 12-byte\n    //       nonce).\n    self.chacha20 = try .init(\n      key: XChaCha20.hChaCha20(key: key, nonce: Array(nonce[0..<16])),\n      iv: [0, 0, 0, 0] + Array(nonce[16..<24]),\n      blockCounter: blockCounter\n    )\n  }\n\n  // MARK: BlockMode\n\n  /// Options specific to the block mode.\n  public let options: BlockModeOption = [.none]\n  /// The custom block size for the block mode, if any. XChaCha20 does not have a custom block size.\n  public let customBlockSize: Int? = nil\n\n  public func worker(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, encryptionOperation: @escaping CipherOperationOnBlock) throws -> CipherModeWorker {\n    return XChaCha20Worker(\n      blockSize: blockSize,\n      cipherOperation: cipherOperation,\n      xChaCha20: self\n    )\n  }\n\n  /// Computes the HChaCha20 function on the provided key and nonce.\n  ///\n  /// See: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha#section-2.2\n  ///\n  /// - Parameters:\n  ///   - key: A 256-bit (32-byte) key.\n  ///   - nonce: A 128-bit (16-byte) nonce.\n  /// - Returns: A 256-bit (32-byte) derived key.\n  static func hChaCha20(key: [UInt8], nonce: [UInt8]) -> [UInt8] {\n    precondition(key.count == 32)\n    precondition(nonce.count == 16)\n\n    // HChaCha20 is initialized the same way as the ChaCha cipher, except\n    // that HChaCha20 uses a 128-bit nonce and has no counter.  Instead, the\n    // block counter is replaced by the first 32 bits of the nonce.\n\n    var state = Array<UInt32>(repeating: 0, count: 16)\n\n    state[0] = 0x61707865\n    state[1] = 0x3320646e\n    state[2] = 0x79622d32\n    state[3] = 0x6b206574\n    for i in 0..<8 {\n      state[4 + i] = UInt32(bytes: key[i * 4..<(i + 1) * 4]).bigEndian\n    }\n    for i in 0..<4 {\n      state[12 + i] = UInt32(bytes: nonce[i * 4..<(i + 1) * 4]).bigEndian\n    }\n\n    // After initialization, proceed through the ChaCha rounds as usual.\n\n    for _ in 1...10 {\n      self.innerBlock(&state)\n    }\n\n    // Once the 20 ChaCha rounds have been completed, the first 128 bits and\n    // last 128 bits of the ChaCha state (both little-endian) are\n    // concatenated, and this 256-bit subkey is returned.\n\n    var output = Array<UInt8>()\n    for i in 0..<4 {\n      output += state[i].bigEndian.bytes()\n    }\n    for i in 0..<4 {\n      output += state[12 + i].bigEndian.bytes()\n    }\n\n    return output\n  }\n\n  /// Performs the \"quarter round\" operation on the provided state at the specified indices.\n  /// - Parameters:\n  ///   - state: The state on which to perform the operation.\n  ///   - a: The index of the first element in the state.\n  ///   - b: The index of the second element in the state.\n  ///   - c: The index of the third element in the state.\n  ///   - d: The index of the fourth element in the state.\n  static func qRound(_ state: inout [UInt32], _ a: Int, _ b: Int, _ c: Int, _ d: Int) {\n    state[a] = state[a] &+ state[b]\n    state[d] ^= state[a]\n    state[d] = (state[d] << 16) | (state[d] >> 16)\n    state[c] = state[c] &+ state[d]\n    state[b] ^= state[c]\n    state[b] = (state[b] << 12) | (state[b] >> 20)\n    state[a] = state[a] &+ state[b]\n    state[d] ^= state[a]\n    state[d] = (state[d] << 8) | (state[d] >> 24)\n    state[c] = state[c] &+ state[d]\n    state[b] ^= state[c]\n    state[b] = (state[b] << 7) | (state[b] >> 25)\n  }\n\n  /// Performs the inner block operation on the provided state.\n  /// - Parameter state: The state on which to perform the operation.\n  static func innerBlock(_ state: inout [UInt32]) {\n    self.qRound(&state, 0, 4, 8, 12)\n    self.qRound(&state, 1, 5, 9, 13)\n    self.qRound(&state, 2, 6, 10, 14)\n    self.qRound(&state, 3, 7, 11, 15)\n    self.qRound(&state, 0, 5, 10, 15)\n    self.qRound(&state, 1, 6, 11, 12)\n    self.qRound(&state, 2, 7, 8, 13)\n    self.qRound(&state, 3, 4, 9, 14)\n  }\n}\n\n// MARK: Cipher\n\nextension XChaCha20: Cipher {\n  public func encrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    try self.chacha20.encrypt(bytes)\n  }\n\n  public func decrypt(_ bytes: ArraySlice<UInt8>) throws -> Array<UInt8> {\n    try self.encrypt(bytes)\n  }\n}\n\n// MARK: Cryptors\n\nextension XChaCha20: Cryptors {\n\n  public func makeEncryptor() throws -> Cryptor & Updatable {\n    return try BlockEncryptor(\n      blockSize: XChaCha20.blockSize,\n      padding: .noPadding,\n      self.worker(\n        blockSize: XChaCha20.blockSize,\n        cipherOperation: { _ in nil },\n        encryptionOperation: { _ in nil }\n      )\n    )\n  }\n\n  public func makeDecryptor() throws -> Cryptor & Updatable {\n    return try BlockDecryptor(\n      blockSize: XChaCha20.blockSize,\n      padding: .noPadding,\n      self.worker(\n        blockSize: XChaCha20.blockSize,\n        cipherOperation: { _ in nil },\n        encryptionOperation: { _ in nil }\n      )\n    )\n  }\n}\n\nclass XChaCha20Worker: CipherModeWorker {\n  let blockSize: Int\n  let cipherOperation: CipherOperationOnBlock\n  let xChaCha20: XChaCha20\n\n  init(blockSize: Int, cipherOperation: @escaping CipherOperationOnBlock, xChaCha20: XChaCha20) {\n    self.blockSize = blockSize\n    self.cipherOperation = cipherOperation\n    self.xChaCha20 = xChaCha20\n  }\n\n  var additionalBufferSize: Int {\n    return 0\n  }\n\n  func encrypt(block plaintext: ArraySlice<UInt8>) -> Array<UInt8> {\n    return (try? self.xChaCha20.encrypt(plaintext)) ?? .init()\n  }\n\n  func decrypt(block ciphertext: ArraySlice<UInt8>) -> Array<UInt8> {\n    return (try? self.xChaCha20.decrypt(ciphertext)) ?? .init()\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift/ZeroPadding.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n/// All the bytes that are required to be padded are padded with zero.\n/// Zero padding may not be reversible if the original file ends with one or more zero bytes.\nstruct ZeroPadding: PaddingProtocol {\n  init() {\n  }\n\n  @inlinable\n  func add(to bytes: Array<UInt8>, blockSize: Int) -> Array<UInt8> {\n    let paddingCount = blockSize - (bytes.count % blockSize)\n    if paddingCount > 0 {\n      return bytes + Array<UInt8>(repeating: 0, count: paddingCount)\n    }\n    return bytes\n  }\n\n  @inlinable\n  func remove(from bytes: Array<UInt8>, blockSize _: Int?) -> Array<UInt8> {\n    for (idx, value) in bytes.reversed().enumerated() {\n      if value != 0 {\n        return Array(bytes[0..<bytes.count - idx])\n      }\n    }\n    return bytes\n  }\n}\n"
  },
  {
    "path": "Sources/CryptoSwift.h",
    "content": "//\n//  CryptoSwift.h\n//  CryptoSwift\n//\n//  Created by Sam Soffes on 11/29/15.\n//  Copyright © 2015 Marcin Krzyzanowski. All rights reserved.\n//\n\n@import Foundation;\n\n//! Project version number for CryptoSwift.\nFOUNDATION_EXPORT double CryptoSwiftVersionNumber;\n\n//! Project version string for CryptoSwift.\nFOUNDATION_EXPORT const unsigned char CryptoSwiftVersionString[];\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/AESCCMTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class AESCCMTests: XCTestCase {\n\n  struct TestFixture {\n    let tagLength: Int\n    let key: Array<UInt8>\n    let nonce: Array<UInt8>\n    let aad: Array<UInt8>\n    let plaintext: Array<UInt8>\n    let expected: Array<UInt8>\n\n    init(_ tagLength: Int, _ key: String, _ nonce: String, _ plaintext: String, _ expected: String, _ aad: String) {\n      self.tagLength = tagLength\n      self.key = Array<UInt8>(hex: key)\n      self.nonce = Array<UInt8>(hex: nonce)\n      self.aad = Array<UInt8>(hex: aad)\n      self.plaintext = Array<UInt8>(hex: plaintext)\n      self.expected = Array<UInt8>(hex: expected)\n    }\n  }\n\n  func testAESCCMTestDVPT256() {\n    let fixtures = [\n      //NIST Test vectors for AES-CCM with 256bit Key, from DVPT256.txt\n      //(Integer macLength, String key, String nonce, String plain, String ciphered, String aData) {\n      TestFixture(4, \"eda32f751456e33195f1f499cf2dc7c97ea127b6d488f211ccc5126fbb24afa6\", \"a544218dadd3c1\", \"\", \"469c90bb\", \"\"),\n      TestFixture(4, \"eda32f751456e33195f1f499cf2dc7c97ea127b6d488f211ccc5126fbb24afa6\", \"dbb3923156cfd6\", \"\", \"1302d515\", \"\"),\n      TestFixture(4, \"eda32f751456e33195f1f499cf2dc7c97ea127b6d488f211ccc5126fbb24afa6\", \"a259c114eaac89\", \"\", \"4fe06e92\", \"\"),\n      TestFixture(4, \"eda32f751456e33195f1f499cf2dc7c97ea127b6d488f211ccc5126fbb24afa6\", \"e1be89af98ffd7\", \"\", \"e5417f6b\", \"\"),\n      TestFixture(4, \"eda32f751456e33195f1f499cf2dc7c97ea127b6d488f211ccc5126fbb24afa6\", \"1aa758eb2f9a28\", \"\", \"f8fa8e71\", \"\"),\n      TestFixture(16, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"a544218dadd3c1\", \"\", \"8207eb14d33855a52acceed17dbcbf6e\", \"\"),\n      TestFixture(16, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"dbb3923156cfd6\", \"\", \"e4dc5e03aacea691262ee69cee8ffbbe\", \"\"),\n      TestFixture(16, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"a259c114eaac89\", \"\", \"f79c53fd5e69835b7e70496ea999718b\", \"\"),\n      TestFixture(16, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"e1be89af98ffd7\", \"\", \"10d3f6fe08280d45e67e58fe41a7f036\", \"\"),\n      TestFixture(16, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"1aa758eb2f9a28\", \"\", \"2590df2453cb94c304ba0a2bff3f3c71\", \"\"),\n      TestFixture(4, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"a544218dadd3c10583db49cf39\", \"\", \"8a19a133\", \"\"),\n      TestFixture(4, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"79ac204a26b9fee1132370c20f\", \"\", \"154024b2\", \"\"),\n      TestFixture(4, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"0545fd9ecbc73ccdbbbd4244fd\", \"\", \"5c349fb2\", \"\"),\n      TestFixture(4, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"0a37f2e7c66490e97285f1b09e\", \"\", \"c59bf14c\", \"\"),\n      TestFixture(4, \"e1b8a927a95efe94656677b692662000278b441c79e879dd5c0ddc758bdc9ee8\", \"c1ad812bf2bbb2cdaee4636ee7\", \"\", \"5b96f41d\", \"\"),\n      TestFixture(16, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"a544218dadd3c10583db49cf39\", \"\", \"97e1a8dd4259ccd2e431e057b0397fcf\", \"\"),\n      TestFixture(16, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"79ac204a26b9fee1132370c20f\", \"\", \"5c8c9a5b97be8c7bc01ca8d693b809f9\", \"\"),\n      TestFixture(16, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"0545fd9ecbc73ccdbbbd4244fd\", \"\", \"84201662b213c7a1ff0c1b3c25e4ec45\", \"\"),\n      TestFixture(16, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"0a37f2e7c66490e97285f1b09e\", \"\", \"586e728193ce6db9a926b03b2d77dd6e\", \"\"),\n      TestFixture(16, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"c1ad812bf2bbb2cdaee4636ee7\", \"\", \"64864d21b6ee3fca13f07fc0486e232d\", \"\"),\n      TestFixture(4, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"a544218dadd3c1\", \"d3d5424e20fbec43ae495353ed830271515ab104f8860c98\", \"64a1341679972dc5869fcf69b19d5c5ea50aa0b5e985f5b722aa8d59\", \"\"),\n      TestFixture(4, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"9d773a31fe2ec7\", \"839d8cfa2c921c3cceb7d1f46bd2eaad706e53f64523d8c0\", \"5acfbe5e488976d8b9b77e69a736e8c919053f9415551209dce2d25e\", \"\"),\n      TestFixture(4, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"24b7a65391f88b\", \"3bed52236182c19418867d468dbf47c8aac46c02445f99bb\", \"f00628e10e8e0115b4a4532a1212a23aade4090832c1972d750125f3\", \"\"),\n      TestFixture(4, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"b672c91376f533\", \"4f7a561e61b7861719e4445057ac9b74a9be953b772b09ec\", \"758aa03dc72c362c43b5f85bfaa3db4a74860887a8c29e47d5642830\", \"\"),\n      TestFixture(4, \"af063639e66c284083c5cf72b70d8bc277f5978e80d9322d99f2fdc718cda569\", \"a6d01fb88ca547\", \"a36155de477364236591e453008114075b4872120ef17264\", \"615cbeabbe163ba8bc9c073df9ad40833fcf3f424644ccc37aa999d7\", \"\"),\n      TestFixture(16, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"a544218dadd3c1\", \"d3d5424e20fbec43ae495353ed830271515ab104f8860c98\", \"bc51c3925a960e7732533e4ef3a4f69ee6826de952bcb0fd374f3bb6db8377ebfc79674858c4f305\", \"\"),\n      TestFixture(16, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"9d773a31fe2ec7\", \"839d8cfa2c921c3cceb7d1f46bd2eaad706e53f64523d8c0\", \"4539bb13382b034ddb16a3329148f9243a4eee998fe444aff2870ce198af11f4fb698a67af6c89ad\", \"\"),\n      TestFixture(16, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"24b7a65391f88b\", \"3bed52236182c19418867d468dbf47c8aac46c02445f99bb\", \"6d0f928352a17d63aca1899cbd305e1f831f1638d27c1e24432704eff9b6830476db3d30d4c103e4\", \"\"),\n      TestFixture(16, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"b672c91376f533\", \"4f7a561e61b7861719e4445057ac9b74a9be953b772b09ec\", \"f23ac1426cb1130c9a0913b347d8efafb6ed125913aa678a9dc42d22a5436bc12eff5505edb25e19\", \"\"),\n      TestFixture(16, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"a6d01fb88ca547\", \"a36155de477364236591e453008114075b4872120ef17264\", \"773b8eea2e9830297ac11d3c1f6ea4008c96040e83d76d55789d2043179fdd8fdcbd52313b7b15cb\", \"\"),\n      TestFixture(4, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"a544218dadd3c10583db49cf39\", \"3c0e2815d37d844f7ac240ba9d6e3a0b2a86f706e885959e\", \"63e00d30e4b08fd2a1cc8d70fab327b2368e77a93be4f4123d14fb3f\", \"\"),\n      TestFixture(4, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"1501a243bf60b2cb40d5aa20ca\", \"f5730a05fec31a11662e2e14e362ccc75c7c30cdfccbf994\", \"377b2f1e7bd9e3d1077038e084f61950761361095f7eeebbf1a72afc\", \"\"),\n      TestFixture(4, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"d65e0e53f765f9d5e6795c0c5e\", \"20e394c7cc90bdfa6186fc1ba6fff158dfc690e24ba4c9fb\", \"6cab3060bf3b33b163b933c2ed0ba51406810b54d0edcf5c9d0ef4f7\", \"\"),\n      TestFixture(4, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"a6b2371acf8321864c08ddb4d8\", \"1a43ca628026219c5a430c54021a5a3152ae517167399635\", \"c5aa500d1f7c09a590e9d15d6860c4433684e04dd6bc5c8f94f223f0\", \"\"),\n      TestFixture(4, \"f7079dfa3b5c7b056347d7e437bcded683abd6e2c9e069d333284082cbb5d453\", \"c2b60f14c894ec6178fe79919f\", \"3e707d98f19972a63d913e6ea7533af2f41ff98aee2b2a36\", \"852cca903d7fdf899807bd14642057534c8a0ccacb8c7b8fb4d35d44\", \"\"),\n      TestFixture(16, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"a544218dadd3c10583db49cf39\", \"3c0e2815d37d844f7ac240ba9d6e3a0b2a86f706e885959e\", \"f0050ad16392021a3f40207bed3521fb1e9f808f49830c423a578d179902f912f9ea1afbce1120b3\", \"\"),\n      TestFixture(16, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"1501a243bf60b2cb40d5aa20ca\", \"f5730a05fec31a11662e2e14e362ccc75c7c30cdfccbf994\", \"254b847d4175bbb44a82b4e805514fa444c224710933f3ec8aaa3f0133234c0cd91609982adc034b\", \"\"),\n      TestFixture(16, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"d65e0e53f765f9d5e6795c0c5e\", \"20e394c7cc90bdfa6186fc1ba6fff158dfc690e24ba4c9fb\", \"c3618c991b15de641d291419ff6957e8b9ae5046dd8c6f08fafb76adf12f36740347e3edae62bca4\", \"\"),\n      TestFixture(16, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"a6b2371acf8321864c08ddb4d8\", \"1a43ca628026219c5a430c54021a5a3152ae517167399635\", \"bd37326da18e5ac79a1a9512f724bb539530868576b79c67acb5a51d10a58d6584fbe73f1063c31b\", \"\"),\n      TestFixture(16, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"c2b60f14c894ec6178fe79919f\", \"3e707d98f19972a63d913e6ea7533af2f41ff98aee2b2a36\", \"ecd337640022635ce1ed273756d02b7feeb2515614c1fadc95c66d3f411b478853886afd177d88c3\", \"\"),\n      TestFixture(4, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"a544218dadd3c1\", \"\", \"92d00fbe\", \"d3d5424e20fbec43ae495353ed830271515ab104f8860c988d15b6d36c038eab\"),\n      TestFixture(4, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"3fcb328bc96404\", \"\", \"11250056\", \"10b2ffed4f95af0f98ed4f77c677b5786ad01b31c095bbc6e1c99cf13977abba\"),\n      TestFixture(4, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"c42ac63de6f12a\", \"\", \"4eed80fd\", \"7ff8d06c5abcc50d3820de34b03089e6c5b202bcbaabca892825553d4d30020a\"),\n      TestFixture(4, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"3a1701b185d33a\", \"\", \"9a5382c3\", \"e5d54df8ed9f89b98c5ebb1bc5d5279c2e182784ff4cd9c869ae152e29d7a2b2\"),\n      TestFixture(4, \"1b0e8df63c57f05d9ac457575ea764524b8610ae5164e6215f426f5a7ae6ede4\", \"4f490ce07e0150\", \"\", \"e1842c46\", \"3e12d09632c644c540077c6f90726d4167423a679322b2000a3f19cfcea02b33\"),\n      TestFixture(16, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"a544218dadd3c1\", \"\", \"93af11a08379eb37a16aa2837f09d69d\", \"d3d5424e20fbec43ae495353ed830271515ab104f8860c988d15b6d36c038eab\"),\n      TestFixture(16, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"3fcb328bc96404\", \"\", \"b3884b69d117146cfa5529901753ddc0\", \"10b2ffed4f95af0f98ed4f77c677b5786ad01b31c095bbc6e1c99cf13977abba\"),\n      TestFixture(16, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"c42ac63de6f12a\", \"\", \"b53d93cbfd3d5cf3720cef5080bc7224\", \"7ff8d06c5abcc50d3820de34b03089e6c5b202bcbaabca892825553d4d30020a\"),\n      TestFixture(16, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"3a1701b185d33a\", \"\", \"0a5d1bc02c5fe096a8b9d94d1267c49a\", \"e5d54df8ed9f89b98c5ebb1bc5d5279c2e182784ff4cd9c869ae152e29d7a2b2\"),\n      TestFixture(16, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"4f490ce07e0150\", \"\", \"1eda43bf07f2bf003107f3a0ba3a4c18\", \"3e12d09632c644c540077c6f90726d4167423a679322b2000a3f19cfcea02b33\"),\n      TestFixture(4, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"a544218dadd3c10583db49cf39\", \"\", \"866d4227\", \"3c0e2815d37d844f7ac240ba9d6e3a0b2a86f706e885959e09a1005e024f6907\"),\n      TestFixture(4, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"dfdcbdff329f7af70731d8e276\", \"\", \"c4ac0952\", \"2ae56ddde2876d70b3b34eda8c2b1d096c836d5225d53ec460b724b6e16aa5a3\"),\n      TestFixture(4, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"60f2490ba0c658848859fcbea8\", \"\", \"27c3953d\", \"3ad743283064929bf4fe4e0807f710f5e6a273e22614c728c3280a27b6c614a0\"),\n      TestFixture(4, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"db113f38f0504615c5c9347c3d\", \"\", \"c38fbdff\", \"3b71bc84e48c6dadf6ead14621d22468a3d4c9c103ac96970269730bcfce239b\"),\n      TestFixture(4, \"a4bc10b1a62c96d459fbaf3a5aa3face7313bb9e1253e696f96a7a8e36801088\", \"d35f531f714694b5e49303a980\", \"\", \"d34e90bb\", \"55b791ee495299916ff3c2327b4990952bebd0a2da9acfc553c6c996e354a4b5\"),\n      TestFixture(16, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"a544218dadd3c10583db49cf39\", \"\", \"867b0d87cf6e0f718200a97b4f6d5ad5\", \"3c0e2815d37d844f7ac240ba9d6e3a0b2a86f706e885959e09a1005e024f6907\"),\n      TestFixture(16, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"dfdcbdff329f7af70731d8e276\", \"\", \"ad879c64425e6c1ec4841bbb0f99aa8b\", \"2ae56ddde2876d70b3b34eda8c2b1d096c836d5225d53ec460b724b6e16aa5a3\"),\n      TestFixture(16, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"60f2490ba0c658848859fcbea8\", \"\", \"e2751f153fc76c0dec5e0cf2d30c1a28\", \"3ad743283064929bf4fe4e0807f710f5e6a273e22614c728c3280a27b6c614a0\"),\n      TestFixture(16, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"db113f38f0504615c5c9347c3d\", \"\", \"fc85464a81fe372c12c9e4f0f3bf9c37\", \"3b71bc84e48c6dadf6ead14621d22468a3d4c9c103ac96970269730bcfce239b\"),\n      TestFixture(16, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"d35f531f714694b5e49303a980\", \"\", \"b1c09b093788da19e33c5a6e82ed9627\", \"55b791ee495299916ff3c2327b4990952bebd0a2da9acfc553c6c996e354a4b5\"),\n      TestFixture(4, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"a544218dadd3c1\", \"78c46e3249ca28e1ef0531d80fd37c124d9aecb7be6668e3\", \"c2fe12658139f5d0dd22cadf2e901695b579302a72fc56083ebc7720\", \"d3d5424e20fbec43ae495353ed830271515ab104f8860c988d15b6d36c038eab\"),\n      TestFixture(4, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"57b940550a383b\", \"6fb5ce32a851676753ba3523edc5ca82af1843ffc08f1ef0\", \"e1b4ec4279bb62902c12521e6b874171695c5da46c647cc03b91ff03\", \"33c2c3a57bf8393b126982c96d87daeacd5eadad1519073ad8c84cb9b760296f\"),\n      TestFixture(4, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"f32222e9eec4bd\", \"2c29d4e2bb9294e90cb04ec697e663a1f7385a39f90c8ccf\", \"224db21beb8cd0069007660e783c3f85706b014128368aab2a4e56a7\", \"684595e36eda1db5f586941c9f34c9f8d477970d5ccc14632d1f0cec8190ae68\"),\n      TestFixture(4, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"14c9bd561c47c1\", \"c22524a1ea444be3412b0d773d4ea2ff0af4c1ad2383cba8\", \"61b46c9024eed3989064a52df90349c18e14e4b552779d3f8f9d6814\", \"141ae365f8e65ab9196c4e8cd4e62189b304d67de38f2117e84ec0ec8f260ebd\"),\n      TestFixture(4, \"8c5cf3457ff22228c39c051c4e05ed4093657eb303f859a9d4b0f8be0127d88a\", \"1ccec9923aa6e8\", \"518a7fb11c463bf23798982118f3cfe4d7ddde9184f37d4f\", \"52f8205534447d722be2b9377f7395938cc88af081a11ccb0d83fa19\", \"88a6d037009a1c1756f72bb4589d6d940bd514ed55386baefacc6ac3ca6f8795\"),\n      TestFixture(16, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"a544218dadd3c1\", \"78c46e3249ca28e1ef0531d80fd37c124d9aecb7be6668e3\", \"3341168eb8c48468c414347fb08f71d2086f7c2d1bd581ce1ac68bd42f5ec7fa7e068cc0ecd79c2a\", \"d3d5424e20fbec43ae495353ed830271515ab104f8860c988d15b6d36c038eab\"),\n      TestFixture(16, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"57b940550a383b\", \"6fb5ce32a851676753ba3523edc5ca82af1843ffc08f1ef0\", \"fbfed2c94f50ca10466da9903ef85833ad48ca00556e66d14d8b30df941f3536ffb42083ef0e1c30\", \"33c2c3a57bf8393b126982c96d87daeacd5eadad1519073ad8c84cb9b760296f\"),\n      TestFixture(16, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"f32222e9eec4bd\", \"2c29d4e2bb9294e90cb04ec697e663a1f7385a39f90c8ccf\", \"dae13e6967c8b1ee0dd2d5ba1dd1de69f22c95da39528f9ef78e9e5e9faa058112af57f4ac78db2c\", \"684595e36eda1db5f586941c9f34c9f8d477970d5ccc14632d1f0cec8190ae68\"),\n      TestFixture(16, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"14c9bd561c47c1\", \"c22524a1ea444be3412b0d773d4ea2ff0af4c1ad2383cba8\", \"a654238fb8b05e293dba07f9d68d75a7f0fbf40fe20edaeba1586bf922412e73ce338e372615c3bc\", \"141ae365f8e65ab9196c4e8cd4e62189b304d67de38f2117e84ec0ec8f260ebd\"),\n      TestFixture(16, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"1ccec9923aa6e8\", \"518a7fb11c463bf23798982118f3cfe4d7ddde9184f37d4f\", \"765067ef768908d91ee4c3923943e0c7be70e2e06db99a4b3e3f51ee37fdcc5d81dd85d9e9d4f44e\", \"88a6d037009a1c1756f72bb4589d6d940bd514ed55386baefacc6ac3ca6f8795\"),\n      TestFixture(4, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"a544218dadd3c10583db49cf39\", \"e8de970f6ee8e80ede933581b5bcf4d837e2b72baa8b00c3\", \"c0ea400b599561e7905b99262b4565d5c3dc49fad84d7c69ef891339\", \"3c0e2815d37d844f7ac240ba9d6e3a0b2a86f706e885959e09a1005e024f6907\"),\n      TestFixture(4, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"0dd613c0fe28e913c0edbb8404\", \"9522fb1f1aa58493cba682d788186d902cfc93e80fd6b998\", \"fabe11c9629e598228f5209f3dbcc641fe4b1a22cadb0821d2898c3b\", \"2ad306575b577c2f61da7212ab63e3db3941f1f751f2356c7443531a90b9d141\"),\n      TestFixture(4, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"3e0fe3427eeda80f02dda4fed5\", \"38333ce78110bf53a2c2abc7db99e133ad218ca43ff7a7bc\", \"d88f8fcd772125212ce09c2a6e5b5693dd35073f992004f0d18fc889\", \"ae0d1c9c834d60ff0ecfb3c0d78c72ddb789e58adfc166c81d5fc6395b31ec33\"),\n      TestFixture(4, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"60122cbd219e5cf17415e8bc09\", \"794e734966e6d0001699aec3f8ab8f194de7653d3091b1b9\", \"76bdd9a7b34bf14ae121a87fdfa144f71b848744af6a2f0b1c0d067c\", \"895a45ddbe0c80793eccbf820de13a233b6aa7045cfd5313388e7184c392b216\"),\n      TestFixture(4, \"705334e30f53dd2f92d190d2c1437c8772f940c55aa35e562214ed45bd458ffe\", \"3542fbe0f59a6d5f3abf619b7d\", \"c5b3d71312ea14f2f8fae5bd1a453192b6604a45db75c5ed\", \"617d8036e2039d516709062379e0550cbd71ebb90fea967c79018ad5\", \"dd4531f158a2fa3bc8a339f770595048f4a42bc1b03f2e824efc6ba4985119d8\"),\n      TestFixture(16, \"314a202f836f9f257e22d8c11757832ae5131d357a72df88f3eff0ffcee0da4e\", \"a544218dadd3c10583db49cf39\", \"e8de970f6ee8e80ede933581b5bcf4d837e2b72baa8b00c3\", \"8d34cdca37ce77be68f65baf3382e31efa693e63f914a781367f30f2eaad8c063ca50795acd90203\", \"3c0e2815d37d844f7ac240ba9d6e3a0b2a86f706e885959e09a1005e024f6907\"),\n      TestFixture(16, \"314a202f836f9f257e22d8c11757832ae5131d357a72df88f3eff0ffcee0da4e\", \"0dd613c0fe28e913c0edbb8404\", \"9522fb1f1aa58493cba682d788186d902cfc93e80fd6b998\", \"6df09613ea986c2d91a57a45a0942cbf20e0dfca12fbda8c945ee6db24aea5f5098952f1203339ce\", \"2ad306575b577c2f61da7212ab63e3db3941f1f751f2356c7443531a90b9d141\"),\n      TestFixture(16, \"314a202f836f9f257e22d8c11757832ae5131d357a72df88f3eff0ffcee0da4e\", \"3e0fe3427eeda80f02dda4fed5\", \"38333ce78110bf53a2c2abc7db99e133ad218ca43ff7a7bc\", \"2bfe51f1f43b982d47f76ea8206ddbf585d6f30cec0d4ef16b1556631d3b52bf24154afec1448ef6\", \"ae0d1c9c834d60ff0ecfb3c0d78c72ddb789e58adfc166c81d5fc6395b31ec33\"),\n      TestFixture(16, \"314a202f836f9f257e22d8c11757832ae5131d357a72df88f3eff0ffcee0da4e\", \"60122cbd219e5cf17415e8bc09\", \"794e734966e6d0001699aec3f8ab8f194de7653d3091b1b9\", \"bf0d219bb50fcc1d51f654bb0fd8b44efa25aef39e2f11afe47d00f2eebb544e6ba7559ac2f34edb\", \"895a45ddbe0c80793eccbf820de13a233b6aa7045cfd5313388e7184c392b216\"),\n      TestFixture(16, \"314a202f836f9f257e22d8c11757832ae5131d357a72df88f3eff0ffcee0da4e\", \"3542fbe0f59a6d5f3abf619b7d\", \"c5b3d71312ea14f2f8fae5bd1a453192b6604a45db75c5ed\", \"39c2e8f6edfe663b90963b98eb79e2d4f7f28a5053ae8881567a6b4426f1667136bed4a5e32a2bc1\", \"dd4531f158a2fa3bc8a339f770595048f4a42bc1b03f2e824efc6ba4985119d8\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"ca482c674b599046cc7d7ee0d00eec1e\", \"b4f8326944a45d95f91887c2a6ac36b60eea5edef84c1c358146a666b6878335\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"67747defe5da5fecc00b9bf3b249f434\", \"36c17fd901169e5b144fdb2c4bea8cd65ad8acf7b4d3dd39acf2ad83da7b1971\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"c57ef5d0faf49149c311707493a4cfd4\", \"9a37c654ab8e5a0c6bdfff9793457197d206ed207d768cbc8318cfb39f077b89\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"bc2fb5571a7563bb90689a229d2f63a7\", \"5ab80169184541393a6975f442ee583cd432d71a6d1568fa51159df7c5b8f959\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"428888c6420c56806f465b415a66e65a\", \"c78a22a667aafab0c94047e03837d51b11490693d5c57ea27b901ff80b6a38f9\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"9f1b7520025e1075731adc946b80121d\", \"e11e30cbf63623816379f578788b0c8e6b59ee3c9c50aa6e1dcd749172d48fed\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"bd36b053b6a90f19e3b6622cba93105d\", \"05716168829276ff7ab23b7dd373db361e6d9e1f11d0028d374a0d3fe62be19f\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"458595a3413b965b189de46703760aa0\", \"3e915389639435629fcc01e1b7022d3574e2848e9151261ad801d03387425dd7\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"8b259b84a6ee5669e175affca8ba3b1a\", \"2f496be73a9a5d9db5927e622e166c6ec946150687b21c51c8ca7e680f9775ac\"),\n      TestFixture(16, \"c6c14c655e52c8a4c7e8d54e974d698e1f21ee3ba717a0adfa6136d02668c476\", \"291e91b19de518cd7806de44f6\", \"\", \"c5f35fdf2b63e77a18d154f0ddcfedbf\", \"0a8725bd8c8eab9ed52ca47835837b9f00a6c8d834ab17105b01eb4eb30402e7\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"1a\", \"a5f24e87a11a95374d4c190945bf08ef2f\", \"080f82469505118842e5fa70df5323de175a37609904ee5e76288f94ca84b3c5\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"40\", \"ffd43c5f39be92778fdce3c832d2d3a019\", \"f6cfb81373f1cbb0574dda514747d0099635b48cb809c6f1fa30cbb671baa505\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"41\", \"fe753b7b661f1aad57c24c889b1c4fe513\", \"5a88b14bada16b513d4aa349b11ce4a77d4cda6f6322ff4939ad77d8ecb63748\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"06\", \"b91c5ac66e89bf2769ef5f38a3f1738b24\", \"a92b95b997cf9efded9ff5e1bff2e49d32e65f6283552ded4b05485b011f853f\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"c8\", \"773fe64379cea1a8ae3627418dd3e489a2\", \"a206a1eb70a9d24bb5e72f314e7d91de074f59055653bdd24aab5f2bbe112436\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"e2\", \"5dabc529442ff93005551b7689bcb748f7\", \"d3029f384fd7859c287e38c61a9475d5ddbfd64af93746b1dc86b8842a8c194c\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"1a\", \"a5ee68e416617ac974b3d1af7320cd51f6\", \"51ca3d3b70b5e354451a5177d7acfd8e7b44eae55e29d88b5e8eb8fc1e5c62fc\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"dd\", \"6243883d93d7066991e0fac453400b4fbf\", \"8c6c6791f1ac957b18bf008e260a0af4a5b7bfdb1e0008d6eaaa227f45cf4f62\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"4c\", \"f3b940d416f3435812f9d1b18f441b7721\", \"b0a1af969a95025385b251afd1e89f353426ed6e5d71019cd73366aa31d5b464\"),\n      TestFixture(16, \"cc49d4a397887cb57bc92c8a8c26a7aac205c653ef4011c1f48390ad35f5df14\", \"6df8c5c28d1728975a0b766cd7\", \"88\", \"371d27e9a32feea28a6a7e7da2d27e1cc4\", \"7e72b2ca698a18cb0bf625f5daddb0d40643009db938340a9e4fe164a052fee1\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"be80\", \"ecacc3152e43d9efea26e16c1d1793e2a8c4\", \"b5c6e8313b9c68e6bb84bffd65fa4108d243f580eab99bb80563ed1050c8266b\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"82c9\", \"d0e5d06bf4b50ccce0b2acfd16ce90a8854d\", \"38e5032c5949c2668191ef1af5bb17eddc28abdb4e5bb41eaffec2523b2525d6\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"8239\", \"d0158d784f486c1dc4a2bafd5b02ca1e1c05\", \"0b50f5173249fb7118f80d25874d6745d88e4ce265fa0dd141ad67ae26c31122\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"16c1\", \"44eda3377002a48f9fe306d157358e6df37d\", \"0296743a3125b103a2b2a78a109e825ea10834bd684215ab2e85cc4172e37348\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"2801\", \"7a2df6c09bf1dcb1c82bd98c6e2c13a8d7a5\", \"a94e64becb803e211785ba51db7f3db042fbf44a7a821509156a6828b0f207e9\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"65e7\", \"37cb2ea363c0d8864363056467570959ba03\", \"105358cc17b12107e023a23d57b44c66a2c58d8db05100311575e1ea152fc350\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"819d\", \"d3b16519377e6d0252b5f80cdf3d0253eccf\", \"669f9a63cf638a202dca1965c4116273249813ce0b39703887d89bdf5b3b12d6\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"761e\", \"24329a4dee6ca2cde473f08f76f779856c3c\", \"e288590a3eba28ac6847a50b0294ab6bd0a548716ff5102c44a5b656b2d9ddd6\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"56de\", \"04f29e65c0f01e644e74092253b470cd5511\", \"5b222aae3c7786c3b9021ba672f9136190ec931cf055f84c85706127f74c6d5b\"),\n      TestFixture(16, \"36b0175379e7ae19c277fe656a2252a82796309be0f0d4e1c07fdde88aca4510\", \"021bd8b551947be4c18cf1a455\", \"b275\", \"e059809fa107f379957b52ac29fe0bc8a1e2\", \"2082f96c7e36b204ad076d8b2f796cccf5cbc80b8384b53a504e07706b07f596\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"db457c\", \"54473c3f65d6be431e79700378049ac06f2599\", \"887486fff7922768186363ef17eb78e5cf2fab8f47a4eb327de8b16d63b02acb\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"62a6c5\", \"eda4853b186edc15c22ba24e470eb5a072da9f\", \"0683c20e82d3c66787cb047f0b1eb1c58cdde9fb99ee4e4494bbf27eb62777d1\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"cc67bc\", \"4365fc52a1fb5a58bd51931230c1a7dfb1a8c1\", \"413074619b598f8bed34cab51ddf59941861ba0169ebe7570a5ed01d790c08e5\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"33800b\", \"bc824b7d3810f59176cb108c7e969da51d4d79\", \"2d65a5175c29a095dc082dab9cfcf4b895efbfa715c57614589d4db159543ce9\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"b2c826\", \"3dca6646ffea832595c9c86e6517215541ddbd\", \"6a831b6059456be98e6fce608d8c71cb8efb04a96b45c2dfbdaeabf5420a1482\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"d7e620\", \"58e460e89a6725f0fc35622d89d2f3e34be90a\", \"3a04a01160402bf36f33337c340883597207972728c5014213980cd7744e9e41\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"795af4\", \"f658b4b1bd7ad5d81686aeb44caa6025d488bd\", \"64d8bd3c646f76dc6ce89defd40777fe17316729e22ba90f6a2443ee03f6390b\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"66efcd\", \"e9ed8d0553c801f37c2b6f82861a3cd68a75e3\", \"7bef8d35616108922aab78936967204980b8a4945b31602f5ef2feec9b144841\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"78b00d\", \"f7b24de3eeb8ea6c08b466baf246b3667feb3f\", \"92f7dc22dcbbe6420aca303bd586e5a24f4c3ed923a6ebe01ec1b66eee216341\"),\n      TestFixture(16, \"ddb739acda6c56ec9aefc4f4cbc258587f443da4e76ddfa85dbe0813a8784944\", \"0bddf342121b82f906368b0d7b\", \"9dd5e1\", \"12d7a11db811640c533794bfec6eeb977233ec\", \"71bf573cf63b0022d8143780fc2d9c7dbd0505ac31e9dce0ad68c2428b0878a0\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"87294078\", \"2bc22735ab21dfdcfe95bd83592fb6b4168d9a23\", \"fffb40b0d18cb23018aac109bf62d849adca42629d8a9ad1299b83fe274f9a63\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"0f28ee1c\", \"a3c38951b5de3331078aa13bd3742b59df4f661a\", \"75c3b3059e59032067e9cd94d872e66f168e503bcf46bc78d82a4d4a15a29f6e\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"d41c9c87\", \"78f7fbcae52afe7326a12a9aaf22255a38d4bd0d\", \"8fb9569f18a256aff71601d8412d22863e5a6e6f639214d180b095fa3b18d60e\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"046bc0d8\", \"a880a7957543692a72f0d599de48b5e5f5a9413f\", \"8b62d9adf6819c46c870df8a1486f0a329672f7d137bb7d8659f419c361a466c\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"39bd4db8\", \"95562af530fc357f5482b9004d466bf858586acb\", \"fd98f8f39dfa46ea5926e0ffacbabbe8c34205aade08aa0df82e1d4eaaf95515\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"b43cdd3a\", \"18d7ba77a9e8db046fdd548b52d40375c1e9a448\", \"09bf4f77a9883733590a3cc7ee97f3c9b70f4db255620e88cd5080badc73684c\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"e0052e9b\", \"4cee49d64efbdd4ad8d3e863172d9372fca07c20\", \"40326d765e0f6cf4b4deccb128bebf65a7b3c3e5bcf1d58f6158e1e9153b7e85\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"696825f6\", \"c58342bb95bd661b32bc18025808f8b4035acad6\", \"aa5ae6dcdc21b5446489bdabf5c6747bdf3bbfdb3de2c03170efefe5ccb06d69\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"7eb07739\", \"d25b1074ac05b072264e31a4b2801a6d790512d7\", \"d3d34f140a856e55b29471fde4c0e5f7306b76d03faab26db79c10f95ffb3122\"),\n      TestFixture(16, \"62b82637e567ad27c3066d533ed76e314522ac5c53851a8c958ce6c64b82ffd0\", \"5bc2896d8b81999546f88232ab\", \"9cad70b1\", \"304617fcc00514d260e1d211de361c254369e93a\", \"648a84813ca97aef4ab7e143ee29acb946388660f18eb671194646e0b0136432\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"3e8c6d1b12\", \"45f3795fcf9c66e1a43103d9a18f5fba5fab83f994\", \"574931ae4b24bdf7e9217eca6ce2a07287999e529f6e106e3721c42dacf00f5d\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"76fc98ec66\", \"0d838ca8bb6f3cd579294f706213ed0f0bf32f00c5\", \"99cd9d15630a55e166114f04093bd1bb6dbb94ecaad126fe5c408dee5f012d9f\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"6564c247cc\", \"1e1bd603117d38e026f706c9273dbcb6dc982751d0\", \"1516fdf7a7a99f3c9acc7fff686203dec794c3e52272985449ddf5a268a47bc3\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"c11b9c9d76\", \"ba6488d9abc3e46166767c6ad2aeffb347168b1b55\", \"0c9c35be98591bf6737fc8d5624dcdba1a3523c6029013363b9153f0de77725b\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"45a4e0d7dd\", \"3edbf4930033a7dca78bcbf4d75d651ee5fadff31b\", \"e74afe3ba960e6409dba78ecb9457e2a4ce2e09792b1d2e3858f4c79f7ddba62\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"e5861b2327\", \"9ef90f67fa11585167c83105ee16828a574c84ac86\", \"96cbe9cd193513599c81f5a520fabaff51ee8cbdb81063c8311b1a57a0b8c8fd\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"f5b5bcc38e\", \"8ecaa88753ffaba456f78e431f4baa5665f14e1845\", \"2e7ea84da4bc4d7cfb463e3f2c8647057afff3fbececa1d20024dac29e41e2cf\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"b6cc89c75d\", \"cdb39d838034714731f9503993df357954ecb19cd3\", \"be125386f5be9532e36786d2e4011f1149abd227b9841150d1c00f7d0efbca4a\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"3802f2aa9e\", \"437de6ee436c1b008b7572752f04362b2bfdc296bb\", \"3fa8628594b2645bc35530203dca640838037daeaf9cf8acaa0fb76abf27a733\"),\n      TestFixture(16, \"bc29a16e19cfbe32bf4948e8e4484159bc819b7eec504e4441a1a98ca210e576\", \"4f18bcc8ee0bbb80de30a9e086\", \"e082b8741c\", \"9bfdac30c1a3f7c3c29dc312c1f51a675400500e32\", \"642ae3466661ce1f51783deece86c38e986b8c0adea9e410e976f8a2fe0fe10f\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"1b62ad19dcac\", \"4ad1fcf57c12b14e0e659a6305b4aeffae82f8a66c94\", \"a66c980f6621e03ff93b55d5a148615c4ad36d6cbdd0b22b173b4b1479fb8ff7\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"3ef0faaa9b79\", \"6f43ab463bc779fa7932d365e2da9b05c00a7318384a\", \"c13f65bd491cb172a0f7bbc4a056c579484b62695e90383358d605307d5be0a5\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"1a98ddbf35f1\", \"4b2b8c53954f813229912137b7a4945dc07cea24a974\", \"59dcca8fc50740831f8f259eb55d4db11f763a83187d93758d78d166f4d73cd5\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"f46a7b1c28ea\", \"a5d92af088546e045f19f737a24c8addf832ed3f7a42\", \"578509ca4f57aadb78056794bf18b0714090970db786e2e838105e672165761c\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"e98f5e5a20d0\", \"b83c0fb6806edaae8a7dcd3b0fbb59438f88743ec6e8\", \"696c0c6427273cf06be79f2206c43af9cbda0b884efaf04deba0c4bf0a25cb26\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"06319c0480e2\", \"5782cde8205cd9cb636ca6543c4e35964f47341f2814\", \"95a66b60249ed086eecaeb9bc449afcee9de212619e87516ca947351b25120df\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"f4c723433b7c\", \"a57472af9bc2ec82eadf4eb1f055da1a92a82052ab8b\", \"2b411bea57b51d10a4d2fb17ef0f204aa53cf112e1130c21d411cdf16a84176d\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"02f809b01ce3\", \"534b585cbc5d01b10a7ae24a4ca2bfb07ea2a3b31a97\", \"ff3bff3a26fc5a91252d795f7e1b06f352314eb676bff50dc9fbe881c446941e\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"2b6004823a29\", \"7ad3556e9a97231323a4b88af5d7d0b07c0e73ddce1d\", \"f6be4aad63d33a96c0b5e9c4be62323c9e2308b29961fff980ba0dbda0549274\"),\n      TestFixture(16, \"5f4b4f97b6aa48adb3336c451aac377fde4adf47897fd9ccdf139f33be76b18c\", \"7a76eac44486afdb112fc4aab9\", \"236c60cba4fa\", \"72df31270444db30eb33d2ede33abbe22f37704fe68b\", \"c3706a28d7420b41e072dcecc06b6b13116cca110bde8faea8e51f5107352d71\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"d48daa2919348d\", \"eb32ab153a8e092fa325bafc176a07c31e6cc0a852d288\", \"e97175c23c5b47da8ce67811c6d60a7499b3b7e1347ad860519285b67201fe38\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"f95b716bfe3475\", \"c6e47057dd8ef1a24840f4f40a7963becde3a85968b29c\", \"ba45e1859efae362a44a0116a14e488ba369da6c76c3913b6df8e69e5e1111fa\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"4862e3677083f0\", \"77dde25b5339748f2a4a5c276727e0a210fc2efb5aeabe\", \"efcaa6f6cda3036b0b52ff9f36bc38ca74049c32c6b7cdfb8a46ca4144bacd64\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"7f1ca0728f6d65\", \"40a3a14eacd7e1051734fc31232ab2ab63474020ab4dc9\", \"360bcb407603fe92f856bf677625b9882521e6dae8f35fdfc3dc737f9398f609\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"67478ef73290fa\", \"58f88fcb112a7ec715244f307609ffa253e4e3659b0ece\", \"f12ee9d37946cfd88516cbe4a046f08c9bbba76a3973ff1e2cb14493405bd384\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"36bb9e511276c5\", \"09049f6d31cc41f11047da612d2987fa2e50ada5ae7f9d\", \"5833dde0c577b2be4eb4b3d01d7b0042fa8441ad7043ea462bbbbd56a59790ea\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"d68d6556c5a5b1\", \"e932646ae61f35382f7648718127ebae7eb7443ebd2c2c\", \"1e103c63d8ead36b985f921044cd32b8f9f04a2ba9fa154a09e676ffaa093970\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"0568cca4ff79dc\", \"3ad7cd98dcc358cc40a5e7fffb1fb9a5dd9d6ba91bede1\", \"a1cfb61d45a140bdea6329ba0fe80429ff9aa4624a1d31bc752f7c97f1d390a0\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"bd93d08eea4263\", \"822cd1b2c9f8e7468d2b70c311732f11ed72b57d83e500\", \"116b5b015e44ceef0061b2d2e73fa0b386d5c1e187782beebdfc6efb5a1c6935\"),\n      TestFixture(16, \"f7aaeff3a1dc0cc5ecf220c67ad9f6dda060b4f1be3cc609cb4f18b2342a88a2\", \"d0d6871b9adc8623ac63faf00f\", \"4fb62753024e92\", \"7009266f21f416b41a70f548e359add30c0e5746fbeb2b\", \"3d55882e6f3f89309b6940a3b408e573458eedd10fc3d0e1f3170eb313367475\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"e5653e512d8b0b70\", \"75d31f8d47bee5c4e2ba537355ae8ab25cc9ed3511ff5053\", \"579a637e37a0974cd2fc3b735d9ed088e8e488ffe210f043e0f9d2079a015ad6\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"2c4ba9ce52e01645\", \"bcfd881238d5f8f1781a9e359804831f31a1efb1ae1cb71d\", \"1583138aa307401dddc40804ac0f414d338fc3ffb2946f09aaaa7079426fc1ee\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"5eb2d054a0e58c62\", \"ce04f188cad062d62dcc77c4e1fe2bafd477598977835f0c\", \"78d3dda40e433bba7a330ca3e5bd5170f0895f2e3e438402344ced79fcb0c719\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"bbbf7830d04ab907\", \"2b0959ecba7f57b308946723baf0dbf613359b6e040f9bd5\", \"dfc762466fa84c27326e0ee4320aa71103d1e9c8a5cf7d9fab5f27d79df94bd6\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"10c654c78a9e3c06\", \"8070751be0abd2b2003bd62ca51f74088bbbd33e54ac9dd4\", \"7e8ea82d1137c1e233522da12626e90a5f66a988e70664cb014c12790d2ab520\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"668d32e322e1da3e\", \"f63b133f48d4348a67e65e7f2cdedf6ef8cc0ee7a6dcfb02\", \"873da112557935b3929f713d80744ed08b4b276b86331dbc386fba361726d565\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"e39f6225e8eab6cc\", \"732943f982df58780532f8c6639e5d6c7b755fcf516724e3\", \"cfba97919f703d864efc11eac5f260a5d920d780c52899e5d76f8fe66936ff82\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"6021a00f6d0610a4\", \"f09781d30733fe107fd7a33828413ebc252dd9d015773524\", \"01abcfee196f9d74fcaa7b69ae24a275485c25af93cc2306d56e41e1eb7f5702\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"bbaf0ac4e77ee78d\", \"2b192b188d4b0939d3d51368799325ad1c8233fa071bade0\", \"ce1c31e7121c071d89afab5a9676c9e96cac3d89dcae83136bbb6f5ca8f81e5d\"),\n      TestFixture(16, \"493e14623cd250058a7fc66a3fee0c24b6e363b966c2314aff53b276b6c2ea7b\", \"fe2d8ae8da94a6df563f89ce00\", \"98a2336549a23a76\", \"081412b92397d4c25d1ea568637f773174a7f920a51b1fe1\", \"bb210ca5bc07e3c5b06f1d0084a5a72125f177d3e56c151221115ae020177739\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"615d724ae94a5daf8d\", \"f019ae51063239287d896e7127f17d13f98013b420219eb877\", \"69adcae8a1e9a3f2fe9e62591f7b4c5b19d3b50e769521f67e7ea8d7b58d9fc8\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"0d9168eeab3b27ba69\", \"9cd5b4f54443433d997cc2cd61da9358b4045fef32f8192cbf\", \"162d0033c9ea8d8334d485b29eef727302135a07a934eea5fee6041e9f1f47c1\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"6287dcffdd5fb97885\", \"f3c300e43227ddff75d280f0ffdd560fb8915978e3bd6205bb\", \"3f4ab57efa32f51a4c00790280e77c0e55b85bbda4f854e242368e9a289b5a81\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"6e5e01b3fd71d16b9c\", \"ff1adda81209b5ec6c7dbf90420a1ff2e24bd6303b80cfc199\", \"945d18134c148f164b39fd7c4aef0335045553f6ea690a3b1726418d86f0de00\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"b51521e689b5247362\", \"2451fdfd66cd40f492d741f4329ae7cc77d42bf7e5f2ec5ab6\", \"23af12893431b07c2922ab623aed901c0eaaeb9a24efc55273e96aea4dab7038\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"7f973617e710fb76fe\", \"eed3ea0c08689ff10ec9ffdcc2f36edac14613b1d85baf25a9\", \"b15a118b3132c20c31e6c9d09acdee0e15fcc59d6f18306442682512d22eb10f\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"7e909b6727ac3fd02f\", \"efd4477cc8d45b57df5a61a28bb10265b26043d7a8dd357713\", \"dcfbeb6490f5fa7eaf917462473a6cec98bebf8f17493fe9b994119a6d5a5457\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"a5075638932b5632f8\", \"34438a237c5332b508d321c371ae1fd01bdf3b6c75a597da6e\", \"77e9317294f046f315a0d79e3423f29f7d9ebcd36d6eaa2a3fb2f4500309478c\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"c10f15a0de78db8aa3\", \"504bc9bb3100bf0d539393d1635bc40ac62405a39155406c47\", \"3aa8f204eb127b547e13873ed0238018394e13686c8734e49e3e629deb352c77\"),\n      TestFixture(16, \"b23255372455c69244a0210e6a9e13b155a5ec9d6d0900e54a8f4d9f7a255e3a\", \"274846196d78f0af2df5860231\", \"8294f830cfca42cfbe\", \"13d0242b20b226484eff89641e1bd5ad6cc827441b17c45ecf\", \"7f67e6f97c6c258f014d721a4edaaa0ddb3f9f09993276ab7b714ea9356c231d\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"2e3cf0af8c96c7b22719\", \"e317df43ab46eb31be7e76f2730d771d56099a0c8d2703d7a24e\", \"9ae5a04baa9d02c8854e609899c6240851cbc83f81f752bc04c71affa4eed385\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"e081c43a07450ce0dfa2\", \"2daaebd62095206346c5bcc7a8260ef361dc39fdb776d041f0d4\", \"da77c6d5627a2aa34911bd1f7cc5f8aa68a2c6546adc96a186b9af8e5baac4cf\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"c381d2ae5e72fc82324a\", \"0eaafd4279a2d001ab2d19f0cbb0899f221aac9762f2650f8058\", \"134d2d9726400d09dd3521326f96fbef993ddc0c4088770057b0f8d70356456f\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"737f4d00c54ddca80eec\", \"be5462ece29df02b978b3dc92a9bd26b9653e5917359c331fcff\", \"0d065dfde1de1f21784c7869eb566c977f807cfbd53578f4616995b51d7dc045\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"4e9e251ebbbbe5dbc8ff\", \"83b50af29c6bc958519891dda72c27d272561e00f7041845d998\", \"95c54d187f2415535451cbb9cb35869749b171f7043216ce6886dd77baeecf60\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"0db72b281ab4046d15a6\", \"c09c04c43d6428ee8cc1928ac628758ad58fc1b5a768d4722848\", \"0f98039e6a9fe360373b48c7850ce113a0ff7b2ae5ce773dd4c67ca967cd691b\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"4f7b4f38ff1ba4df5a59\", \"825060d4d8cb885cc33ed11dad4dc8b265a53cf0bdd85c5f15f4\", \"ad840bc55654762e5eba0e4a9e7998992d990a06d70da1b1ca922ef193dab19a\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"58ce55379ef24b72d6d6\", \"95e57adbb92267f14fb18eb659a5a7084be48d099467da4395df\", \"911e9876ea98e1bcf710d8fd05b5bf000ea317d926b41b6015998ee1462ab615\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"a219028a953ce1544835\", \"6f322d66b2eccdd7d1523b2b2583fd117cec47b1c84d3863159e\", \"3f68a4fb4043bcf9b6d277c97e11365d949c705bd6679c6f0aaf52e62330ad79\"),\n      TestFixture(16, \"dbf06366f766e2811ecd5d4384d6d08336adc37e0824d620cf0d9e7fd1e7afa9\", \"b3503ed4e277ed9769b20c10c0\", \"83b0ee9a52252c456105\", \"4e9bc17675f500c6f8625456eb2b6a2d35c649a84051f843153c\", \"02f32242cba6204319075ea8ce806a57845355ae73e6b875955df510096ebff9\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"8015c0f07a7acd4b1cbdd2\", \"8e9f80c726980b3d42e43a6512a0481255b729a10f9edb5f07c60c\", \"9bcc5848e928ba0068f7a867e79e83a6f93593354a8bfcfc306aeeb9821c1da1\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"c97b62a719720b44b7779c\", \"c7f122904590cd32e92e748c514444f00ffdb80a4bb7e9eb651946\", \"c2e75952ab49216f305e3776865791ce877cef8c0229ca97561787093fddf1d8\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"cb7c17ef62464ecc8008f6\", \"c5f657d83ea488bade511edb609dfc1929ac1ba5753fc83bf945b7\", \"c76a3ff4e6d1f742dd845be2d74c1a9b08e418909b15077deb20373ef55caf91\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"893a690cc5221de597d0e8\", \"87b0293b99c0db93c9890053b74283296d0fca83b262915289163c\", \"bdb69f99f9a144b9ad88c6cfd8ffb8304c201de9b2818552ce6379e6042c1951\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"80f3e4245c3eab16ef8bf0\", \"8e79a41300dc6d60b1d21888a34955893059d66549795b3ac2105c\", \"01815f599d6ba0d1c09f6f673bb6cca4c2a7a74f4e985be4c0f37842c7bbc5a4\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"641c6914920a79943dca39\", \"6a962923cee8bfe26393d1377c4e2f20aaa872a9a0b1d1d7f56df0\", \"a9db62e9ab53c4a805c43838ce36b587d29b75b43fb34c17a22d3981120f3bc5\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"2286a1eddd80737a724ca9\", \"2c0ce1da8162b50c2c15415545aa0c1dd11551891ae553d3a91908\", \"f0c2cc5a1b4c4cbe839338fa0d7a343514801302aef2403530605cf4f44d2811\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"d8c63e7d7d332198249c0c\", \"d64c7e4a21d1e7ee7ac5e4d9e07ec5806360843676ef27d811b246\", \"9842922499ad4d487488b3731f48765efe0b4eb59e7b491ba5f6636f09ed564d\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"4b81804d777a59b6a107cf\", \"450bc07a2b989fc0ff5e27483b8727c5753ede25e1fab0d86963be\", \"399b71ecb41f4590abda79045cdf6495f27daaa559c1b34f513b5c4ac105ec10\"),\n      TestFixture(16, \"4dd555bd3a5253a90b68b5d4d46bd050340ee07ddad3a72048c657b5d76bb207\", \"bdb1b82ba864893c2ee8f7426c\", \"dfc762466fa84c27326e0e\", \"d14d2271334a8a516c37e64b5c3c1dc577ee8fcf6ef3ebc0783430\", \"2c186c5c3463a4a8bad771feb71e2973c4f6dede2529827707bf4fa40672660f\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"a203aeb635e195bc33fd42fa\", \"62666297a809c982b50722bd56bc555899345e0404b2938edf33168e\", \"ea26ea68facdac3c75ba0cdf7b1ad703c9474af83b3fbfc58e548d776b2529b9\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"aac414fbad945a49ae178103\", \"6aa1d8da307c067728ede1449b15447c904b671824c2ca24c4fc7ad4\", \"0b32069fc7e676f229f1037d3026c93eef199913e426efd786b524ce1dbde543\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"7ee0ce371329192618e3cda0\", \"be8502168ec145189e19ade7ea13850e99ef9300c65f5abc9419d13a\", \"7a8658302e5181552292aa56e8209de63b5d86934167549b0d936202681757e1\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"b0a1af969a95025385b251af\", \"70c463b7077d5e6d034831e8486c93c31bbedc9e5ffa2f4154bceea9\", \"4f05600950664d5190a2ebc29c9edb89c20079a4d3e6bc3b27d75e34e2fa3d02\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"9f6c6d60110fd3782bdf49b0\", \"5f09a1418ce78f46ad2529f7f18b556e7da59fd2549dc57a17bf64f8\", \"4530e4dc6a4c3733b8ab7e77e384223cc1a8c179fb66818c08aca47e5c705d89\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"90958d7f458d98c48cbb464c\", \"50f0415ed865c4fa0a41260b30aad3a838680cbd313004685a5510c5\", \"f179353aef342f0f691caf1fcb811e3f6504e14d6d9381c5439b098ff978b01b\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"9f7ae892e5662803408d4d06\", \"5f1f24b3788e743dc6772d411d57b89ed0c91251aed37a6ca68a50c7\", \"f6df267e5cbc9d2a67b1c0fd762f891ee3b7c435884cb87d8228091b34aeddae\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"817074e351455f23cb67883d\", \"4115b8c2ccad031d4d9de87ad79a3b0feea16ff5fbca16211ea6fdd9\", \"4372e152b1afd99c7f87c8a51dbc3a5c14c49d04ea1c482a45dfbcda54972912\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"1b7da3835e074fdf62f1eb3c\", \"db186fa2c3ef13e1e40b8b7b49f22737c4b2f9fa0a7e3dd4b067fbaa\", \"82b6cd1c6618c42ba74e746075dc28700333578131ca6fde6971d2f0c6e31e6a\"),\n      TestFixture(16, \"d3ad8cda9a0d91a205c4c05665728bb255d50a83403c9ab9243fcbbe95ae7906\", \"0b5f69697eb1af24e8e6fcb605\", \"57473e7a105c806867379194\", \"9722f25b8db4dc56e1cdf1d3ef43a48dbea8c1547455ad0197af88a2\", \"a5422e53975e43168726677930f6d3e13281bdbd13c67c168340ed67e45d15b0\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"8714eb9ecf8bdb13e919de40f9\", \"ba6063824d314aa3cbab14b8c54c6520dac0f073856d9b9010b7857736\", \"9b1d85384cb6f47c0b13514a303d4e1d95af4c6442691f314a401135f07829ec\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"a0837676e091213890dc6e0a34\", \"9df7fe6a622bb088b26ea4f20820a423dd30796b6016baff106aaef206\", \"fa17c693d0997140fbc521d39e042d8e08388106874207ca81c85f45c035d6e6\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"b8a2ce7e051b8d094ec43f2a7f\", \"85d6466287a11cb96c76f5d2436032bc79c4aef1f74da25e92b0aa7f8a\", \"27663597b389b78e96c785ca2f5510c8963a5561d2b0b24c4dcdf8e58562c12c\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"9e4103ab1dfb77ae3494507332\", \"a3358bb79f41e61e16269a8b0e658123d2e5bb324c7ead8897f8e32b0a\", \"d8f1a83371487d611ce704e0a6731f97a933c43569690022fce33cb5aecdc0a7\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"fb3e3d1b6394d2daebf121f8ac\", \"c64ab507e12e436ac943eb0090270758ab09f93fa3ba7d7a2aa8eac789\", \"05c57aab99f94b315cf8bdd2d6b54440c097fe33c62a96b98b1568cdee4ce62c\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"549ba26a299391538b56ce4bd7\", \"69ef2a76ab2900e3a9e404b3eb2293813f1bcb96564f772e9308e42b2d\", \"1c1b0933c508c6a8a20846ebd0d0377e24f4abc0c900d3a92bc409ba14ef1434\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"287f31e69880823df7798c7970\", \"150bb9fa1a3a138dd5cb46814c81877380d5cf097c2fb5177750f8b53a\", \"9f5cf9149f556124d6bb4e3e243cca1502c02682709392cc2ec7eb262fd4d479\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"040d18b128ae4a1935f9509266\", \"397990adaa14dba9174b9a6a5acf42c75787edc62a180568c6ef56545d\", \"1a49aaea6fc6fae01a57d2fc207ef9f623dfd0bc2cf736c4a70aaaa0af5dafd3\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"92441cbe8d70820870bb01ad63\", \"af3094a20fca13b85209cb555f56d47a0631f2038103e3904b556ba7a5\", \"f29a0b2c602ff2cacb587292db301182e6c76c5110b97ca8b706198f0e1dbc26\"),\n      TestFixture(16, \"e300fc7a5b96806382c35af5b2c2e8e26382751b59010d4b1cfc90a4a9cb06df\", \"55b59eb434dd1ba3723ee0dc72\", \"f11d814df217de96333dee1cbf\", \"cc69095170ad4f26118f24e4835be15b7ae24edccd0b0934e3af513ed3\", \"01fcf5fef50e36175b0510874ea50a4d2005ad5e40e5889b61417700d827251e\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"959403e0771c21a416bd03f38983\", \"37a346bc4909965c5497838251826385a52c68914e9d1f63fd297ee6e7ed\", \"0245484bcd987787fe97fda6c8ffb6e7058d7b8f7064f27514afaac4048767fd\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"23fe445efa5bcb318cc85e2ad1ac\", \"81c90102c44e7cc9cee2de5b09ad364b603de6afbc2d96d00510894ccbe7\", \"52f6a10a022e5ee57eda3fcf53dcf0d922e9a3785b39fad9498327744f2852e4\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"762fdc3e0c30c7ecf2ec8808bb79\", \"d418996232257014b0c6087963781a4321c2ddbc35ce4864457d611219e9\", \"d236e3841b9556b32dbd02886724d053a9b8488c5ad1b466b06482a62b79ebb6\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"b6813d5fe8afa68d646c197337a2\", \"14b67803d6ba117526469902efa3296e55efebb17fe145cdca9b31ea7bcc\", \"0d2739cfdac782b61f484fa1a423c478c414397ec420327963d79112b2d70a7e\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"4ce8b6578537215224eb9398c011\", \"eedff30bbb2296aa66c113e9181059270a0510e7cc1b599705853af2144d\", \"7f291aa463c4babc76b4a6faf2e27e9401586b1ac83e4b06a4090e94b3ef5fd4\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"9ebf93643854ea5c97a4f38f50bd\", \"3c88d63806415da4d58e73fe88bcb55847573bf21e946ce9bdc5f569e3ff\", \"06bca7ef6f91355d19f90bf25590a44a24e5a782f92bc693c031e6de1e948008\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"da989cc7d375ed5fac4d7f938d74\", \"78afd99bed605aa7ee67ffe25575b8a61c5687ea02f0276824b8316b76f1\", \"5a44ff94f817c7c028a8f3db35a4d01364d2598432469f09ded86e5127d42d35\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"6fbab5a0f98e21e4d15904af5948\", \"cd8df0fcc79b961c937384de8149a07ee02791011129fcacffcfb1bf4145\", \"2a755e362373ef27a911c4d93ca07bc97135645442ad7ad6a8ef98146c71e9d7\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"b610349e8b370a7c195598573637\", \"142771c2b522bd845b7f1826ee36d34204b1ce23f5f58a8eb7cf1fa8cfa7\", \"f7988873f45a5de314e5381d3f14d8f8c48c9b649bf3e745ed5dc882d507da58\"),\n      TestFixture(16, \"3ae5be5904bae62609ac525e2d1cad90133447573d7b608975a6a2b16cb2efc0\", \"61bf06b9fa5a450d094f3ddcb5\", \"1d969fd81dab5ced3e6ee70be3bf\", \"bfa1da8423beeb157c44677a3bbe9c618bb88bbcefb008a5ea6bed4ff949\", \"95d2c8502e28ab3ee2cac52e975c3e7bccb1a93acc33d9c32786f66d6268d198\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"54be71705e453177b53c92bbf2ab13\", \"788db949697b8cd9abbc74ed9aa40cd6852dc829469368491149d6bb140071\", \"5e60b02b26e2d5f752eb55ea5f50bb354a6f01b800cea5c815ff0030b8c7d475\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"22197f9ad14591e7a6d5f8b18c969a\", \"0e2ab7a3e67b2c49b8551ee7e4998556940dc5a7e44bf10234806d00a012b5\", \"210c04632341fbfc185bfe3cbf6fe272bbe971104173bcb11419b35ab3aaf200\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"096b2f530933c1273304a6ad423726\", \"2558e76a3e0d7c892d8440fb2a38390898f7dbde25b0b70d335df71a06987b\", \"d3a205dd017e79a67400a937a20ef049f4c40d73311731f03ab857a3f93bd458\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"d44fdfd9da3a63c1083afe574e91bf\", \"f87c17e0ed04de6f16ba1801269ea02fd10d1f21b6b963c05aeda8eb09e272\", \"0c9b3ba4faf5fc2f310ad1bab06c4ca13474b714feeffb6ad615c1b850bbd6a3\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"8d836acc13ed83c2b2c706415c9679\", \"a1b0a2f524d33e6cac47e0173499664491d23d90ff55abca17e9d943b98c7f\", \"d9bb71ad90152d5c1af358c8501fa89ebd4b17bf4ff43841528cccb79fd791b3\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"2a68e3fe746f593c1b97cb637079c3\", \"065b2bc74351e49205172d351876dc9616886c6b2adc97db5a673846b6662c\", \"69dc21eb6f295b12ba493ee8fe6c40d78af946067ce772db316a3cbf00d3c521\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"39799b001ed2c334c269acb0f2328c\", \"154a533929ec7e9adce94ae69a3d932441dcae1760db90379bd354fa99164e\", \"095eb52135dc6d9c1f56a2571c1389852482e7aa3edc245a3904a0449db24a70\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"42143a2b9e1d0b354df3264d08f7b6\", \"6e27f212a923b69b5373c01b60f8a9c7c7deb28bdcf84886ef843216b94449\", \"efd7270e0396392fde8b0ddaab00544cbbd504f4d97d4e90d749d1946de90dcb\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"a3dcf26327059a4245b79a38bb8db6\", \"8fef3a5a103b27ec5b377c6ed382a935061ae3cd892ba63c44b809d6d29421\", \"8bc181ce2e66294e803a8dc3834958b5f173bc2123c0726e31f3fca25b622ed6\"),\n      TestFixture(16, \"fab62b3e5deda7a9c1128663cc81c44b74ab1bfe70bc1c9dec7c7fd08173b80a\", \"a5c1b146c82c34b2e6ebeceb58\", \"3d54883449ecca8f153436c25a0a01\", \"1167400d7ed277210bb4d09432051e3c9ae69a4c59ff8e251c2fe022d065a9\", \"c39ec70c2c71633ae0dccc41477ac32e47638c885cf59f34ebd4a096d32f91f9\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"d15f98f2c6d670f55c78a06648332bc9\", \"cc17bf8794c843457d899391898ed22a6f9d28fcb64234e1cd793c4144f1da50\", \"718d13e47522ac4cdf3f828063980b6d452fcdcd6e1a1904bf87f548a5fd5a05\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"60d55a8d5ab591a51e87fdf6aaa2ad25\", \"7d9d7df808aba2153f76ce016b1f54c68b55bbe42d8c97504b97c34a5f16e6a6\", \"a371ca29b92ed676bab5dfc4d78631bb6d9bb23a29f822907084a1f0fe17721f\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"cbf112e4fb85276c4e09649f3de225b2\", \"d6b93591a99b14dc6ff85768fc5fdc51017d8706acd676ae99e93d5312a4113c\", \"01ec87920b42639d4ba22adb1fbe5138d2849db670a2960fd94a399c1532ed75\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"865b89aa38ee1b5a3ce56620307e8937\", \"9b13aedf6af028ea1d1455d7f1c370d45982f0fe5d951a8c62c87894657301e4\", \"eebd2bbf1e9f6d817cd8062a6a9680e7f10464eefeb50b07cb46b14b9b3fcb2c\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"a8efc37d1b8b51f2a47b21dd14da383d\", \"b5a7e40849956242858a122ad567c1de5addfddbb59f4985947fb3a9ab56333e\", \"72863362612f146699f6b2f6ec3688f2ca6cb1505af7a309c91c1933e34d516a\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"d9b0eaaff786165f882f41a98dbc0c35\", \"c4f8cddaa59825efa9de725e4c01f5d6b651053516673402a57538db1a9ce7e9\", \"9c9efc6593f96207678db813608f2b8bc33ed1bef974ed77ed7b6e74b621b819\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"df49d972b6ebbbb18ee975ac635d847e\", \"c201fe07e4f58801af18465ba2e07d9d86d772b1a1991b7be6589bbccad36171\", \"dc482a051b58d8a3904d3af37c37b51983f634a504451bbba6f77d71337f8e78\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"78318aa5cd16699b77bdcea2fc9d1d20\", \"6579add09f085a2b564cfd553d20e4c3569387a1a6bcc826e94012670820576e\", \"51ef065a43caa23faf750b02a41ad6ba701aeb8058f6d8738d6f6b005bec7f60\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"8e20d65d02dd9a64379f75b6d8328f2d\", \"9368f12850c3a9d4166e4641198f76cee9c788b4aae9b2c6caf0c44aa9bd2ed0\", \"88e2a74d2920c89c6a101f5f06d0624a6d5eabd9bdb51395ee3983934c55c73d\"),\n      TestFixture(16, \"ee8ce187169779d13e443d6428e38b38b55dfb90f0228a8a4e62f8f535806e62\", \"121642c4218b391c98e6269c8a\", \"97e8d8513af41b97801de98cc4269096\", \"8aa0ff2468ea2827a1ecda7b059b6975f1df0f01944641a1b04d753e6ab8d3cc\", \"ada3ed7db2dabbfbc441ef68a5656e628d6d5bd6c1574369688497179a77601a\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"b0053d1f490809794250d856062d0aaa92\", \"a6341ee3d60eb34a8a8bc2806d50dd57a3f628ee49a8c2005c7d07d354bf80994d\", \"217d130408a738e6a833931e69f8696960c817407301560bbe5fbd92361488b4\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"51eb190c6a9f46e8ec1628b090795470c0\", \"47da3af0f599fcdb24cd3266fb04838df13c1c5755a5a240c33b2b890a486aac8b\", \"4ae414bc888a42141d3060c71c2dbbffd425b6a952806982271a8e756b3c9e24\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"25144e807e389bb0e45b6dc25558caf61a\", \"33256d7ce13e21832c8077143e251d0b2b4cfca1c19abf447d7bc0898d61885144\", \"7b7f78ae1a5ee96fdc49dacd71be1a6ac09a6a162d44dea0172886eca5674e46\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"dbe1ee14abfe2ecf4edf6db206cf9886ce\", \"cdd0cde834f894fc860477646db24f7bff229cc7a390867a245dcb7c434f1db347\", \"03f31c6143b77f6ad44749e2256306b8bf82242f2821fad4075b09b388ba81ca\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"db6df31f12bf552f81deff5fa2a373fc22\", \"cd5cd0e38db9ef1c4905e589c9dea401135361b539f9fe0fb7842907c2326aef63\", \"030390adb572f2bd2a6a4454fd68236cd1d465574328aa001d553375cc63f8a2\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"ff2a97b49fcc6a50d4549c979d53ccc51f\", \"e91bb44800cad0631c8f8641f62e1b382e8ed10943929e7d7bf798b2ae8371aae5\", \"7294ae94358669f2ada4b64c125b248df7fe86c6715e3b6a7b9bb2bd99392c8a\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"73ddfa0185200a890b7690a7e3986d8818\", \"65ecd9fd1a26b0bac3ad8a7188e5ba7529f92b9e49ab83f113f8949dc9e4a36e0d\", \"4d1513478fc1fb0a18eb6d2a9324fefbd975ecd1b409025de826bc397462acc1\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"5c7604f9ac8fdf30ee5820e5aeb75b65d7\", \"4a4727053389650326833a33c5ca8c98e6d0e53223adff22a08e3dddf66fff23e3\", \"b26a7ff61bfe94864249af7cc9b4a723627dd4463f5a22f0ca6063769522eab7\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"d44fdfd9da3a63c1083afe574e91bf01c9\", \"c27efc25453cd9f2c0e1e48125ec68fcf833f49a42521a7a2367f91bfcc2180b7c\", \"960f9a85cfbfb6eab223a4139c72ce926a680ea8e8ecc3088cf123de659ad310\"),\n      TestFixture(16, \"7da6ef35ad594a09cb74daf27e50a6b30d6b4160cf0de41ee32bbf2a208b911d\", \"98a32d7fe606583e2906420297\", \"bb515dc227abb9acad8fefaa14771bb77b\", \"ad607e3eb8ad039f6554f57c7f0acc4a4ac08bd395c6807223311070659f550934\", \"3718467effb5d5dc009aaefce84d8cb4fe8f80eb608f4c678f5d0de02ea11e59\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"6a26677836d65bd0d35a027d278b2534e7df\", \"d1c1f3c60603359c7d6a707f05ecb2296f8e52f2210b7a798ad5c778ee7cfd7fe6e0\", \"67874c808600a27fcab34d6f69cc5c730831ad4589075dd82479823cb9b41dc3\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"4021ff104ff1dbd91e46db249fd82198b0a1\", \"fbc66bae7f24b595b076a926bdbfb68538f00923bb5a347af13df12f234fca5f03ef\", \"e0c27cddf919d3092d9a34766c89a5ae6dcf39fe954d1e6f1a70ddf96805def4\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"6a681f164efce199a787bccff223b8ae1a98\", \"d18f8ba87e298fd509b7cecdd0442fb392c9d03ed7bffac83e890caceb6903d9cab5\", \"7ae9eca03f616ab39ebb3be26b848842b4aa584e5c8e5695065ad5af34951175\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"7861dac338ba3f8274dca04c8c6f92b6d44c\", \"c3864e7d086f51cedaecd24eae0805ab5c1d4dd8f30870025b2bd1e2a2511574d3e7\", \"b47c9bc4eb01c74f5db2e6a293bef80db18c58cf06feef7ee0f8a7a9a51c22bb\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"a3f0473c620d2739d5ba4f7156f88d0fb669\", \"1817d38252d849757b8a3d73749f1a123e386046d17f337f3cb49884d94995edbdc9\", \"f6afd661f218c7426b92ee53e65d14898cd0c78a7e594fcc6ac0e3fb5cab1c9c\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"07c535d9456a6ff1e41321150d16dae3f7a3\", \"bc22a16775bf01bd4a2353172f714dfe7ff25fdc77b43bca254d6459263cdfed8fbb\", \"d3802911e341577046cfc61d9043b4af059fb4bef3c6a2ff46ccdcb05670af37\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"5ee220720a896249efdab2ce418318bb5ebf\", \"e505b4cc3a5c0c0541eac0cc63e48fa6d6eedd1a1d36c8164c55d55dbf0ff1e9517a\", \"db60720db67a60ca286fe744d46173c231fbcc7deb4c9b0d87d52a2247e06b74\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"98e4eb0361c8bf40bcbe0539b0850e4c35ff\", \"23037fbd511dd10c128e773b92e29951bdaeb476e2ca48fd52bec0539b00744a8a07\", \"57f70ba5493265b30491decc726354e2065e7971a2efd56db9cf0f79b1d76859\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"7f0745bea62479c0080ecec52e37c1e32d72\", \"c4e0d10096f1178ca63ebcc70c5056fea523fad68c62b81d62f2d490ae74f5bb1465\", \"4a29b9ad548964942f87f28ba267ec0d0e8f72c73b3823ee57693dd63c2605c1\"),\n      TestFixture(16, \"0786706f680c27b792d054faa63f499a8e6b5ddb90502946235bf74c022d772c\", \"f61ef1c8c10a863efeb4a1de86\", \"e99ed2ac6c38e033061b5d85f3e77dd72518\", \"527946125ced8e7fa82b2f87d180eacaad4913b15d8000266c61ba5aec898eb35b52\", \"acbd2e9911b3218a230d9db5086d91dccac3fc93fc64b0f4a15d56954906b2b7\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"c1a994dc198f5676ea85801cd27cc8f47267ec\", \"7c9b138177590edaafec4728c4663e77458ffbe3243faec177de4a2e4a293952073e43\", \"89ad6ae1e550975eaa916a62615e6b6a66366a17a7e06380a95ea5cdcc1d3302\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"791e232bfb42fb18197adc1967da1a83f70168\", \"c42ca4769594a3b45c131b2d71c0ec00c0e97f8422f736fc435687634d42254b22fd99\", \"dfddb719d00398bf48a6cefd27736389e654a93b8595cd5ac446af1996e0f161\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"3d4127942459bb8682e662dfc862467582fa68\", \"8073a0c94a8fe32ac78fa5ebde78b0f6b5127f38a96e68ef7dbaef1b460cc0980eacd4\", \"58ef310997dcaf067dd217274921504da6dbf0428a2b48a65fe8a02c616ac306\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"0e71863c2962244c7d1a28fc755f0c73e5cbd6\", \"b343016147b47ce03873efc86345faf0d223c15c5c702a82d468929227502e4e35796f\", \"511e5d5e100b595f6b20e791830bca37e23f7b785e482a58405bffe7a632a5b8\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"e0f1cd013e6aea4fa484fc3fa35d348b1a2399\", \"5dc34a5c50bcb2e3e1ed3b0bb547c2082dcb8e89188c0940182dd99a902d158c5b0810\", \"e48dfaa53b6807ea6f01d8dca67960b9f321f7851f324459a9bf61fe0be73abb\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"b1cc1946b4fc1dbd033254cdf536f61e9f9cd7\", \"0cfe9e1bda2a4511465b93f9e32c009da874c015849acbb7af1892790300bb84fb0558\", \"c12c0423fe36e4c88775dd00b4af267b85b7dd2a37a742a3156923c8917c97a3\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"87284658928208e3bddca83e3ceb13708d88d4\", \"3a1ac105fc54504ff8b56f0a2af1e5f3ba60c3e75aaf3077ac6dfb5454851ec3910de6\", \"4255f8af18df7237e0abe98421aec9634443561752d893aaffe76380e829ef32\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"bdb79f931ef3035a33bdd1b032fd9de8f6b2ba\", \"008518ce70255bf676d4168424e76b6bc15aade70f42e3e1f2b5bb58433bd11f5dea1f\", \"ab83567833d2f3461b5fbecc0e366694bb5ea00933b2b3e792ec3aefe20325df\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"1f9c3a8eb8bc59f3869e10f73883aa8f8990cb\", \"a2aebdd3d66a015fc3f7d7c32e995c0cbe78dc564f6248cefe5fc7cfb547c90a558925\", \"bd1446ba3185d1c16551730947c22142142caa8cc1c540e89ab734ec297401bc\"),\n      TestFixture(16, \"bac55f9847d93325bf5071c220c0a3dfeb38f214292d47b4acb7b0a597fe056f\", \"05b50c458adbba16c55fcc454d\", \"5f28809181f9a889894da8d6fe1fde6cce354a\", \"e21a07ccef2ff025cc246fe2e80528eff9dd5db52249d812f7f235afa0732e984e91b2\", \"b87577755d2d9489194f6f7cfabf267dc3433a9c91954e81beb72c5e06870922\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"7b125c3b9612a8b554913d0384f4795c90cd387c\", \"6cc611d816b18c6847b348e46a4119465104254a04e2dfeeeac9c3255f6227704848d5b2\", \"7aebdfd955d6e8a19a701d387447a4bdd59a9382156ab0c0dcd37b89419d6eff\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"8b013f5782d5d1af8dbd451a4202866095dac975\", \"9cd572b40276f5729e9f30fdacb7e67a5413d44338d48329997c5981d678b5e24a6f01b0\", \"d119f300fbd74e754a200ea2c3f9fabc1466d02078c84245db693eef3f5672a6\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"b2b1d82a5523b72ea366a680922ed3a4624536c4\", \"a56595c9d58093f3b044d3677c9bb3bea38c2bf2a77e3ab68e0a73519591a33ed098b758\", \"d6204303b86acf62d5ab860ca70161288ede56e3cf017c08dca56fd2d6f8f6fe\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"f8c4eb4285d3d7744da52775bb44ca436a3154f7\", \"ef10a6a10570f3a95e87529255f1aa59abf849c1cff6c24251c2fb7b8604dfa10c60ef4a\", \"8557e22eb4529b43f16b1f8ae47c714ac8a2c827c1408a47704778b4c5b52601\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"6e7fe35fa39c937a0e6b3a8c072e218650f42b8d\", \"79abaebc233fb7a71d494f6be99b419c913d36bb6c3c39f915d081d34559179869b32d81\", \"8c1a4187efbb3d38332f608f2c8bbe64247d9afa2281ced56c586ecb4ab7a85e\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"917b467d841850fc6e648f1bc298a7f9f1ee38ca\", \"86af0b9e04bb74217d46fafc2c2dc7e3302725fc9389a6a6a74c6eb0e1f87562469f2082\", \"a41bb1f256228302cd0548ae2148ff42774d18c2d6d3e38b36bc4938da13bac3\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"2b4314fe1a6bfa786b7cfc13fbee861b348efbf6\", \"3c97591d9ac8dea5785e89f4155be601f547e6c03bed3a2f5dfdbfcc0d7ac26c88d1962c\", \"b0b024e20c4f75a6dad54c21a9edbce846792e957878b1c8ed2d916c757e2b3c\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"e19fa7f83c79920cbff45c41a9dee8fc99e97396\", \"f64bea1bbcdab6d1acd629a6476b88e658206ea035ea1d99be344fa1467ee91c73bbca67\", \"42153925c46fc9d5d328312d62f59bb99fdc4ac479a3386d5f88fefd4b32f577\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"53e0475cf492b3d39dad600f5c58eb0bd0021554\", \"44340abf7431970e8e8f15e8b2ed8b1111cb08627936ec10a81b36768b606e9a38b2f4c5\", \"37ab2a0b7b69942278e21032fc83eba6cdc34f5285a8b711a08da6acd42299fe\"),\n      TestFixture(16, \"8beedeb85d42c2a7fa6f7237b05acb197dd8e1672471ac878064fe5319eab876\", \"8479bdfad28ebe781e9c01a3f6\", \"c119a383d9a3d4bff4270a1d22076b346db5f61c\", \"d6cdee605900f062e7057ffaccb20b2eac7ceb2a11575ae03ea8a57bbe4a67c060367b74\", \"4a17522da707b4b2587a0ae367a2cd2831bb593a18ef442a7977eda6de045878\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"73b09d18554471309141aa33b687f9248b50fe3154\", \"b7e8264ca70fd2a4fb76f20a8ad5da3c37f5893fb12abeeaef1187f815ca481ed8ddd3dd37\", \"2a243246bfe5b5ab05f51bf5f401af52d5bbaa2549cf57a18e197597fe15dd8c\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"b64d00f3a4df754fa4ee6376922fb67ccce0c6209f\", \"7215bba75694d6dbced93b4fae7d95647045b12e7accc2b55011dbe92ce7619e0ad48b4ccf\", \"0595306eb7441622a49800edee0134492d82320707fceba902af2e0c95fe634a\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"2b11d1ac74ffe701ec733d32085b1054132726e622\", \"ef496af886b444958644650b3409334caf8251e8c71e8b1f4d70d8f4c7df4f22847d36b394\", \"bd439dbefec589e120fb4f9825b315bf86523b85c61791cd4da4c8d474ba2714\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"a88f22424643a523aa3d7d88f4364f1290f49dd0a2\", \"6cd79916b40806b7c00a25b1c8646c0a2c51eade47a85e76a9d07b7b361ca56d53c34cda50\", \"cfebe1cf82267394065bcecfada6709c6c35a3ac835644f560d4c9a8c1848364\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"c81427bc84c6a3cfefd4c4cb210fe82212977e1947\", \"0c4c9ce8768d005b85e39cf21d5dcb3aae320917a2fddb010e7508ad03ad287068ecee6020\", \"7a37255b682766a0bfecf78e5162528885a339174c2a49325739d2bd8877e64f\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"28c4d6de3e2ce51b849b135d9cfd3084f0e3155447\", \"ec9c6d8acc67468feeac4b64a0af139c4c46625aa2ddea785e6c470c52c4fdf432fd78b66e\", \"619f2ae80070e278615466a3fd6c9acb7b510c5679bed7038889c77e78d8bd32\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"4c88151cafef75832bacef43a06e862349d56b67ee\", \"88d0ae485da4d617419bb77a9c3ca53bf5701c690b91232cfbd7ffff252498b35274fb2995\", \"b2571e56f66a857daffbdc99370ceddd4a7bed3867d600cc797000a3b7b57a9d\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"572855e22ce89bc2bcf09cb15a1765d99973449d61\", \"9370eeb6dea33856d6c7c488664546c125d633938472b2c50e5e391ad104f9ee33b94f2872\", \"db409636e3e3bcd606a91aeb7592009896f9ad2c4cc6b7f578e6ad59c0f8fa22\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"89ce46b3de3afaf2518d419b1a2ac24cabca269a96\", \"4d96fde72c7159663bba19a22678e154176f5194732d69c5d6db1b130102af3dae0690673b\", \"62c89a835721207a182968c516dc8be45774ec846e8dcab9ab8611888f2a76a8\"),\n      TestFixture(16, \"c3a0c126cad581012151c25cf85a44472c23f83b6095b6004f4f32cd60ec2db2\", \"94ab51ce75db8b046d6ab92830\", \"edf1682a626e9fbf3d57bb260e0876c6f92ba5b114\", \"29a9d37e90253c2b5760e31f325a55de458ed2bff1489903365970c2673c9fd457e1077aad\", \"33f30ddd83002eea50fd4a8fae39d0980a04160a22ac88b755ac050f1d1f8639\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"3cbb08f133270e4454bcaaa0f20f6d63c38b6572e766\", \"3966930a2ae8fdd8f40e7007f3fde0bd6eb48a46e6d26eef83da9f6384b1a2bda10790dadb3f\", \"f5353fb6bfc8f09d556158132d6cbb97d9045eacdc71f782bcef62d258b1950a\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"946e86795c332031e2d1ee09d3d4a101fb6800d00911\", \"91b31d8245fcd3ad426334aed2262cdf5657efe408a5587bdd120a7d08cd3841cb117af444fb\", \"e3a1555ffe5f34bb43c4a2dae9019b19f1e44a45fb577d495d2a57097612448d\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"b76ce2ab0065ba1c0a754494991c8c452cb416f18ab1\", \"b2b1795019aa4980aac79e3398ee019b818bf9c58b0545b32f81dcf03e2bcc2aaf62ad366e97\", \"9c5d43c1a1269cde199509a1eff67cc83a1759b71c9e7a6ee99f76b98c6e23a6\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"a3e0d8d0784155bfc45769c52711d4fa68e8bc390c20\", \"a63d432b618ea62364e5b36226e35924c5d7530d0d94fea17d78533bc9e022dbfb460afdf499\", \"b07452a7900a289b91b2771dfdd5108852536659aa259def7b41e38f80bd03ab\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"6e6a88abbb52a709b47365ad6aa8016fa9a03a9bd834\", \"6bb71350a29d549514c1bf0a6b5a8cb1049fd5afd98056defc6dcaeec80b1c639350ab6f1fde\", \"6b30f55c3101540523a92380390f3f84632f42962061b2724cde78ac39809397\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"eba1810d537041821121aeff8e0914ac26a550072c8c\", \"ee7c1af64abfb21eb19374588ffb99728b9abf332d389d37b7251fb8c0ef2b37c36d51219d0f\", \"9fc62d14f8b7a6026509275cff80312ff1ade2b5d9c274cb72a506a571439fc1\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"dfc6692cd2442e5ff1f918c8812a27f81d107d16a12f\", \"da1bf2d7cb8bddc3514bc26f80d8aa26b02f9222a09bd279d9da4437c8a2a252436508134c56\", \"6b9389cc42113d639fd2b40cbc732ae0dc7c14513b88b36b45a6ea5a06fe4d2b\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"9ad338cbfd1b52e6ae4178f05e00062274f8b0b25eae\", \"9f0ea330e4d4a17a0ef3a2575ff28bfcd9c75f865f1a63943543bc1c5f5991ecc5964a288f79\", \"db72d98d63fc10acff7dceec0e2691a80ecee50a0e957ad166c77952a50318bd\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"9f5a05db89e0e336da066ce81b79ad9be1d0ec4fb7b8\", \"9a879e20902f10aa7ab4b64f1a8b20454cef037bb60c0a49ee2b7ceddcbd28abb24b77d5edee\", \"e98b710c47a4d12a73cd8aa2613fc2910c16f4195ea7f15650132493521d19be\"),\n      TestFixture(16, \"9cdebaeee8690b68751070691f49593668a6de12d3a948b38ddbd3f75218b2d4\", \"af1a97d43151f5ea9c48ad36a3\", \"58f31e5770070a5d4031fb795dc2d298561d3559960d\", \"5d2e85ac69c8f9c1e08321de5c305f46fb22da6d97b9b099a68cfa3572d974e03232e09f37fb\", \"527817316fc48b105f8ab178dd2db1fefa09c50461aa9d8bdf3c03482343bbf9\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"79ac1a6a9eca5e07ce635bfd666ef72b16f3f2e140d56c\", \"1abcc9b1649deaa0bfa7dcd23508282d9c50ca7fee72486950608d7bcb39dcf03a2cab01587f61\", \"0cda000ed754456a844c9ed61843deea9dadf5e723ea1448057712996d660f8c\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"76d12e3c4c5d990bf563c60aa4999e52998d887f97477f\", \"15c1fde7b60a2dac84a74125f7ff4154132eb0e139e05b1c4fb40e5c8bc37152a173d4bbb18c3e\", \"3fb6ddb76809b8e6d703347664ef00a365955124c603900d5c8d4ff476138252\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"a027c28fbe22111fd4c8a226cfe8531c16d7790d561eca\", \"c33711544475a5b8a50c25099c8e8c1a9c744193f8b9ee019c359008adae3070b5a543ead0effb\", \"d9fc295082e8f48569eb073ac1b9566246728fc62ccaab4a5667c472c98b2626\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"fa597e37c26c38694abdcf450f9edc529160fa0d651979\", \"9949adec383b8cce3b79486a5cf803541bc3c293cbbe5dbd099ab134756b90746762a92a4a9f7f\", \"7a459aadb48f1a528edae71fcf698b84ed64dc0e18cc23f27ab47eeabeaf833f\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"9e4c8aa9b58a8eabc5586892f5541000b43f17d9a051a0\", \"fd5c59724fdd3a0cb49cefbda632cf063e9c2f470ef684fa4f6adfec85d055310107ba89198afa\", \"484207909dec4c35929ebe82fcacf20d2af6d850bd69364ebac9557adeadfbd4\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"7d9582cf9e3bb9ee34dce965f56b08e716589486b0641c\", \"1e855114646c0d4945186e4aa60dd7e19cfbac181ec338915d23eb2e952afcc89fbddb567d9d75\", \"88b5448372548e6aab1b262630a28a471d285514703f1bdb10c695850e18fe6d\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"5a387e7cc22491fc556fe6a0c060b4911d01f0c11f801e\", \"3928ada73873255b24ab618f93066b9797a2c85fb1273aaad6c31828314e24198f005955ca8f5e\", \"0e71863c2962244c7d1a28fc755f0c73e5cbd630a8dbdeb38842d7795d830d2e\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"87946e910059cbaf48df63b220f397049c65ca10cd1920\", \"e484bd4afa0e7f08391be49d7395480216c6f28e63be04e531ebbadccfe47182b41904bbfebcfe\", \"2aa7a28da38c42fda2e578d9d6340cd8e80b9b32047c3db296d0640d517b0872\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"c62f67d208f1c8ffd5d57df9de15ef54f97fbc07d1630a\", \"a53fb409f2a67c58a411fad68d73305273dc84997fc42e7c582414154236c09ee704cf4a5de411\", \"3382051c268891da04e6ca73adcead4029f6a1593be4acfe3968e7351a6a2fb5\"),\n      TestFixture(16, \"d34264a12c35cdd67ac105e2826b071e46f8131d1e325f8e0ae80a6447375135\", \"3891e308b9f44c5b5a8b59004a\", \"697e73eaaf562d31bdbf7ce9e78c7426fe1c87e421def9\", \"0a6ea03155019996cc7bfbc6b4eaab2074bfbf7a8f79dd57c9990029c89d1b37988745fa5737a3\", \"c352828b1920e53bbb60f2ea6a5f15639659e6f3243405c26f6e48628d5519a9\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"9cea3b061e5c402d48497ea4948d75b8af7746d4e570c848\", \"f28ec535c2d834963c85814ec4173c0b8983dff8dc4a2d4e0f73bfb28ad42aa8f75f549a93594dd4\", \"5f8b1400920891e8057639618183c9c847821c1aae79f2a90d75f114db21e975\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"2b223932fb2fd8433e4b1af9e8234a824569a141f6c96a69\", \"4546c70127abacf84a87e513b8b90331639d386dcff38f6f4de907a59c5e4d3f21e1348d7cdf92b6\", \"1ae8108f216defea65d9426da8f8746a3ae408e563d62203063d49bf7e0d6bdf\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"4d57cbe4a7e780d4ed17267d5ebc91750c2f0209e0444bd2\", \"233335d77b63f46f99dbd9970e26d8c62adb9b25d97eaed4ff4239544e2f354d6c6837cd9c23b884\", \"460f08114b1015fe8b7a9b5dd1b9e6a3d28367c4bd15f29b13c02a8cb9a53968\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"fda8665f87c618646a89c7abdca275fd10c31453ad4b9c99\", \"93cc986c5b426cdf1e4538418c383c4e36378d7f9471799f3f6c6f7cc494201069344e2d6d41bd9b\", \"860f4428259d9c5b17698cc95363db6cfee603258582e3a3e8feb886599d4ac4\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"98104fd3f3413ad1f57ef4912cb50097dca379a58c47b0d2\", \"f674b1e02fc54e6a81b20b7b7c2f4924fa57e089b57d55d43787a15352cfceb028202c8730beaa7a\", \"1b43c482f83780c21583f88e5afcf6938edd20f21b74d895161b60c27a6a42f0\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"b46b343e64d2d70e0bd909dbb3f6bedf7e4adc74321be526\", \"da0fca0db856a3b57f15f631e36cf76c58be45580b210020f3a0ca3da647eb31893e867956097983\", \"b082ccd964617c27a5607b7324faad237ee53acfc18c35502dbf7c1937a9dfcb\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"8e12620bb575e6b167b085255b2b5631ff28e04cbef8826d\", \"e0769c3869f1920a137c7acf0bb11f82d9dc796087c2676be663fbbebbc251b9f1760afa49e89e71\", \"b8539ba93ef17254ec1d8d62e8f4eae4d41ee1e75345bf90c9cbb26c63bce501\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"792aaa23b923d1b53173fe19853b9aa402a301d48529873e\", \"174e541065a7a50e45bf01f3d5a1d317245798f8bc136238da90cd87e9d9ca5d85430a150e682752\", \"b6b09463b5ef5ead1f17f4021693a0d8452e98dcbb8e7590f9fde6394970a6f8\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"ddc5b4e48970ebd72869be6998e9103c014475e8ae6ea29c\", \"b3a14ad755f49f6c5ca54183c873598f27b0ecc49754479afc0cc4601afb61efa7059cfe49ec9dde\", \"390f6de14d5e1f2f78dbe757c00b89209d0cf8bc48cbbea035779f93de357905\"),\n      TestFixture(16, \"4ad98dbef0fb2a188b6c49a859c920967214b998435a00b93d931b5acecaf976\", \"00d772b07788536b688ff2b84a\", \"d2b66096c475a77648c27235e6972ba8f18761330d3c6adf\", \"bcd29ea518f1d3cd3c0e8ddfb60d621bd773f81f34068fd9cf7474962c3602dcfcb50039f43e3d6f\", \"1d75c9e7acb09932db332498d30f82e4009025cb1827047c59a8f97812b568a4\")\n    ]\n\n    func testEncrypt(fixture: TestFixture) -> Bool {\n      let aes = try! AES(key: fixture.key, blockMode: CCM(iv: fixture.nonce, tagLength: fixture.tagLength, messageLength: fixture.plaintext.count, additionalAuthenticatedData: fixture.aad), padding: .noPadding)\n      let encrypted = try! aes.encrypt(fixture.plaintext)\n      if encrypted != fixture.expected {\n        return false\n      }\n      return true\n    }\n\n    func testDecrypt(fixture: TestFixture) -> Bool {\n      let aes = try! AES(key: fixture.key, blockMode: CCM(iv: fixture.nonce, tagLength: fixture.tagLength, messageLength: fixture.plaintext.count /*- fixture.tagLength*/, additionalAuthenticatedData: fixture.aad), padding: .noPadding)\n      let plaintext = try! aes.decrypt(fixture.expected)\n      if plaintext != fixture.plaintext {\n        return false\n      }\n      return true\n    }\n\n    for (i, fixture) in fixtures.enumerated() {\n      XCTAssertTrue(testEncrypt(fixture: fixture), \"Encryption failed\")\n      XCTAssertTrue(testDecrypt(fixture: fixture), \"(\\(i) - Decryption failed.\")\n    }\n  }\n\n  func testAESCCMTestCase1() {\n    let key: Array<UInt8> = [0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f]\n    let nonce: Array<UInt8> = [0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16]\n    let aad: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07]\n    let plaintext: Array<UInt8> = [0x20, 0x21, 0x22, 0x23]\n    let expected: Array<UInt8> = [0x71, 0x62, 0x01, 0x5b, 0x4d, 0xac, 0x25, 0x5d]\n\n    let aes = try! AES(key: key, blockMode: CCM(iv: nonce, tagLength: 4, messageLength: plaintext.count, additionalAuthenticatedData: aad), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n  }\n\n  func testAESCCMTestCase1Decrypt() {\n    let key: Array<UInt8> = [0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f]\n    let nonce: Array<UInt8> = [0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16]\n    let aad: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07]\n    let ciphertext: Array<UInt8> = [0x71, 0x62, 0x01, 0x5b, 0x4d, 0xac, 0x25, 0x5d]\n    let expected: Array<UInt8> = [0x20, 0x21, 0x22, 0x23]\n\n    let aes = try! AES(key: key, blockMode: CCM(iv: nonce, tagLength: 4, messageLength: ciphertext.count - 4, additionalAuthenticatedData: aad), padding: .noPadding)\n    let decrypted = try! aes.decrypt(ciphertext)\n    XCTAssertEqual(decrypted, expected, \"decryption failed\")\n  }\n\n  func testAESCCMTestCase2() {\n    let key: Array<UInt8> = [0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f]\n    let nonce: Array<UInt8> = [0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17]\n    let aad: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f]\n    let expected: Array<UInt8> = [0xd2, 0xa1, 0xf0, 0xe0, 0x51, 0xea, 0x5f, 0x62, 0x08, 0x1a, 0x77, 0x92, 0x07, 0x3d, 0x59, 0x3d, 0x1f, 0xc6, 0x4f, 0xbf, 0xac, 0xcd]\n\n    let aes = try! AES(key: key, blockMode: CCM(iv: nonce, tagLength: 6, messageLength: plaintext.count, additionalAuthenticatedData: aad), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n  }\n\n  func testAESCCMTestCase2Decrypt() {\n    let key: Array<UInt8> = [0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f]\n    let nonce: Array<UInt8> = [0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17]\n    let aad: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let ciphertext: Array<UInt8> = [0xd2, 0xa1, 0xf0, 0xe0, 0x51, 0xea, 0x5f, 0x62, 0x08, 0x1a, 0x77, 0x92, 0x07, 0x3d, 0x59, 0x3d, 0x1f, 0xc6, 0x4f, 0xbf, 0xac, 0xcd]\n    let expected: Array<UInt8> = [0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f]\n\n    let aes = try! AES(key: key, blockMode: CCM(iv: nonce, tagLength: 6, messageLength: ciphertext.count - 6, additionalAuthenticatedData: aad), padding: .noPadding)\n    let plaintext = try! aes.decrypt(ciphertext)\n    XCTAssertEqual(plaintext, expected, \"encryption failed\")\n  }\n\n  func testAESCCMTestCase3() {\n    let key: Array<UInt8> = [0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f]\n    let nonce: Array<UInt8> = [0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b]\n    let aad: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13]\n    let plaintext: Array<UInt8> = [0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37]\n    let expected: Array<UInt8> = [0xe3, 0xb2, 0x01, 0xa9, 0xf5, 0xb7, 0x1a, 0x7a, 0x9b, 0x1c, 0xea, 0xec, 0xcd, 0x97, 0xe7, 0x0b, 0x61, 0x76, 0xaa, 0xd9, 0xa4, 0x42, 0x8a, 0xa5, 0x48, 0x43, 0x92, 0xfb, 0xc1, 0xb0, 0x99, 0x51]\n\n    let aes = try! AES(key: key, blockMode: CCM(iv: nonce, tagLength: 8, messageLength: plaintext.count, additionalAuthenticatedData: aad), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n  }\n\n  func testAESCCMTestCase3Decrypt() {\n    let key: Array<UInt8> = [0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f]\n    let nonce: Array<UInt8> = [0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b]\n    let aad: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13]\n    let ciphertext: Array<UInt8> = [0xe3, 0xb2, 0x01, 0xa9, 0xf5, 0xb7, 0x1a, 0x7a, 0x9b, 0x1c, 0xea, 0xec, 0xcd, 0x97, 0xe7, 0x0b, 0x61, 0x76, 0xaa, 0xd9, 0xa4, 0x42, 0x8a, 0xa5, 0x48, 0x43, 0x92, 0xfb, 0xc1, 0xb0, 0x99, 0x51]\n    let expected: Array<UInt8> = [0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37]\n\n    let aes = try! AES(key: key, blockMode: CCM(iv: nonce, tagLength: 8, messageLength: ciphertext.count - 8, additionalAuthenticatedData: aad), padding: .noPadding)\n    let plaintext = try! aes.decrypt(ciphertext)\n    XCTAssertEqual(plaintext, expected, \"encryption failed\")\n  }\n\n  func testAESCCMTestCase3DecryptPartial() {\n    let key: Array<UInt8> = [0x40, 0x41, 0x42, 0x43, 0x44, 0x45, 0x46, 0x47, 0x48, 0x49, 0x4a, 0x4b, 0x4c, 0x4d, 0x4e, 0x4f]\n    let nonce: Array<UInt8> = [0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b]\n    let aad: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13]\n    let ciphertext: Array<UInt8> = [0xe3, 0xb2, 0x01, 0xa9, 0xf5, 0xb7, 0x1a, 0x7a, 0x9b, 0x1c, 0xea, 0xec, 0xcd, 0x97, 0xe7, 0x0b, 0x61, 0x76, 0xaa, 0xd9, 0xa4, 0x42, 0x8a, 0xa5, 0x48, 0x43, 0x92, 0xfb, 0xc1, 0xb0, 0x99, 0x51]\n    let expected: Array<UInt8> = [0x20, 0x21, 0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2a, 0x2b, 0x2c, 0x2d, 0x2e, 0x2f, 0x30, 0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37]\n\n    let aes = try! AES(key: key, blockMode: CCM(iv: nonce, tagLength: 8, messageLength: ciphertext.count - 8, additionalAuthenticatedData: aad), padding: .noPadding)\n    var decryptor = try! aes.makeDecryptor()\n\n    var plaintext = [UInt8]()\n    plaintext += try! decryptor.update(withBytes: Array(ciphertext[0..<2]))\n    plaintext += try! decryptor.update(withBytes: Array(ciphertext[2..<6]))\n    plaintext += try! decryptor.update(withBytes: Array(ciphertext[6..<32]), isLast: true)\n    XCTAssertEqual(plaintext, expected, \"encryption failed\")\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/AESOCBTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class OCBTests: XCTestCase {\n\n  struct TestFixture {\n    let N: Array<UInt8>\n    let A: Array<UInt8>\n    let P: Array<UInt8>\n    let C: Array<UInt8>\n  }\n\n  func testAESOCBWithRFC7253Tests() {\n\n    let K = Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F\")\n\n    let fixtures = [\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221100\"),\n                  A: Array<UInt8>(hex: \"\"),\n                  P: Array<UInt8>(hex: \"\"),\n                  C: Array<UInt8>(hex: \"785407BFFFC8AD9EDCC5520AC9111EE6\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221101\"),\n                  A: Array<UInt8>(hex: \"0001020304050607\"),\n                  P: Array<UInt8>(hex: \"0001020304050607\"),\n                  C: Array<UInt8>(hex: \"6820B3657B6F615A5725BDA0D3B4EB3A257C9AF1F8F03009\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221102\"),\n                  A: Array<UInt8>(hex: \"0001020304050607\"),\n                  P: Array<UInt8>(hex: \"\"),\n                  C: Array<UInt8>(hex: \"81017F8203F081277152FADE694A0A00\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221103\"),\n                  A: Array<UInt8>(hex: \"\"),\n                  P: Array<UInt8>(hex: \"0001020304050607\"),\n                  C: Array<UInt8>(hex: \"45DD69F8F5AAE72414054CD1F35D82760B2CD00D2F99BFA9\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221104\"),\n                  A: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F\"),\n                  P: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F\"),\n                  C: Array<UInt8>(hex: \"571D535B60B277188BE5147170A9A22C3AD7A4FF3835B8C5701C1CCEC8FC3358\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221105\"),\n                  A: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F\"),\n                  P: Array<UInt8>(hex: \"\"),\n                  C: Array<UInt8>(hex: \"8CF761B6902EF764462AD86498CA6B97\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221106\"),\n                  A: Array<UInt8>(hex: \"\"),\n                  P: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F\"),\n                  C: Array<UInt8>(hex: \"5CE88EC2E0692706A915C00AEB8B2396F40E1C743F52436BDF06D8FA1ECA343D\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221107\"),\n                  A: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F1011121314151617\"),\n                  P: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F1011121314151617\"),\n                  C: Array<UInt8>(hex: \"1CA2207308C87C010756104D8840CE1952F09673A448A122C92C62241051F57356D7F3C90BB0E07F\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221108\"),\n                  A: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F1011121314151617\"),\n                  P: Array<UInt8>(hex: \"\"),\n                  C: Array<UInt8>(hex: \"6DC225A071FC1B9F7C69F93B0F1E10DE\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA99887766554433221109\"),\n                  A: Array<UInt8>(hex: \"\"),\n                  P: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F1011121314151617\"),\n                  C: Array<UInt8>(hex: \"221BD0DE7FA6FE993ECCD769460A0AF2D6CDED0C395B1C3CE725F32494B9F914D85C0B1EB38357FF\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA9988776655443322110A\"),\n                  A: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F\"),\n                  P: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F\"),\n                  C: Array<UInt8>(hex: \"BD6F6C496201C69296C11EFD138A467ABD3C707924B964DEAFFC40319AF5A48540FBBA186C5553C68AD9F592A79A4240\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA9988776655443322110B\"),\n                  A: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F\"),\n                  P: Array<UInt8>(hex: \"\"),\n                  C: Array<UInt8>(hex: \"FE80690BEE8A485D11F32965BC9D2A32\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA9988776655443322110C\"),\n                  A: Array<UInt8>(hex: \"\"),\n                  P: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F\"),\n                  C: Array<UInt8>(hex: \"2942BFC773BDA23CABC6ACFD9BFD5835BD300F0973792EF46040C53F1432BCDFB5E1DDE3BC18A5F840B52E653444D5DF\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA9988776655443322110D\"),\n                  A: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F2021222324252627\"),\n                  P: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F2021222324252627\"),\n                  C: Array<UInt8>(hex: \"D5CA91748410C1751FF8A2F618255B68A0A12E093FF454606E59F9C1D0DDC54B65E8628E568BAD7AED07BA06A4A69483A7035490C5769E60\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA9988776655443322110E\"),\n                  A: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F2021222324252627\"),\n                  P: Array<UInt8>(hex: \"\"),\n                  C: Array<UInt8>(hex: \"C5CD9D1850C141E358649994EE701B68\")),\n\n      TestFixture(N: Array<UInt8>(hex: \"BBAA9988776655443322110F\"),\n                  A: Array<UInt8>(hex: \"\"),\n                  P: Array<UInt8>(hex: \"000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F2021222324252627\"),\n                  C: Array<UInt8>(hex: \"4412923493C57D5DE0D700F753CCE0D1D2D95060122E9F15A5DDBFC5787E50B5CC55EE507BCB084E479AD363AC366B95A98CA5F3000B1479\")),\n    ]\n\n    func testEncrypt(fixture: TestFixture) -> Bool {\n      let ocb = OCB(nonce: fixture.N, additionalAuthenticatedData: fixture.A, mode: .combined)\n      let aes = try! AES(key: K, blockMode: ocb, padding: .noPadding)\n      let encrypted = try! aes.encrypt(fixture.P)\n      if encrypted != fixture.C {\n        return false\n      }\n      return true\n    }\n\n    func testDecrypt(fixture: TestFixture) -> Bool {\n      let ocb = OCB(nonce: fixture.N, additionalAuthenticatedData: fixture.A, mode: .combined)\n      let aes = try! AES(key: K, blockMode: ocb, padding: .noPadding)\n      let plaintext = try! aes.decrypt(fixture.C)\n      if plaintext != fixture.P {\n        return false\n      }\n      return true\n    }\n\n    func testInvalidTag(fixture: TestFixture) -> Bool {\n      let ocb = OCB(nonce: fixture.N, additionalAuthenticatedData: fixture.A, mode: .combined)\n      let aes = try! AES(key: K, blockMode: ocb, padding: .noPadding)\n      var C_ = fixture.C.slice\n      C_[C_.count - 1] ^= 0x01\n      let plaintext = try? aes.decrypt(C_)\n      return plaintext == nil\n    }\n\n    for (i, fixture) in fixtures.enumerated() {\n      XCTAssertTrue(testEncrypt(fixture: fixture), \"Encryption failed\")\n      XCTAssertTrue(testDecrypt(fixture: fixture), \"(\\(i) - Decryption failed.\")\n      XCTAssertTrue(testInvalidTag(fixture: fixture), \"(\\(i) - Invalid Tag verification failed.\")\n    }\n  }\n\n  static let allTests = [\n    (\"testAESOCBWithRFC7253Tests\", testAESOCBWithRFC7253Tests),\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/AESTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class AESTests: XCTestCase {\n  // 128 bit key\n  let aesKey: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n\n  func testAESEncrypt() {\n    let input: Array<UInt8> = [0x00, 0x11, 0x22, 0x33, 0x44, 0x55, 0x66, 0x77, 0x88, 0x99, 0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff]\n    let expected: Array<UInt8> = [0x69, 0xc4, 0xe0, 0xd8, 0x6a, 0x7b, 0x4, 0x30, 0xd8, 0xcd, 0xb7, 0x80, 0x70, 0xb4, 0xc5, 0x5a]\n\n    let aes = try! AES(key: self.aesKey, blockMode: ECB(), padding: .noPadding)\n    let encrypted = try! aes.encrypt(input)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, input, \"decryption failed\")\n  }\n\n  func testAESEncrypt2() {\n    let key: Array<UInt8> = [0x36, 0x37, 0x39, 0x66, 0x62, 0x31, 0x64, 0x64, 0x66, 0x37, 0x64, 0x38, 0x31, 0x62, 0x65, 0x65]\n    let iv: Array<UInt8> = [0x6b, 0x64, 0x66, 0x36, 0x37, 0x33, 0x39, 0x38, 0x44, 0x46, 0x37, 0x33, 0x38, 0x33, 0x66, 0x64]\n    let input: Array<UInt8> = [0x62, 0x72, 0x61, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]\n\n    let expected: Array<UInt8> = [0xae, 0x8c, 0x59, 0x95, 0xb2, 0x6f, 0x8e, 0x3d, 0xb0, 0x6f, 0x0a, 0xa5, 0xfe, 0xc4, 0xf0, 0xc2]\n\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .noPadding)\n    do {\n      let encrypted = try aes.encrypt(input)\n      XCTAssertEqual(encrypted, expected, \"encryption failed\")\n      let decrypted = try aes.decrypt(encrypted)\n      XCTAssertEqual(decrypted, input, \"decryption failed\")\n    } catch {\n      XCTFail(\"\\(error)\")\n    }\n  }\n\n  func testAESEncrypt3() {\n    let key = \"679fb1ddf7d81bee\"\n    let iv = \"kdf67398DF7383fd\"\n    let input: Array<UInt8> = [0x62, 0x72, 0x61, 0x64, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]\n    let expected: Array<UInt8> = [0xae, 0x8c, 0x59, 0x95, 0xb2, 0x6f, 0x8e, 0x3d, 0xb0, 0x6f, 0x0a, 0xa5, 0xfe, 0xc4, 0xf0, 0xc2]\n\n    do {\n      let aes = try AES(key: key, iv: iv, padding: .noPadding)\n      let encrypted = try aes.encrypt(input)\n      XCTAssertEqual(encrypted, expected, \"encryption failed\")\n      let decrypted = try aes.decrypt(encrypted)\n      XCTAssertEqual(decrypted, input, \"decryption failed\")\n    } catch {\n      XCTFail(\"\\(error)\")\n    }\n  }\n\n  func testAESEncryptCBCNoPadding() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expected: Array<UInt8> = [0x76, 0x49, 0xab, 0xac, 0x81, 0x19, 0xb2, 0x46, 0xce, 0xe9, 0x8e, 0x9b, 0x12, 0xe9, 0x19, 0x7d]\n\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  func testAESEncryptCBCWithPadding() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expected: Array<UInt8> = [0x76, 0x49, 0xab, 0xac, 0x81, 0x19, 0xb2, 0x46, 0xce, 0xe9, 0x8e, 0x9b, 0x12, 0xe9, 0x19, 0x7d, 0x89, 0x64, 0xe0, 0xb1, 0x49, 0xc1, 0x0b, 0x7b, 0x68, 0x2e, 0x6e, 0x39, 0xaa, 0xeb, 0x73, 0x1c]\n\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  func testAESEncryptCBCWithPaddingPartial() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7)\n\n    var ciphertext = Array<UInt8>()\n    var encryptor = try! aes.makeEncryptor()\n    ciphertext += try! encryptor.update(withBytes: plaintext[0..<8])\n    ciphertext += try! encryptor.update(withBytes: plaintext[8..<16])\n    ciphertext += try! encryptor.update(withBytes: plaintext[16..<32])\n    ciphertext += try! encryptor.finish()\n    XCTAssertEqual(try! aes.encrypt(plaintext), ciphertext, \"encryption failed\")\n  }\n\n  func testAESEncryptIncremental() {\n    do {\n      var ciphertext = Array<UInt8>()\n      let plaintext = \"Today Apple launched the open source Swift community, as well as amazing new tools and resources.\"\n      let aes = try AES(key: \"passwordpassword\".bytes, blockMode: CBC(iv: \"drowssapdrowssap\".bytes))\n      var encryptor = try! aes.makeEncryptor()\n\n      ciphertext += try encryptor.update(withBytes: plaintext.bytes)\n      ciphertext += try encryptor.finish()\n      XCTAssertEqual(try aes.encrypt(plaintext.bytes), ciphertext, \"encryption failed\")\n    } catch {\n      XCTFail(\"\\(error)\")\n    }\n  }\n\n  func testAESDecryptCBCWithPaddingPartial() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let ciphertext: Array<UInt8> = [118, 73, 171, 172, 129, 25, 178, 70, 206, 233, 142, 155, 18, 233, 25, 125, 76, 187, 200, 88, 117, 107, 53, 129, 37, 82, 158, 150, 152, 163, 143, 68, 169, 105, 137, 234, 93, 98, 239, 215, 41, 45, 51, 254, 138, 92, 251, 17]\n\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7)\n    var plaintext = Array<UInt8>()\n    var decryptor = try! aes.makeDecryptor()\n    plaintext += try! decryptor.update(withBytes: ciphertext[0..<8])\n    plaintext += try! decryptor.update(withBytes: ciphertext[8..<16])\n    plaintext += try! decryptor.update(withBytes: ciphertext[16..<32])\n    plaintext += try! decryptor.finish()\n    XCTAssertEqual(try! aes.decrypt(ciphertext), plaintext, \"encryption failed\")\n  }\n\n  func testAESEncryptCFB() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expected: Array<UInt8> = [0x3b, 0x3f, 0xd9, 0x2e, 0xb7, 0x2d, 0xad, 0x20, 0x33, 0x34, 0x49, 0xf8, 0xe8, 0x3c, 0xfb, 0x4a]\n\n    let aes = try! AES(key: key, blockMode: CFB(iv: iv), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/issues/142\n  func testAESEncryptCFBLong() {\n    let key: Array<UInt8> = [56, 118, 37, 51, 125, 78, 103, 107, 119, 40, 74, 88, 117, 112, 123, 75, 122, 89, 72, 36, 46, 91, 106, 60, 54, 110, 34, 126, 69, 126, 61, 87]\n    let iv: Array<UInt8> = [69, 122, 99, 87, 83, 112, 110, 65, 54, 109, 107, 89, 73, 122, 74, 49]\n    let plaintext: Array<UInt8> = [123, 10, 32, 32, 34, 67, 111, 110, 102, 105, 114, 109, 34, 32, 58, 32, 34, 116, 101, 115, 116, 105, 110, 103, 34, 44, 10, 32, 32, 34, 70, 105, 114, 115, 116, 78, 97, 109, 101, 34, 32, 58, 32, 34, 84, 101, 115, 116, 34, 44, 10, 32, 32, 34, 69, 109, 97, 105, 108, 34, 32, 58, 32, 34, 116, 101, 115, 116, 64, 116, 101, 115, 116, 46, 99, 111, 109, 34, 44, 10, 32, 32, 34, 76, 97, 115, 116, 78, 97, 109, 101, 34, 32, 58, 32, 34, 84, 101, 115, 116, 101, 114, 34, 44, 10, 32, 32, 34, 80, 97, 115, 115, 119, 111, 114, 100, 34, 32, 58, 32, 34, 116, 101, 115, 116, 105, 110, 103, 34, 44, 10, 32, 32, 34, 85, 115, 101, 114, 110, 97, 109, 101, 34, 32, 58, 32, 34, 84, 101, 115, 116, 34, 10, 125]\n    let encrypted: Array<UInt8> = try! AES(key: key, blockMode: CFB(iv: iv)).encrypt(plaintext)\n    let decrypted: Array<UInt8> = try! AES(key: key, blockMode: CFB(iv: iv)).decrypt(encrypted)\n    XCTAssert(decrypted == plaintext, \"decryption failed\")\n  }\n    \n  // https://github.com/krzyzanowskim/CryptoSwift/issues/500\n  func testAESEncryptCFB8() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d]\n    let expected: Array<UInt8> = [0x3b, 0x79, 0x42, 0x4c, 0x9c, 0x0d, 0xd4, 0x36, 0xba, 0xce, 0x9e, 0x0e, 0xd4, 0x58, 0x6a, 0x4f, 0x32, 0xb9]\n\n    let aes = try! AES(key: key, blockMode: CFB(iv: iv, segmentSize: .cfb8), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  func testAESEncryptOFB128() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expected: Array<UInt8> = [0x3b, 0x3f, 0xd9, 0x2e, 0xb7, 0x2d, 0xad, 0x20, 0x33, 0x34, 0x49, 0xf8, 0xe8, 0x3c, 0xfb, 0x4a]\n\n    let aes = try! AES(key: key, blockMode: OFB(iv: iv), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  func testAESEncryptOFB256() {\n    let key: Array<UInt8> = [0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expected: Array<UInt8> = [0xdc, 0x7e, 0x84, 0xbf, 0xda, 0x79, 0x16, 0x4b, 0x7e, 0xcd, 0x84, 0x86, 0x98, 0x5d, 0x38, 0x60]\n\n    let aes = try! AES(key: key, blockMode: OFB(iv: iv), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  func testAESEncryptPCBC256() {\n    let key: Array<UInt8> = [0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expected: Array<UInt8> = [0xf5, 0x8c, 0x4c, 0x04, 0xd6, 0xe5, 0xf1, 0xba, 0x77, 0x9e, 0xab, 0xfb, 0x5f, 0x7b, 0xfb, 0xd6]\n\n    let aes = try! AES(key: key, blockMode: PCBC(iv: iv), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    print(encrypted.toHexString())\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  func testAESEncryptBigPCBC128() {\n    let key = \"0123456789abcdef\".bytes\n    let iv = \"fedcba9876543210\".bytes\n    let plaintext = \"64 byte plaintext that will split into 4 chunks of 16 bytes each\".bytes\n    let ciphertext: Array<UInt8> = [0xd6, 0x83, 0x7b, 0xb8, 0xfe, 0x1d, 0x62, 0xf7, 0x04, 0x69, 0xd1, 0xfd, 0x47, 0x06, 0x9c, 0x3d, 0xc0, 0x7c, 0xfe, 0xc9, 0x3d, 0xba, 0x35, 0x61, 0x40, 0xef, 0xe2, 0xac, 0xc6, 0x4c, 0x3d, 0x04, 0xbf, 0x4c, 0xa4, 0xf6, 0xfc, 0x09, 0xfc, 0x8c, 0x2e, 0x09, 0xd0, 0x74, 0x66, 0x2b, 0x8f, 0x02, 0x54, 0x01, 0x25, 0x76, 0x20, 0x88, 0x5e, 0x19, 0x3f, 0x74, 0xcd, 0x48, 0x29, 0xc7, 0xe1, 0xc6, 0xfb, 0xc9, 0xb9, 0xcf, 0xcd, 0xf8, 0xeb, 0x42, 0xbc, 0x0f, 0xc5, 0x73, 0x96, 0xe4, 0xf8, 0x0f]\n\n    let aes = try! AES(key: key, blockMode: PCBC(iv: iv), padding: .pkcs7)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, ciphertext, \"encryption failed\")\n    let decrypted = try! aes.decrypt(ciphertext)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  func testAESEncryptCTR() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expected: Array<UInt8> = [0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26, 0x1b, 0xef, 0x68, 0x64, 0x99, 0x0d, 0xb6, 0xce]\n\n    let aes = try! AES(key: key, blockMode: CTR(iv: iv), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted.count, plaintext.count)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted.count, plaintext.count)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/issues/424\n  func testAESEncryptCTRZeroPadding() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0x01]\n    let expected: Array<UInt8> = [0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26, 0x1b, 0xef, 0x68, 0x64, 0x99, 0x0d, 0xb6, 0xce, 0x37, 0x2b, 0x7c, 0x3c, 0x67, 0x73, 0x51, 0x63, 0x18, 0xa0, 0x77, 0xd7, 0xfc, 0x50, 0x73, 0xae]\n\n    let aes = try! AES(key: key, blockMode: CTR(iv: iv), padding: .zeroPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertEqual(plaintext.count, 17)\n    XCTAssertEqual(encrypted.count, 32, \"padding failed\")\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n  }\n\n  func testAESEncryptCTRIrregularLength() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0x01]\n    let expected: Array<UInt8> = [0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26, 0x1b, 0xef, 0x68, 0x64, 0x99, 0x0d, 0xb6, 0xce, 0x37]\n\n    let aes = try! AES(key: key, blockMode: CTR(iv: iv), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n    let decrypted = try! aes.decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/pull/290\n  func testAESDecryptCTRSeek() {\n    let key: Array<UInt8> = [0x52, 0x72, 0xb5, 0x9c, 0xab, 0x07, 0xc5, 0x01, 0x11, 0x7a, 0x39, 0xb6, 0x10, 0x35, 0x87, 0x02]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x00, 0x01, 0x02, 0x03, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01]\n    var plaintext: Array<UInt8> = Array<UInt8>(repeating: 0, count: 6000)\n\n    for i in 0..<plaintext.count / 6 {\n      let s = String(format: \"%05d\", i).bytes\n      plaintext[i * 6 + 0] = s[0]\n      plaintext[i * 6 + 1] = s[1]\n      plaintext[i * 6 + 2] = s[2]\n      plaintext[i * 6 + 3] = s[3]\n      plaintext[i * 6 + 4] = s[4]\n      plaintext[i * 6 + 5] = \"|\".utf8.first!\n    }\n\n    var aes = try! AES(key: key, blockMode: CTR(iv: iv), padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    aes = try! AES(key: key, blockMode: CTR(iv: iv), padding: .noPadding)\n    var decryptor = try! aes.makeDecryptor()\n    try! decryptor.seek(to: 2)\n    var part1 = try! decryptor.update(withBytes: Array(encrypted[2..<5]))\n    part1 += try! decryptor.finish()\n    XCTAssertEqual(part1, Array(plaintext[2..<5]), \"seek decryption failed\")\n\n    try! decryptor.seek(to: 1000)\n    var part2 = try! decryptor.update(withBytes: Array(encrypted[1000..<1010]))\n    part2 += try! decryptor.finish()\n    XCTAssertEqual(part2, Array(plaintext[1000..<1010]), \"seek decryption failed\")\n\n    try! decryptor.seek(to: 5500)\n    var part3 = try! decryptor.update(withBytes: Array(encrypted[5500..<6000]))\n    part3 += try! decryptor.finish()\n    XCTAssertEqual(part3, Array(plaintext[5500..<6000]), \"seek decryption failed\")\n\n    try! decryptor.seek(to: 0)\n    var part4 = try! decryptor.update(withBytes: Array(encrypted[0..<80]))\n    part4 += try! decryptor.finish()\n    XCTAssertEqual(part4, Array(plaintext[0..<80]), \"seek decryption failed\")\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/pull/289\n  func testAESEncryptCTRIrregularLengthIncrementalUpdate() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc, 0xfd, 0xfe, 0xff]\n    let plaintext: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0x01, 0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0x01]\n    let expected: Array<UInt8> = [0x87, 0x4d, 0x61, 0x91, 0xb6, 0x20, 0xe3, 0x26, 0x1b, 0xef, 0x68, 0x64, 0x99, 0xd, 0xb6, 0xce, 0x37, 0x40, 0xbd, 0x82, 0x85, 0x5d, 0x11, 0xfc, 0x8e, 0x49, 0x4a, 0xa9, 0xed, 0x23, 0xe0, 0xb9, 0x40, 0x2d]\n\n    let aes = try! AES(key: key, blockMode: CTR(iv: iv), padding: .noPadding)\n    var encryptor = try! aes.makeEncryptor()\n    var encrypted = Array<UInt8>()\n    encrypted += try! encryptor.update(withBytes: plaintext[0..<5])\n    encrypted += try! encryptor.update(withBytes: plaintext[5..<15])\n    encrypted += try! encryptor.update(withBytes: plaintext[15...])\n    encrypted += try! encryptor.finish()\n    XCTAssertEqual(encrypted, expected, \"encryption failed\")\n\n    var decryptor = try! aes.makeDecryptor()\n    var decrypted = Array<UInt8>()\n    decrypted += try! decryptor.update(withBytes: expected[0..<5])\n    decrypted += try! decryptor.update(withBytes: expected[5..<15])\n    decrypted += try! decryptor.update(withBytes: expected[15...])\n    decrypted += try! decryptor.finish()\n    XCTAssertEqual(decrypted, plaintext, \"decryption failed\")\n  }\n\n  func testAESEncryptCTRStream() {\n    let key = Array<UInt8>(hex: \"0xbe3e9020816eb838782e2d9f4a2f40d4\")\n    let iv = Array<UInt8>(hex: \"0x0000000000000000a9bbd681ded0c0c8\")\n\n    do {\n      let aes = try AES(key: key, blockMode: CTR(iv: iv), padding: .noPadding)\n      var encryptor = try aes.makeEncryptor()\n\n      let encrypted1 = try encryptor.update(withBytes: [0x00, 0x01, 0x02, 0x03] as [UInt8])\n      XCTAssertEqual(encrypted1, Array<UInt8>(hex: \"d79d0344\"))\n      let encrypted2 = try encryptor.update(withBytes: [0x04, 0x05, 0x06, 0x07] as [UInt8])\n      XCTAssertEqual(encrypted2, Array<UInt8>(hex: \"b2a08879\"))\n      let encrypted3 = try encryptor.update(withBytes: [0x08] as [UInt8])\n      XCTAssertEqual(encrypted3, Array<UInt8>(hex: \"db\"))\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testAESWithWrongKey() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let key2: Array<UInt8> = [0x22, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x33]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let plaintext: Array<UInt8> = [49, 46, 50, 50, 50, 51, 51, 51, 51]\n\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7)\n    let aes2 = try! AES(key: key2, blockMode: CBC(iv: iv), padding: .pkcs7)\n    let encrypted = try! aes.encrypt(plaintext)\n    let decrypted = try? aes2.decrypt(encrypted)\n    XCTAssertTrue(decrypted! != plaintext, \"failed\")\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/issues/298\n  func testIssue298() {\n    let encryptedValue = \"47595cfa90f7b0b0e0d9d7240a2e035f7f4acde27d7ca778a7d8b05add32a0a92d945c0a59f7f0e029d7f2fbb258b2f0\"\n    let expected: Array<UInt8> = [55, 52, 98, 54, 53, 51, 101, 51, 54, 52, 51, 48, 100, 55, 97, 57, 99, 100, 57, 49, 97, 50, 52, 100, 57, 57, 52, 52, 98, 48, 51, 50, 79, 114, 70, 101, 99, 107, 114, 87, 111, 0, 0, 0, 0, 0, 0, 0]\n    let key = \"0123456789abcdef\"\n    let iv = \"fedcba9876543210\"\n\n    do {\n      let aes = try AES(key: key, iv: iv, padding: .noPadding)\n      let ciphertext = try aes.decrypt(Array<UInt8>(hex: encryptedValue))\n      XCTAssertEqual(ciphertext, expected)\n    } catch {\n      XCTFail(\"failed\")\n    }\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/issues/394\n  func testIssue394() {\n    let plaintext = \"Nullam quis risus eget urna mollis ornare vel eu leo.\".bytes\n    let key = \"passwordpassword\".bytes.md5() // -md md5\n    let iv = \"drowssapdrowssap\".bytes // -iv 64726f777373617064726f7773736170\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7) // -aes-128-cbc\n    let ciphertext = try! aes.encrypt(plaintext) // enc\n\n    // $ echo -n \"Nullam quis risus eget urna mollis ornare vel eu leo.\" | openssl enc -aes-128-cbc -md md5 -nosalt -iv 64726f777373617064726f7773736170 -pass pass:passwordpassword -base64\n    // cij+965z2Xqoj9tIHgtA72ZPfv5sxnt76vwkIt1CodYY313oa7mr0pSc5o++g0CX\n    // YczxK2fGIa84xtwDtRMwBQ==\n    XCTAssertEqual(ciphertext.toBase64(), \"cij+965z2Xqoj9tIHgtA72ZPfv5sxnt76vwkIt1CodYY313oa7mr0pSc5o++g0CXYczxK2fGIa84xtwDtRMwBQ==\")\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/issues/411\n  func testIssue411() {\n    let ciphertext: Array<UInt8> = [0x2a, 0x3a, 0x80, 0x05, 0xaf, 0x46, 0x58, 0x2d, 0x66, 0x52, 0x10, 0xae, 0x86, 0xd3, 0x8e, 0x8f] // test\n    let key = \"passwordpassword\".bytes.md5() // -md md5\n    let iv = \"drowssapdrowssap\".bytes // -iv 64726f777373617064726f7773736170\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7) // -aes-128-cbc\n    let plaintext = try! ciphertext.decrypt(cipher: aes)\n    XCTAssertEqual(\"74657374\", plaintext.toHexString())\n  }\n}\n\n// MARK: - GCM\n\nextension AESTests {\n  func testAESGCMTestCase1() {\n    // Test Case 1\n    let key = Array<UInt8>(hex: \"0x00000000000000000000000000000000\")\n    let iv = Array<UInt8>(hex: \"0x000000000000000000000000\")\n\n    let gcm = GCM(iv: iv, mode: .detached)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt([UInt8]())\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"\")) // C\n    XCTAssertEqual(gcm.authenticationTag, [UInt8](hex: \"58e2fccefa7e3061367f1d57a4e7455a\")) // T (128-bit)\n  }\n\n  func testAESGCMTestCase2() {\n    // Test Case 2\n    let key = Array<UInt8>(hex: \"0x00000000000000000000000000000000\")\n    let plaintext = Array<UInt8>(hex: \"0x00000000000000000000000000000000\")\n    let iv = Array<UInt8>(hex: \"0x000000000000000000000000\")\n\n    let gcm = GCM(iv: iv, mode: .detached)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0388dace60b6a392f328c2b971b2fe78\")) // C\n    XCTAssertEqual(gcm.authenticationTag, [UInt8](hex: \"ab6e47d42cec13bdf53a67b21257bddf\")) // T (128-bit)\n  }\n\n  func testAESGCMTestCase3() {\n    // Test Case 3\n    let key = Array<UInt8>(hex: \"0xfeffe9928665731c6d6a8f9467308308\")\n    let plaintext = Array<UInt8>(hex: \"0xd9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255\")\n    let iv = Array<UInt8>(hex: \"0xcafebabefacedbaddecaf888\")\n\n    let encGCM = GCM(iv: iv, mode: .detached)\n    let aes = try! AES(key: key, blockMode: encGCM, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertNotNil(encGCM.authenticationTag)\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0x42831ec2217774244b7221b784d0d49ce3aa212f2c02a4e035c17e2329aca12e21d514b25466931c7d8f6a5aac84aa051ba30b396a0aac973d58e091473f5985\")) // C\n    XCTAssertEqual(encGCM.authenticationTag, [UInt8](hex: \"0x4d5c2af327cd64a62cf35abd2ba6fab4\")) // T (128-bit)\n\n    // decrypt\n    func decrypt(_ encrypted: Array<UInt8>, tag: Array<UInt8>) -> Array<UInt8> {\n      let decGCM = GCM(iv: iv, authenticationTag: tag, mode: .detached)\n      let aes = try! AES(key: key, blockMode: decGCM, padding: .noPadding)\n      return try! aes.decrypt(encrypted)\n    }\n\n    let decrypted = decrypt(encrypted, tag: encGCM.authenticationTag!)\n    XCTAssertEqual(decrypted, plaintext)\n  }\n\n  func testAESGCMTestCase3Combined() {\n    // Test Case 3\n    let key = Array<UInt8>(hex: \"0xfeffe9928665731c6d6a8f9467308308\")\n    let plaintext = Array<UInt8>(hex: \"0xd9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b391aafd255\")\n    let iv = Array<UInt8>(hex: \"0xcafebabefacedbaddecaf888\")\n\n    let encGCM = GCM(iv: iv, mode: .combined)\n    let aes = try! AES(key: key, blockMode: encGCM, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertNotNil(encGCM.authenticationTag)\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0x42831ec2217774244b7221b784d0d49ce3aa212f2c02a4e035c17e2329aca12e21d514b25466931c7d8f6a5aac84aa051ba30b396a0aac973d58e091473f59854d5c2af327cd64a62cf35abd2ba6fab4\")) // C\n    XCTAssertEqual(encGCM.authenticationTag, [UInt8](hex: \"0x4d5c2af327cd64a62cf35abd2ba6fab4\")) // T (128-bit)\n\n    // decrypt\n    func decrypt(_ encrypted: Array<UInt8>) -> Array<UInt8> {\n      let decGCM = GCM(iv: iv, mode: .combined)\n      let aes = try! AES(key: key, blockMode: decGCM, padding: .noPadding)\n      return try! aes.decrypt(encrypted)\n    }\n\n    let decrypted = decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext)\n  }\n\n  func testAESGCMTestCase4() {\n    // Test Case 4\n    let key = Array<UInt8>(hex: \"0xfeffe9928665731c6d6a8f9467308308\")\n    let plaintext = Array<UInt8>(hex: \"0xd9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39\")\n    let iv = Array<UInt8>(hex: \"0xcafebabefacedbaddecaf888\")\n    let auth = Array<UInt8>(hex: \"0xfeedfacedeadbeeffeedfacedeadbeefabaddad2\")\n\n    let gcm = GCM(iv: iv, additionalAuthenticatedData: auth, mode: .detached)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0x42831ec2217774244b7221b784d0d49ce3aa212f2c02a4e035c17e2329aca12e21d514b25466931c7d8f6a5aac84aa051ba30b396a0aac973d58e091\")) // C\n    XCTAssertEqual(gcm.authenticationTag, [UInt8](hex: \"0x5bc94fbc3221a5db94fae95ae7121a47\")) // T (128-bit)\n  }\n\n  func testAESGCMTestCase5() {\n    // Test Case 5\n    let key = Array<UInt8>(hex: \"0xfeffe9928665731c6d6a8f9467308308\")\n    let plaintext = Array<UInt8>(hex: \"0xd9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39\")\n    let iv = Array<UInt8>(hex: \"0xcafebabefacedbad\")\n    let auth = Array<UInt8>(hex: \"0xfeedfacedeadbeeffeedfacedeadbeefabaddad2\")\n\n    let gcm = GCM(iv: iv, additionalAuthenticatedData: auth, mode: .detached)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0x61353b4c2806934a777ff51fa22a4755699b2a714fcdc6f83766e5f97b6c742373806900e49f24b22b097544d4896b424989b5e1ebac0f07c23f4598\")) // C\n    XCTAssertEqual(gcm.authenticationTag, [UInt8](hex: \"0x3612d2e79e3b0785561be14aaca2fccb\")) // T (128-bit)\n  }\n\n  func testAESGCMTestCase6() {\n    // Test Case 6\n    let key = Array<UInt8>(hex: \"0xfeffe9928665731c6d6a8f9467308308\")\n    let plaintext = Array<UInt8>(hex: \"0xd9313225f88406e5a55909c5aff5269a86a7a9531534f7da2e4c303d8a318a721c3c0c95956809532fcf0e2449a6b525b16aedf5aa0de657ba637b39\")\n    let iv = Array<UInt8>(hex: \"0x9313225df88406e555909c5aff5269aa6a7a9538534f7da1e4c303d2a318a728c3c0c95156809539fcf0e2429a6b525416aedbf5a0de6a57a637b39b\")\n    let auth = Array<UInt8>(hex: \"0xfeedfacedeadbeeffeedfacedeadbeefabaddad2\")\n\n    let gcm = GCM(iv: iv, additionalAuthenticatedData: auth, mode: .detached)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0x8ce24998625615b603a033aca13fb894be9112a5c3a211a8ba262a3cca7e2ca701e4a9a4fba43c90ccdcb281d48c7c6fd62875d2aca417034c34aee5\")) // C\n    XCTAssertEqual(gcm.authenticationTag, [UInt8](hex: \"0x619cc5aefffe0bfa462af43c1699d050\")) // T (128-bit)\n  }\n\n  func testAESGCMTestCase7() {\n    // Test Case 7\n    let key = Array<UInt8>(hex: \"0x000000000000000000000000000000000000000000000000\")\n    let plaintext = Array<UInt8>(hex: \"\")\n    let iv = Array<UInt8>(hex: \"0x000000000000000000000000\")\n\n    let gcm = GCM(iv: iv, mode: .detached)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"\")) // C\n    XCTAssertEqual(gcm.authenticationTag, [UInt8](hex: \"0xcd33b28ac773f74ba00ed1f312572435\")) // T (128-bit)\n  }\n\n  func testAESGCMTagLengthDetached() {\n    // Test Case 2\n    let key = Array<UInt8>(hex: \"0x00000000000000000000000000000000\")\n    let plaintext = Array<UInt8>(hex: \"0x00000000000000000000000000000000\")\n    let iv = Array<UInt8>(hex: \"0x000000000000000000000000\")\n\n    let gcm = GCM(iv: iv, tagLength: 12, mode: .detached)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0388dace60b6a392f328c2b971b2fe78\")) // C\n    XCTAssertEqual(gcm.authenticationTag, [UInt8](hex: \"ab6e47d42cec13bdf53a67b2\")) // T (96-bit)\n\n    // decrypt\n    func decrypt(_ encrypted: Array<UInt8>) -> Array<UInt8> {\n      let decGCM = GCM(iv: iv, authenticationTag: gcm.authenticationTag!, mode: .detached)\n      let aes = try! AES(key: key, blockMode: decGCM, padding: .noPadding)\n      return try! aes.decrypt(encrypted)\n    }\n\n    let decrypted = decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext)\n  }\n\n  func testAESGCMTagLengthCombined() {\n    // Test Case 2\n    let key = Array<UInt8>(hex: \"0x00000000000000000000000000000000\")\n    let plaintext = Array<UInt8>(hex: \"0x00000000000000000000000000000000\")\n    let iv = Array<UInt8>(hex: \"0x000000000000000000000000\")\n\n    let gcm = GCM(iv: iv, tagLength: 12, mode: .combined)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0388dace60b6a392f328c2b971b2fe78ab6e47d42cec13bdf53a67b2\")) // C\n    XCTAssertEqual(gcm.authenticationTag, [UInt8](hex: \"ab6e47d42cec13bdf53a67b2\")) // T (96-bit)\n\n    // decrypt\n    func decrypt(_ encrypted: Array<UInt8>) -> Array<UInt8> {\n      let decGCM = GCM(iv: iv, authenticationTag: gcm.authenticationTag!, mode: .combined)\n      let aes = try! AES(key: key, blockMode: decGCM, padding: .noPadding)\n      return try! aes.decrypt(encrypted)\n    }\n\n    let decrypted = decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext)\n  }\n\n  func testAESGCMTagLengthCombined2() {\n    let key = Array<UInt8>(hex: \"0x00000000000000000000000000000000\")\n    let plaintext = Array<UInt8>(hex: \"0x0000000000000000000000000000000000000000\")\n    let iv = Array<UInt8>(hex: \"0x000000000000\")\n\n    let gcm = GCM(iv: iv, tagLength: 12, mode: .combined)\n    let aes = try! AES(key: key, blockMode: gcm, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    // decrypt\n    func decrypt(_ encrypted: Array<UInt8>) -> Array<UInt8> {\n      let decGCM = GCM(iv: iv, authenticationTag: gcm.authenticationTag!, mode: .combined)\n      let aes = try! AES(key: key, blockMode: decGCM, padding: .noPadding)\n      return try! aes.decrypt(encrypted)\n    }\n\n    let decrypted = decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext)\n  }\n\n  func testAESGCMTestCaseIrregularCombined1() {\n    // echo -n \"0123456789010123456789012345\" | openssl enc -aes-128-gcm -K feffe9928665731c6d6a8f9467308308 -iv cafebabefacedbaddecaf888 -nopad -nosalt\n    // openssl note: The enc program does not support authenticated encryption modes like CCM and GCM. The utility does not store or retrieve the authentication tag\n    let key = Array<UInt8>(hex: \"0xfeffe9928665731c6d6a8f9467308308\")\n    let plaintext = \"0123456789010123456789012345\".bytes\n    let iv = Array<UInt8>(hex: \"0xcafebabefacedbaddecaf888\")\n\n    let encGCM = GCM(iv: iv, mode: .combined)\n    let aes = try! AES(key: key, blockMode: encGCM, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertNotNil(encGCM.authenticationTag)\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0xab831ed4edc644f6d61218431b14c0355138be4b010f630b29be7a2b9793b9fbecc7b44cc86dfd697a50c1c6\")) // C\n    XCTAssertEqual(encGCM.authenticationTag, [UInt8](hex: \"0x9793b9fbecc7b44cc86dfd697a50c1c6\")) // T (128-bit)\n\n    // decrypt\n    func decrypt(_ encrypted: Array<UInt8>) -> Array<UInt8> {\n      let decGCM = GCM(iv: iv, mode: .combined)\n      let aes = try! AES(key: key, blockMode: decGCM, padding: .noPadding)\n      return try! aes.decrypt(encrypted)\n    }\n\n    let decrypted = decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext)\n  }\n\n  func testAESGCMTestCaseIrregularCombined2() {\n    // echo -n \"0123456789010123456789012345012345678901012345678901234567\" | openssl enc -aes-128-gcm -K feffe9928665731c6d6a8f9467308308 -iv cafebabefacedbaddecaf888 -nopad -nosalt\n    // openssl note: The enc program does not support authenticated encryption modes like CCM and GCM. The utility does not store or retrieve the authentication tag\n    let key = Array<UInt8>(hex: \"0xfeffe9928665731c6d6a8f9467308308\")\n    let plaintext = \"0123456789010123456789012345012345678901012345678901234567\".bytes\n    let iv = Array<UInt8>(hex: \"0xcafebabefacedbaddecaf888\")\n\n    let encGCM = GCM(iv: iv, mode: .combined)\n    let aes = try! AES(key: key, blockMode: encGCM, padding: .noPadding)\n    let encrypted = try! aes.encrypt(plaintext)\n\n    XCTAssertNotNil(encGCM.authenticationTag)\n    XCTAssertEqual(Array(encrypted), [UInt8](hex: \"0xab831ed4edc644f6d61218431b14c0355138be4b010f630b29be7a2b93ac196f09dc2e10f937aa7e6271564dd117291792f0d6fdf2347ef5b10c86a7f414f0c91a8e59fd2405b850527e\")) // C\n    XCTAssertEqual(encGCM.authenticationTag, [UInt8](hex: \"0x86a7f414f0c91a8e59fd2405b850527e\")) // T (128-bit)\n\n    // decrypt\n    func decrypt(_ encrypted: Array<UInt8>) -> Array<UInt8> {\n      let decGCM = GCM(iv: iv, mode: .combined)\n      let aes = try! AES(key: key, blockMode: decGCM, padding: .noPadding)\n      return try! aes.decrypt(encrypted)\n    }\n\n    let decrypted = decrypt(encrypted)\n    XCTAssertEqual(decrypted, plaintext)\n  }\n}\n\nextension AESTests {\n  static func allTests() -> [(String, (AESTests) -> () -> Void)] {\n    let tests = [\n      (\"testAESEncrypt\", testAESEncrypt),\n      (\"testAESEncrypt2\", testAESEncrypt2),\n      (\"testAESEncrypt3\", testAESEncrypt3),\n      (\"testAESEncryptCBCNoPadding\", testAESEncryptCBCNoPadding),\n      (\"testAESEncryptCBCWithPadding\", testAESEncryptCBCWithPadding),\n      (\"testAESEncryptCBCWithPaddingPartial\", testAESEncryptCBCWithPaddingPartial),\n      (\"testAESEncryptIncremental\", testAESEncryptIncremental),\n      (\"testAESDecryptCBCWithPaddingPartial\", testAESDecryptCBCWithPaddingPartial),\n      (\"testAESEncryptCFB\", testAESEncryptCFB),\n      (\"testAESEncryptCFBLong\", testAESEncryptCFBLong),\n      (\"testAESEncryptCFB8\", testAESEncryptCFB8),\n      (\"testAESEncryptOFB128\", testAESEncryptOFB128),\n      (\"testAESEncryptOFB256\", testAESEncryptOFB256),\n      (\"testAESEncryptPCBC256\", testAESEncryptPCBC256),\n      (\"testAESEncryptCTR\", testAESEncryptCTR),\n      (\"testAESEncryptCTRZeroPadding\", testAESEncryptCTRZeroPadding),\n      (\"testAESEncryptCTRIrregularLength\", testAESEncryptCTRIrregularLength),\n      (\"testAESDecryptCTRSeek\", testAESDecryptCTRSeek),\n      (\"testAESEncryptCTRIrregularLengthIncrementalUpdate\", testAESEncryptCTRIrregularLengthIncrementalUpdate),\n      (\"testAESEncryptCTRStream\", testAESEncryptCTRStream),\n      (\"testIssue298\", testIssue298),\n      (\"testIssue394\", testIssue394),\n      (\"testIssue411\", testIssue411),\n      (\"testAESWithWrongKey\", testAESWithWrongKey),\n      (\"testAESGCMTestCase1\", testAESGCMTestCase1),\n      (\"testAESGCMTestCase2\", testAESGCMTestCase2),\n      (\"testAESGCMTestCase3\", testAESGCMTestCase3),\n      (\"testAESGCMTestCase3Combined\", testAESGCMTestCase3Combined),\n      (\"testAESGCMTestCase4\", testAESGCMTestCase4),\n      (\"testAESGCMTestCase5\", testAESGCMTestCase5),\n      (\"testAESGCMTestCase6\", testAESGCMTestCase6),\n      (\"testAESGCMTestCase7\", testAESGCMTestCase7),\n      (\"testAESGCMTestTagLengthDetached\", testAESGCMTagLengthDetached),\n      (\"testAESGCMTestTagLengthCombined\", testAESGCMTagLengthCombined),\n      (\"testAESGCMTestCaseIrregularCombined1\", testAESGCMTestCaseIrregularCombined1),\n      (\"testAESGCMTestCaseIrregularCombined2\", testAESGCMTestCaseIrregularCombined2)\n    ]\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/AESTestsPerf.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class AESTestsPerf: XCTestCase {\n  func testAESEncryptPerformance() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let message = Array<UInt8>(repeating: 7, count: 1024 * 1024)\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7)\n    measure {\n      _ = try! aes.encrypt(message)\n    }\n  }\n\n  func testAESDecryptPerformance() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f]\n    let message = Array<UInt8>(repeating: 7, count: 1024 * 1024)\n    let aes = try! AES(key: key, blockMode: CBC(iv: iv), padding: .pkcs7)\n    measure {\n      _ = try! aes.decrypt(message)\n    }\n  }\n}\n\nextension AESTestsPerf {\n  static func allTests() -> [(String, (AESTestsPerf) -> () -> Void)] {\n    let tests = [\n      (\"testAESEncryptPerformance\", testAESEncryptPerformance),\n      (\"testAESDecryptPerformance\", testAESDecryptPerformance)\n    ]\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/ASN1Tests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2021 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nfinal class ASN1Tests: XCTestCase {\n\n  /// This test ensures that we get the same data out as we put in before and after encoding\n  ///\n  /// This test enforces that\n  /// 1) The data provided to each of the `ASN1.Node`s is preserved across encoding and decoding.\n  func testASN1NonDestructiveEncoding() throws {\n    let arbitraryData = Data(hex: \"0123456789\")\n\n    // Encode the serialized BigInteger\n    let node: ASN1.Node = .sequence(nodes: [\n      .integer(data: arbitraryData),\n      .bitString(data: arbitraryData),\n      .octetString(data: arbitraryData),\n      .null,\n      .objectIdentifier(data: arbitraryData)\n    ])\n\n    let encoded = ASN1.Encoder.encode(node)\n\n    // Decode the Encoding\n    let decoded = try ASN1.Decoder.decode(data: Data(encoded))\n    guard case .sequence(let sequence) = decoded else {\n      XCTFail(\"Failed to recover encoded SEQUENCE\")\n      return\n    }\n\n    XCTAssertEqual(sequence.count, 5)\n\n    guard case .integer(let integerData) = sequence[0] else {\n      XCTFail(\"Failed to recover encoded INTEGER\")\n      return\n    }\n    XCTAssertEqual(integerData, arbitraryData)\n\n    guard case .bitString(let bitStringData) = sequence[1] else {\n      XCTFail(\"Failed to recover encoded BITSTRING\")\n      return\n    }\n    XCTAssertEqual(bitStringData, arbitraryData)\n\n    guard case .octetString(let octetData) = sequence[2] else {\n      XCTFail(\"Failed to recover encoded OCTETSTRING\")\n      return\n    }\n    XCTAssertEqual(octetData, arbitraryData)\n\n    guard case .null = sequence[3] else {\n      XCTFail(\"Failed to recover encoded NULL\")\n      return\n    }\n\n    guard case .objectIdentifier(let objIDData) = sequence[4] else {\n      XCTFail(\"Failed to recover encoded OBJECTIDENTIFIER\")\n      return\n    }\n    XCTAssertEqual(objIDData, arbitraryData)\n  }\n\n  /// The ASN1 Encoder / Decoder doesn't handle encoding / decoding Integers directly, it's your responsibility to accurately serialize your integers.\n  /// - Note: In this example we're using BigInteger's serialization technique to encode / decode Integers, which isn't the default method for handling integers. https://www.strozhevsky.com/free_docs/asn1_by_simple_words.pdf\n  ///\n  /// This test enforces that\n  /// 1) The data provided to the `ASN1.Node.integer` Node is preserved across encoding and decoding.\n  func testASN1DecodePrimitiveInteger() throws {\n    let tests = [\n      0,\n      -0,\n      128,\n      -128,\n      136,\n      -136,\n      8388607,\n      -8388607,\n      3409934108352718734,\n      -3409934108352718734\n    ]\n\n    for test in tests {\n      let number = BigInteger(test)\n\n      // Encode the serialized Integer\n      let encoded = ASN1.Encoder.encode(.integer(data: number.serialize()))\n\n      // Ensure the Integer Prefix was added\n      XCTAssertEqual(Array<UInt8>(arrayLiteral: 0x02), Array(encoded.prefix(1)))\n\n      // Decode the Encoding\n      let decoded = try ASN1.Decoder.decode(data: Data(encoded))\n      guard case .integer(let num) = decoded else {\n        XCTFail(\"Failed to recover encoded integer\")\n        return\n      }\n\n      // Ensure the original BigInteger was recovered\n      XCTAssertEqual(BigInteger(num), number)\n    }\n  }\n\n  /// Another test showing that Integers are stored as arbitrary data and the proper serialization and signage are the responsibilities of the user and their application.\n  ///\n  /// This test enforces that\n  /// 1) The data provided to the `ASN1.Node.integer` Node is preserved across encoding and decoding.\n  func testASN1DecodeLargeBigInteger() throws {\n    // Because INTEGERS are stored as arbitrary data we should be able to store an integer that would otherwise overflow by using the BigInteger library\n    let largeBigInt = BigInteger(\"1541235134652345698374107823450134507610354876134950342785028743653\")\n\n    // Encode the serialized BigInteger\n    let encoded = ASN1.Encoder.encode(.integer(data: largeBigInt.serialize()))\n\n    // Decode the Encoding\n    let decoded = try ASN1.Decoder.decode(data: Data(encoded))\n    guard case .integer(let num) = decoded else {\n      XCTFail(\"Failed to recover encoded integer\")\n      return\n    }\n\n    // Ensure the original BigInteger was recovered\n    XCTAssertEqual(BigInteger(num), largeBigInt)\n  }\n\n  /// This tests decodes an RSA Public Key from a Base64 DER Encoded representation\n  ///\n  /// This test enforces that\n  /// 1) The decoding process yields the expected format.\n  /// 2) The re-encoding of the data yields the exact same starting data.\n  func testANS1DERDecodingPublicKey() throws {\n    /// An example of an RSA Public Key ASN1 DER Encoding\n    ///\n    /// [IETF Spec RFC2313](https://datatracker.ietf.org/doc/html/rfc2313#section-7.1)\n    /// ```\n    /// =========================\n    ///  RSA PublicKey Structure\n    /// =========================\n    ///\n    /// RSAPublicKey ::= SEQUENCE {\n    ///   modulus           INTEGER,  -- n\n    ///   publicExponent    INTEGER,  -- e\n    /// }\n    /// ```\n    let publicDER = \"\"\"\n    MIGJAoGBAMGeZvIG84vyKAATwKkKz2g+PeNaZ63rxk/zEnLGxkMCVKnUZ6jPAtzYOKM24949yIhfxYBC/bOCPwRK4wbr4YyIx3WB2v+Zcqe8pRM/BThUpNIx3K2+jbJBhAopf1GXJ3i31RuiLMh9HWhxzkVamz1KnDjCuTZguCRRHIv+r3XTAgMBAAE=\n    \"\"\"\n\n    guard let publicDERData = Data(base64Encoded: publicDER) else {\n      XCTFail(\"Failed to convert base64 string into data for decoding.\")\n      return\n    }\n\n    let decoded = try ASN1.Decoder.decode(data: publicDERData)\n\n    // Ensure the first node is of type Sequence\n    guard case .sequence(let nodes) = decoded else {\n      XCTFail(\"Expected the top level node to be a sequence and it wasn't\")\n      return\n    }\n\n    // Ensure there are two nodes within the top level sequence (our integers, n and e)\n    XCTAssertEqual(nodes.count, 2)\n\n    // Ensure that the first node within our sequence is of type Integer\n    guard case .integer(let n) = nodes[0] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n\n    // Ensure the second node within our sequence is of type Integer\n    guard case .integer(let e) = nodes[1] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n\n    // Ensure that n contains the data we expected\n    XCTAssertEqual(n.toHexString(), \"00c19e66f206f38bf2280013c0a90acf683e3de35a67adebc64ff31272c6c6430254a9d467a8cf02dcd838a336e3de3dc8885fc58042fdb3823f044ae306ebe18c88c77581daff9972a7bca5133f053854a4d231dcadbe8db241840a297f51972778b7d51ba22cc87d1d6871ce455a9b3d4a9c38c2b93660b824511c8bfeaf75d3\")\n\n    // Ensure that e contains the data we expected\n    XCTAssertEqual(e.toHexString(), \"010001\") // 65537\n\n    // Re Encode the data\n    let asn1: ASN1.Node = .sequence(nodes: [\n      .integer(data: n),\n      .integer(data: e)\n    ])\n\n    let encoded = ASN1.Encoder.encode(asn1)\n\n    // Ensure the re-encoded data matches the original exactly\n    XCTAssertEqual(Data(encoded), publicDERData)\n    XCTAssertEqual(encoded, publicDERData.byteArray)\n    XCTAssertEqual(encoded.toBase64(), publicDER)\n  }\n\n  /// This tests decodes an RSA Private Key from a Base64 DER Encoded representation\n  ///\n  /// This test enforces that\n  /// 1) The decoding process yields the expected format.\n  /// 2) The re-encoding of the data yields the exact same starting data.\n  func testANS1DERDecodingPrivateKey() throws {\n    /// An example of an RSA Private Key ASN1 DER Encoding\n    ///\n    /// [IETF Spec RFC2313](https://datatracker.ietf.org/doc/html/rfc2313#section-7.2)\n    /// ```\n    /// ==========================\n    ///  RSA PrivateKey Structure\n    /// ==========================\n    ///\n    /// RSAPrivateKey ::= SEQUENCE {\n    ///   version           Version,\n    ///   modulus           INTEGER,  -- n\n    ///   publicExponent    INTEGER,  -- e\n    ///   privateExponent   INTEGER,  -- d\n    ///   prime1            INTEGER,  -- p\n    ///   prime2            INTEGER,  -- q\n    ///   exponent1         INTEGER,  -- d mod (p-1)\n    ///   exponent2         INTEGER,  -- d mod (q-1)\n    ///   coefficient       INTEGER,  -- (inverse of q) mod p\n    ///   otherPrimeInfos   OtherPrimeInfos OPTIONAL\n    /// }\n    /// ```\n    let privateDER = \"\"\"\n    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\n    \"\"\"\n\n    guard let privateDERData = Data(base64Encoded: privateDER) else {\n      XCTFail(\"Failed to convert base64 string into data for decoding.\")\n      return\n    }\n\n    let decoded = try ASN1.Decoder.decode(data: privateDERData)\n\n    // Ensure the first Node is of type SEQUENCE\n    guard case .sequence(let nodes) = decoded else {\n      XCTFail(\"Expected the top level node to be a sequence and it wasn't\")\n      return\n    }\n\n    // Ensure there are nine (9) Nodes within the top level SEQUENCE\n    XCTAssertEqual(nodes.count, 9)\n\n    // Deconstruct the parameters\n    guard case .integer(let version) = nodes[0] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(version, Data(hex: \"00\"))\n\n    guard case .integer(let n) = nodes[1] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(n, Data(hex: \"00c19e66f206f38bf2280013c0a90acf683e3de35a67adebc64ff31272c6c6430254a9d467a8cf02dcd838a336e3de3dc8885fc58042fdb3823f044ae306ebe18c88c77581daff9972a7bca5133f053854a4d231dcadbe8db241840a297f51972778b7d51ba22cc87d1d6871ce455a9b3d4a9c38c2b93660b824511c8bfeaf75d3\"))\n\n    guard case .integer(let e) = nodes[2] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(e, Data(hex: \"010001\"))\n\n    guard case .integer(let d) = nodes[3] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(d, Data(hex: \"18990d2f165efe9a87266b5c009dd4f7c3608d6fc0d841a9f2224967b7851ca2412b4a46d91563a1b6fe8b0dc0294de41a1f40b228d09e6b9fa1e5f9adb96deffa238297d5852ecd1ec2828bc371ed4f766cd9cfd113f89a8829bf31965649d476fea35bb757f3714a804cb06cd29ae423d09355e29ea5cbdf780d8d674e87f1\"))\n\n    guard case .integer(let p) = nodes[4] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(p, Data(hex: \"00e3744e2435d570280e7d75d5914a1bc988e30e1bcf938c4e47bdc673290f943250706e49cbe6d20913b2a737d6447cd8a1566cab300cc901f7b63c2c99022a7f\"))\n\n    guard case .integer(let q) = nodes[5] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(q, Data(hex: \"00d9eb05906f927207956251ab52aaea524bf38f58fa17c47ef2b1af0a3ab65a70cbf13cceecda13eea8af5bffba13da2c5f55b0580b63ffce1e37b76f2cbc42ad\"))\n\n    guard case .integer(let exp1) = nodes[6] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(exp1, Data(hex: \"00dec6a2666ae7c33328860f2c7f62237730009b67f7d65f1ca8bda22a56f430455b6dd347aa534832a5bd5c749f03737846053ce82a66cb5587065147a9116b07\"))\n\n    guard case .integer(let exp2) = nodes[7] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(exp2, Data(hex: \"7c7fbb44139a352f83f711f5b15b185840303c5b773690fa7e2969798ca595f20f72196d96ffd897672418897783d407b9c7b8e1f450035b7d0413f69e364859\"))\n\n    guard case .integer(let coefficient) = nodes[8] else {\n      XCTFail(\"Expected an integer within our sequence and it wasn't\")\n      return\n    }\n    XCTAssertEqual(coefficient, Data(hex: \"009c74545364466fe538e67149f41815334669ecc2245cd58120f350d20e5bc3ddd10855297a3cb93370d348b6b803e527c2e4cc42bfa3c852525586791abc48d2\"))\n\n    // Ensure re-encoding the data yields the exact same starting data\n    let asn: ASN1.Node = .sequence(nodes: [\n      .integer(data: version),\n      .integer(data: n),\n      .integer(data: e),\n      .integer(data: d),\n      .integer(data: p),\n      .integer(data: q),\n      .integer(data: exp1),\n      .integer(data: exp2),\n      .integer(data: coefficient)\n    ])\n\n    // Encode the ASN1 Nodes\n    let encodedData = ASN1.Encoder.encode(asn)\n\n    // Ensure the re-encoded data matches the original data exactly\n    XCTAssertEqual(Data(encodedData), privateDERData)\n    XCTAssertEqual(encodedData, privateDERData.byteArray)\n    XCTAssertEqual(encodedData.toBase64(), privateDER.replacingOccurrences(of: \"\\n\", with: \"\"))\n  }\n\n  /// This tests decodes an Encrypted RSA Private Key from a Base64 PEM Encoded representation\n  ///\n  /// This test enforces that\n  /// 1) The decoding process yields the expected format.\n  /// 2) The re-encoding of the data yields the exact same starting data.\n  func testASN1DecodingEncryptedPEM() throws {\n    /// ==========================\n    ///  Encrypted PEM Structure\n    /// ==========================\n    ///\n    /// EncryptedPrivateKey ::= SEQUENCE {\n    ///\n    ///   PEMStructure ::= SEQUENCE {\n    ///     pemObjID  OBJECTIDENTIFIER\n    ///\n    ///     EncryptionAlgorithms ::= SEQUENCE {\n    ///\n    ///       PBKDFAlgorithms ::= SEQUENCE {\n    ///         pbkdfObjID  OBJECTIDENTIFIER\n    ///         PBKDFParams ::= SEQUENCE {\n    ///           salt OCTETSTRING,\n    ///           iterations INTEGER\n    ///         }\n    ///       },\n    ///\n    ///       CIPHERAlgorithms ::= SEQUENCE {\n    ///         cipherObjID  OBJECTIDENTIFIER,\n    ///         iv           OCTETSTRING\n    ///       }\n    ///     }\n    ///   }\n    ///   encryptedData OCTETSTRING\n    /// }\n    ///\n    /// /*\n    ///  * Generated with\n    ///  * openssl genpkey -algorithm RSA\n    ///  *   -pkeyopt rsa_keygen_bits:1024\n    ///  *   -pkeyopt rsa_keygen_pubexp:65537\n    ///  *   -out foo.pem\n    ///  * openssl pkcs8 -in foo.pem -topk8 -v2 aes-128-cbc -passout pass:mypassword\n    ///  */\n    let encryptedPEMFormat = \"\"\"\n    MIICzzBJBgkqhkiG9w0BBQ0wPDAbBgkqhkiG9w0BBQwwDgQIP5QK2RfqUl4CAggA\n    MB0GCWCGSAFlAwQBAgQQj3OyM9gnW2dd/eRHkxjGrgSCAoCpM5GZB0v27cxzZsGc\n    O4/xqgwB0c/bSJ6QogtYU2KVoc7ZNQ5q9jtzn3I4ONvneOkpm9arzYz0FWnJi2C3\n    BPiF0D1NkfvjvMLv56bwiG2A1oBECacyAb2pXYeJY7SdtYKvcbgs3jx65uCm6TF2\n    BylteH+n1ewTQN9DLfASp1n81Ajq9lQGaK03SN2MUtcAPp7N9gnxJrlmDGeqlPRs\n    KpQYRcot+kE6Ew8a5jAr7mAxwpqvr3SM4dMvADZmRQsM4Uc/9+YMUdI52DG87EWc\n    0OUB+fnQ8jw4DZgOE9KKM5/QTWc3aEw/dzXr/YJsrv01oLazhqVHnEMG0Nfr0+DP\n    q+qac1AsCsOb71VxaRlRZcVEkEfAq3gidSPD93qmlDrCnmLYTilcLanXUepda7ez\n    qhjkHtpwBLN5xRZxOn3oUuLGjk8VRwfmFX+RIMYCyihjdmbEDYpNUVkQVYFGi/F/\n    1hxOyl9yhGdL0hb9pKHH10GGIgoqo4jSTLlb4ennihGMHCjehAjLdx/GKJkOWShy\n    V9hj8rAuYnRNb+tUW7ChXm1nLq14x9x1tX0ciVVn3ap/NoMkbFTr8M3pJ4bQlpAn\n    wCT2erYqwQtgSpOJcrFeph9TjIrNRVE7Zlmr7vayJrB/8/oPssVdhf82TXkna4fB\n    PcmO0YWLa117rfdeNM/Duy0ThSdTl39Qd+4FxqRZiHjbt+l0iSa/nOjTv1TZ/QqF\n    wqrO6EtcM45fbFJ1Y79o2ptC2D6MB4HKJq9WCt064/8zQCVx3XPbb3X8Z5o/6koy\n    ePGbz+UtSb9xczvqpRCOiFLh2MG1dUgWuHazjOtUcVWvilKnkjCMzZ9s1qG0sUDj\n    nPyn\n    \"\"\"\n\n    guard let pemData = Data(base64Encoded: encryptedPEMFormat.replacingOccurrences(of: \"\\n\", with: \"\")) else {\n      XCTFail(\"Failed to convert base64 string to data\")\n      return\n    }\n\n    let asn = try ASN1.Decoder.decode(data: pemData)\n\n    // Ensure the first node is a Sequence\n    guard case .sequence(let encryptedPEMWrapper) = asn else {\n      XCTFail(\"Expected top level Node to be a SEQUENCE object\")\n      return\n    }\n    // Ensure the first Sequence contains exactly 2 nodes (another Sequence and our OctetString of encrypted data)\n    XCTAssertEqual(encryptedPEMWrapper.count, 2)\n\n    // Ensure the first node within the top level sequence is another sequence\n    guard case .sequence(let encryptionInfoWrapper) = encryptedPEMWrapper[0] else {\n      XCTFail(\"Expected the first Node within our top level SEQUENCE to be a SEQUENCE object and it wasn't\")\n      return\n    }\n    // Ensure this sequence contains exactly two nodes (the PEMs ObjectIdentifier and another sequence that houses the encryption algorithms)\n    XCTAssertEqual(encryptionInfoWrapper.count, 2)\n\n    // Ensure the first Node is the PEM's OBJECTIDENTIFIER Node\n    guard case .objectIdentifier(let pemObjID) = encryptionInfoWrapper[0] else {\n      XCTFail(\"Expected an OBJECTIDENTIFIER and it wasn't\")\n      return\n    }\n\n    // Ensure the second Node is another SEQUENCE Node\n    guard case .sequence(let encryptionAlgorithmsWrapper) = encryptionInfoWrapper[1] else {\n      XCTFail(\"Expected another SEQUENCE Node and it wasn't\")\n      return\n    }\n    // Ensure this sequence contains exactly two nodes (the PEMs ObjectIdentifier and another sequence that houses the encryption algorithms)\n    XCTAssertEqual(encryptionAlgorithmsWrapper.count, 2)\n\n    // Ensure the first Node is another SEQUENCE Node\n    guard case .sequence(let pbkdfAlgorithmWrapper) = encryptionAlgorithmsWrapper[0] else {\n      XCTFail(\"Expected another SEQUENCE Node and it wasn't\")\n      return\n    }\n    // Ensure this sequence contains exactly two nodes (the PBKDF ObjectIdentifier and another sequence that houses the PBKDF params)\n    XCTAssertEqual(pbkdfAlgorithmWrapper.count, 2)\n\n    guard case .objectIdentifier(let pbkdfObjID) = pbkdfAlgorithmWrapper[0] else {\n      XCTFail(\"Expected an OBJECTIDENTIFIER and it wasn't\")\n      return\n    }\n    guard case .sequence(let pbkdfParamsWrapper) = pbkdfAlgorithmWrapper[1] else {\n      XCTFail(\"Expected an OCTETSTRING and it wasn't\")\n      return\n    }\n    // Ensure this sequence contains exactly two nodes (the PBKDF Salt as an OCTETSTRING and the PBKDF Iterations as an INTEGER)\n    XCTAssertEqual(pbkdfParamsWrapper.count, 2)\n    guard case .octetString(let pbkdfSalt) = pbkdfParamsWrapper[0] else {\n      XCTFail(\"Expected an OCTETSTRING and it wasn't\")\n      return\n    }\n    guard case .integer(let pbkdfIterations) = pbkdfParamsWrapper[1] else {\n      XCTFail(\"Expected an INTEGER and it wasn't\")\n      return\n    }\n\n    // Ensure the second Node is another SEQUENCE Node\n    guard case .sequence(let cipherAlgorithmWrapper) = encryptionAlgorithmsWrapper[1] else {\n      XCTFail(\"Expected another SEQUENCE Node and it wasn't\")\n      return\n    }\n    // Ensure this sequence contains exactly two nodes (the CIPHER ObjectIdentifier and an OCTETSTRING that contains the CIPHERs InitialVector)\n    XCTAssertEqual(cipherAlgorithmWrapper.count, 2)\n\n    guard case .objectIdentifier(let cipherObjID) = cipherAlgorithmWrapper[0] else {\n      XCTFail(\"Expected an OBJECTIDENTIFIER and it wasn't\")\n      return\n    }\n    guard case .octetString(let cipherInitialVector) = cipherAlgorithmWrapper[1] else {\n      XCTFail(\"Expected an OCTETSTRING and it wasn't\")\n      return\n    }\n\n    // Ensure the last (2nd) Node in the top level SEQUENCE Node is an OCTETSTRING that contains the encrypted key data\n    guard case .octetString(let encryptedData) = encryptedPEMWrapper[1] else {\n      XCTFail(\"Expected the last Node in the first SEQUENCE Node to be an OCTETSTRING and it wasn't\")\n      return\n    }\n\n    // Now lets ensure we can re encode the object and get back the exact same data\n    let nodes: ASN1.Node = .sequence(nodes: [\n      .sequence(nodes: [\n        .objectIdentifier(data: pemObjID),\n        .sequence(nodes: [\n          .sequence(nodes: [\n            .objectIdentifier(data: pbkdfObjID),\n            .sequence(nodes: [\n              .octetString(data: pbkdfSalt),\n              .integer(data: pbkdfIterations)\n            ])\n          ]),\n          .sequence(nodes: [\n            .objectIdentifier(data: cipherObjID),\n            .octetString(data: cipherInitialVector)\n          ])\n        ])\n      ]),\n      .octetString(data: encryptedData)\n    ])\n\n    // Encode the ASN1 Nodes\n    let encodedData = ASN1.Encoder.encode(nodes)\n\n    // Ensure the re-encoded data matches the original data exactly\n    XCTAssertEqual(Data(encodedData), pemData)\n    XCTAssertEqual(encodedData, pemData.byteArray)\n    XCTAssertEqual(encodedData.toBase64(), encryptedPEMFormat.replacingOccurrences(of: \"\\n\", with: \"\"))\n  }\n\n  static let allTests = [\n    (\"testASN1NonDestructiveEncoding\", testASN1NonDestructiveEncoding),\n    (\"testASN1DecodePrimitiveInteger\", testASN1DecodePrimitiveInteger),\n    (\"testASN1DecodeLargeBigInteger\", testASN1DecodeLargeBigInteger),\n    (\"testANS1DERDecodingPublicKey\", testANS1DERDecodingPublicKey),\n    (\"testANS1DERDecodingPrivateKey\", testANS1DERDecodingPrivateKey),\n    (\"testASN1DecodingEncryptedPEM\", testASN1DecodingEncryptedPEM)\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/Access.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// import without @testable to test public API\nimport CryptoSwift\nimport Foundation\nimport XCTest\n\nclass Access: XCTestCase {\n  let cipher = try! AES(key: \"secret0key000000\", iv: \"0123456789012345\")\n  let authenticator = HMAC(key: Array<UInt8>(hex: \"b1b2b3b3b3b3b3b3b1b2b3b3b3b3b3b3\"), variant: .sha1)\n\n  func testChecksum() {\n    _ = Checksum.crc32([1, 2, 3])\n    _ = Checksum.crc32c([1, 2, 3])\n    _ = Checksum.crc16([1, 2, 3])\n  }\n\n  func testRandomIV() {\n    _ = AES.randomIV(AES.blockSize)\n    _ = ChaCha20.randomIV(ChaCha20.blockSize)\n  }\n\n  func testDigest() {\n    _ = Digest.md5([1, 2, 3])\n    _ = Digest.sha1([1, 2, 3])\n    _ = Digest.sha224([1, 2, 3])\n    _ = Digest.sha256([1, 2, 3])\n    _ = Digest.sha384([1, 2, 3])\n    _ = Digest.sha512([1, 2, 3])\n    _ = Digest.sha3([1, 2, 3], variant: .sha224)\n\n    _ = SHA1().calculate(for: [0])\n    _ = SHA2(variant: .sha224).calculate(for: [0])\n    _ = SHA3(variant: .sha256).calculate(for: [0])\n\n    _ = MD5().calculate(for: [0])\n  }\n\n  func testArrayExtension() {\n    let array = Array<UInt8>(hex: \"b1b2b3b3b3b3b3b3b1b2b3b3b3b3b3b3\")\n    _ = array.toHexString()\n\n    _ = array.md5()\n    _ = array.sha1()\n    _ = array.sha256()\n    _ = array.sha384()\n    _ = array.sha512()\n    _ = array.sha2(.sha224)\n    _ = array.sha3(.sha224)\n    _ = array.crc32()\n    _ = array.crc32c()\n    _ = array.crc16()\n\n    do {\n      _ = try array.encrypt(cipher: self.cipher)\n      _ = try array.decrypt(cipher: self.cipher)\n      _ = try array.authenticate(with: self.authenticator)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testCollectionExtension() {\n    // nothing public\n  }\n\n  func testStringExtension() {\n    let string = \"foofoobarbar\"\n    _ = string.md5()\n    _ = string.sha1()\n    _ = string.sha224()\n    _ = string.sha256()\n    _ = string.sha384()\n    _ = string.sha512()\n    _ = string.sha3(.sha224)\n    _ = string.crc16()\n    _ = string.crc32()\n    _ = string.crc32c()\n\n    do {\n      _ = try string.encrypt(cipher: self.cipher)\n      _ = try string.authenticate(with: self.authenticator)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testStringFoundationExtension() {\n    let string = \"aPf/i9th9iX+vf49eR7PYk2q7S5xmm3jkRLejgzHNJs=\"\n    do {\n      _ = try string.decryptBase64ToString(cipher: self.cipher)\n      _ = try string.decryptBase64(cipher: self.cipher)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testIntExtension() {\n    // nothing public\n  }\n\n  func testUInt16Extension() {\n    // nothing public\n  }\n\n  func testUInt32Extension() {\n    // nothing public\n  }\n\n  func testUInt64Extension() {\n    // nothing public\n  }\n\n  func testUInt8Extension() {\n    // nothing public\n  }\n\n  func testDataExtension() {\n    let data = Data( [1, 2, 3, 4, 5, 6, 7, 8, 1, 2, 3, 4, 5, 6, 7, 8])\n    _ = data.checksum()\n    _ = data.md5()\n    _ = data.sha1()\n    _ = data.sha224()\n    _ = data.sha256()\n    _ = data.sha384()\n    _ = data.sha512()\n    _ = data.sha3(.sha224)\n    _ = data.crc16()\n    _ = data.crc32()\n    _ = data.crc32c()\n\n    _ = data.byteArray\n    _ = data.toHexString()\n\n    do {\n      _ = try data.encrypt(cipher: self.cipher)\n      _ = try data.decrypt(cipher: self.cipher)\n      _ = try data.authenticate(with: self.authenticator)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testPadding() {\n    // PKCS7\n    _ = Padding.pkcs7.add(to: [1, 2, 3], blockSize: 16)\n    _ = Padding.pkcs7.remove(from: [1, 2, 3], blockSize: 16)\n\n    // PKCS5\n    _ = Padding.pkcs5.add(to: [1, 2, 3], blockSize: 16)\n    _ = Padding.pkcs5.remove(from: [1, 2, 3], blockSize: 16)\n\n    // NoPadding\n    _ = Padding.noPadding.add(to: [1, 2, 3], blockSize: 16)\n    _ = Padding.noPadding.remove(from: [1, 2, 3], blockSize: 16)\n\n    // ZeroPadding\n    _ = Padding.zeroPadding.add(to: [1, 2, 3], blockSize: 16)\n    _ = Padding.zeroPadding.remove(from: [1, 2, 3], blockSize: 16)\n  }\n\n  func testPBKDF() {\n    do {\n      _ = PKCS5.PBKDF1.Variant.md5\n      _ = try PKCS5.PBKDF1(password: [1, 2, 3, 4, 5, 6, 7], salt: [1, 2, 3, 4, 5, 6, 7, 8]).calculate()\n      _ = try PKCS5.PBKDF2(password: [1, 2, 3, 4, 5, 6, 7], salt: [1, 2, 3, 4]).calculate()\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testAuthenticators() {\n    do {\n      _ = try HMAC(key: Array<UInt8>(hex: \"b1b2b3b3b3b3b3b3b1b2b3b3b3b3b3b3\"), variant: .sha1).authenticate([1, 2, 3])\n      _ = try Poly1305(key: [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2]).authenticate([1, 2, 3])\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testAES() {\n    do {\n      let cipher = try AES(key: \"secret0key000000\", iv: \"0123456789012345\")\n      var encryptor = try cipher.makeEncryptor()\n      _ = try encryptor.update(withBytes: [1, 2, 3])\n      _ = try encryptor.finish()\n\n      var decryptor = try cipher.makeDecryptor()\n      _ = try decryptor.update(withBytes: [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16])\n      _ = try decryptor.finish()\n\n      let enc = try cipher.encrypt([1, 2, 3])\n      _ = try cipher.decrypt(enc)\n\n      _ = try AES(key: [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6], blockMode: CBC(iv: [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6]), padding: .noPadding)\n\n      _ = AES.Variant.aes128\n      _ = AES.blockSize\n    } catch {\n      XCTFail(\"\\(error)\")\n    }\n  }\n\n  func testBlowfish() {\n    do {\n      let cipher = try Blowfish(key: \"secret0key000000\", iv: \"01234567\")\n      let enc = try cipher.encrypt([1, 2, 3])\n      _ = try cipher.decrypt(enc)\n\n      _ = try Blowfish(key: [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6], padding: .noPadding)\n\n      _ = Blowfish.blockSize\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testRabbit() {\n    do {\n      let rabbit = try Rabbit(key: [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00])\n      let enc = try rabbit.encrypt([1, 2, 3])\n      _ = try rabbit.decrypt(enc)\n\n      XCTAssertThrowsError(try Rabbit(key: \"123\"))\n\n      _ = Rabbit.blockSize\n      _ = Rabbit.keySize\n      _ = Rabbit.ivSize\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testChaCha20() {\n    let key: Array<UInt8> = [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]\n    let iv: Array<UInt8> = [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]\n\n    do {\n      _ = ChaCha20.blockSize\n      let chacha20 = try ChaCha20(key: key, iv: iv)\n      let enc = try chacha20.encrypt([1, 3, 4])\n      _ = try chacha20.decrypt(enc)\n\n      XCTAssertThrowsError(try ChaCha20(key: \"123\", iv: \"12345678\"))\n\n      _ = chacha20.makeEncryptor()\n      _ = chacha20.makeDecryptor()\n\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testUpdatable() {\n    // TODO:\n  }\n\n  static let allTests = [\n    (\"testChecksum\", testChecksum),\n    (\"testDigest\", testDigest),\n    (\"testArrayExtension\", testArrayExtension),\n    (\"testCollectionExtension\", testCollectionExtension),\n    (\"testStringExtension\", testStringExtension),\n    (\"testStringFoundationExtension\", testStringFoundationExtension),\n    (\"testIntExtension\", testIntExtension),\n    (\"testUInt16Extension\", testUInt16Extension),\n    (\"testUInt32Extension\", testUInt32Extension),\n    (\"testUInt64Extension\", testUInt64Extension),\n    (\"testUInt8Extension\", testUInt8Extension),\n    (\"testDataExtension\", testDataExtension),\n    (\"testPadding\", testPadding),\n    (\"testPBKDF\", testPBKDF),\n    (\"testAuthenticators\", testAuthenticators),\n    (\"testAES\", testAES),\n    (\"testBlowfish\", testBlowfish),\n    (\"testRabbit\", testRabbit),\n    (\"testChaCha20\", testChaCha20),\n    (\"testUpdatable\", testUpdatable),\n    (\"testRandomIV\", testRandomIV)\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/BlowfishTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// Test vector from http://www.schneier.com/code/vectors.txt\n\nimport XCTest\n@testable import CryptoSwift\n\nclass BlowfishTests: XCTestCase {\n  struct TestData {\n    let key: Array<UInt8>\n    let input: Array<UInt8>\n    let output: Array<UInt8>\n  }\n\n  let tests = [\n    TestData(key: [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n             input: [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n             output: [0x4e, 0xf9, 0x97, 0x45, 0x61, 0x98, 0xdd, 0x78]),\n    TestData(key: [0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff],\n             input: [0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff],\n             output: [0x51, 0x86, 0x6f, 0xd5, 0xb8, 0x5e, 0xcb, 0x8a]),\n    TestData(key: [0x30, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n             input: [0x10, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01],\n             output: [0x7d, 0x85, 0x6f, 0x9a, 0x61, 0x30, 0x63, 0xf2]),\n    TestData(key: [0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11],\n             input: [0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11],\n             output: [0x24, 0x66, 0xdd, 0x87, 0x8b, 0x96, 0x3c, 0x9d]),\n\n    TestData(key: [0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef],\n             input: [0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11],\n             output: [0x61, 0xf9, 0xc3, 0x80, 0x22, 0x81, 0xb0, 0x96]),\n\n    TestData(key: [0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11, 0x11],\n             input: [0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef],\n             output: [0x7d, 0x0c, 0xc6, 0x30, 0xaf, 0xda, 0x1e, 0xc7]),\n\n    TestData(key: [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n             input: [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n             output: [0x4e, 0xf9, 0x97, 0x45, 0x61, 0x98, 0xdd, 0x78]),\n\n    TestData(key: [0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10],\n             input: [0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef],\n             output: [0x0a, 0xce, 0xab, 0x0f, 0xc6, 0xa0, 0xa2, 0x8d]),\n\n    TestData(key: [0x7c, 0xa1, 0x10, 0x45, 0x4a, 0x1a, 0x6e, 0x57],\n             input: [0x01, 0xa1, 0xd6, 0xd0, 0x39, 0x77, 0x67, 0x42],\n             output: [0x59, 0xc6, 0x82, 0x45, 0xeb, 0x05, 0x28, 0x2b]),\n\n    TestData(key: [0x01, 0x31, 0xd9, 0x61, 0x9d, 0xc1, 0x37, 0x6e],\n             input: [0x5c, 0xd5, 0x4c, 0xa8, 0x3d, 0xef, 0x57, 0xda],\n             output: [0xb1, 0xb8, 0xcc, 0x0b, 0x25, 0x0f, 0x09, 0xa0]),\n\n    TestData(key: [0x07, 0xa1, 0x13, 0x3e, 0x4a, 0x0b, 0x26, 0x86],\n             input: [0x02, 0x48, 0xd4, 0x38, 0x06, 0xf6, 0x71, 0x72],\n             output: [0x17, 0x30, 0xe5, 0x77, 0x8b, 0xea, 0x1d, 0xa4]),\n\n    TestData(key: [0x38, 0x49, 0x67, 0x4c, 0x26, 0x02, 0x31, 0x9e],\n             input: [0x51, 0x45, 0x4b, 0x58, 0x2d, 0xdf, 0x44, 0x0a],\n             output: [0xa2, 0x5e, 0x78, 0x56, 0xcf, 0x26, 0x51, 0xeb]),\n\n    TestData(key: [0x04, 0xb9, 0x15, 0xba, 0x43, 0xfe, 0xb5, 0xb6],\n             input: [0x42, 0xfd, 0x44, 0x30, 0x59, 0x57, 0x7f, 0xa2],\n             output: [0x35, 0x38, 0x82, 0xb1, 0x09, 0xce, 0x8f, 0x1a]),\n\n    TestData(key: [0x01, 0x13, 0xb9, 0x70, 0xfd, 0x34, 0xf2, 0xce],\n             input: [0x05, 0x9b, 0x5e, 0x08, 0x51, 0xcf, 0x14, 0x3a],\n             output: [0x48, 0xf4, 0xd0, 0x88, 0x4c, 0x37, 0x99, 0x18]),\n\n    TestData(key: [0x01, 0x70, 0xf1, 0x75, 0x46, 0x8f, 0xb5, 0xe6],\n             input: [0x07, 0x56, 0xd8, 0xe0, 0x77, 0x47, 0x61, 0xd2],\n             output: [0x43, 0x21, 0x93, 0xb7, 0x89, 0x51, 0xfc, 0x98]),\n\n    TestData(key: [0x43, 0x29, 0x7f, 0xad, 0x38, 0xe3, 0x73, 0xfe],\n             input: [0x76, 0x25, 0x14, 0xb8, 0x29, 0xbf, 0x48, 0x6a],\n             output: [0x13, 0xf0, 0x41, 0x54, 0xd6, 0x9d, 0x1a, 0xe5]),\n\n    TestData(key: [0x07, 0xa7, 0x13, 0x70, 0x45, 0xda, 0x2a, 0x16],\n             input: [0x3b, 0xdd, 0x11, 0x90, 0x49, 0x37, 0x28, 0x02],\n             output: [0x2e, 0xed, 0xda, 0x93, 0xff, 0xd3, 0x9c, 0x79]),\n\n    TestData(key: [0x04, 0x68, 0x91, 0x04, 0xc2, 0xfd, 0x3b, 0x2f],\n             input: [0x26, 0x95, 0x5f, 0x68, 0x35, 0xaf, 0x60, 0x9a],\n             output: [0xd8, 0x87, 0xe0, 0x39, 0x3c, 0x2d, 0xa6, 0xe3]),\n\n    TestData(key: [0x37, 0xd0, 0x6b, 0xb5, 0x16, 0xcb, 0x75, 0x46],\n             input: [0x16, 0x4d, 0x5e, 0x40, 0x4f, 0x27, 0x52, 0x32],\n             output: [0x5f, 0x99, 0xd0, 0x4f, 0x5b, 0x16, 0x39, 0x69]),\n\n    TestData(key: [0x1f, 0x08, 0x26, 0x0d, 0x1a, 0xc2, 0x46, 0x5e],\n             input: [0x6b, 0x05, 0x6e, 0x18, 0x75, 0x9f, 0x5c, 0xca],\n             output: [0x4a, 0x05, 0x7a, 0x3b, 0x24, 0xd3, 0x97, 0x7b]),\n\n    TestData(key: [0x58, 0x40, 0x23, 0x64, 0x1a, 0xba, 0x61, 0x76],\n             input: [0x00, 0x4b, 0xd6, 0xef, 0x09, 0x17, 0x60, 0x62],\n             output: [0x45, 0x20, 0x31, 0xc1, 0xe4, 0xfa, 0xda, 0x8e]),\n\n    TestData(key: [0x02, 0x58, 0x16, 0x16, 0x46, 0x29, 0xb0, 0x07],\n             input: [0x48, 0x0d, 0x39, 0x00, 0x6e, 0xe7, 0x62, 0xf2],\n             output: [0x75, 0x55, 0xae, 0x39, 0xf5, 0x9b, 0x87, 0xbd]),\n\n    TestData(key: [0x49, 0x79, 0x3e, 0xbc, 0x79, 0xb3, 0x25, 0x8f],\n             input: [0x43, 0x75, 0x40, 0xc8, 0x69, 0x8f, 0x3c, 0xfa],\n             output: [0x53, 0xc5, 0x5f, 0x9c, 0xb4, 0x9f, 0xc0, 0x19]),\n\n    TestData(key: [0x4f, 0xb0, 0x5e, 0x15, 0x15, 0xab, 0x73, 0xa7],\n             input: [0x07, 0x2d, 0x43, 0xa0, 0x77, 0x07, 0x52, 0x92],\n             output: [0x7a, 0x8e, 0x7b, 0xfa, 0x93, 0x7e, 0x89, 0xa3]),\n\n    TestData(key: [0x49, 0xe9, 0x5d, 0x6d, 0x4c, 0xa2, 0x29, 0xbf],\n             input: [0x02, 0xfe, 0x55, 0x77, 0x81, 0x17, 0xf1, 0x2a],\n             output: [0xcf, 0x9c, 0x5d, 0x7a, 0x49, 0x86, 0xad, 0xb5]),\n\n    TestData(key: [0x01, 0x83, 0x10, 0xdc, 0x40, 0x9b, 0x26, 0xd6],\n             input: [0x1d, 0x9d, 0x5c, 0x50, 0x18, 0xf7, 0x28, 0xc2],\n             output: [0xd1, 0xab, 0xb2, 0x90, 0x65, 0x8b, 0xc7, 0x78]),\n\n    TestData(key: [0x1c, 0x58, 0x7f, 0x1c, 0x13, 0x92, 0x4f, 0xef],\n             input: [0x30, 0x55, 0x32, 0x28, 0x6d, 0x6f, 0x29, 0x5a],\n             output: [0x55, 0xcb, 0x37, 0x74, 0xd1, 0x3e, 0xf2, 0x01]),\n\n    TestData(key: [0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01, 0x01],\n             input: [0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef],\n             output: [0xfa, 0x34, 0xec, 0x48, 0x47, 0xb2, 0x68, 0xb2]),\n\n    TestData(key: [0x1f, 0x1f, 0x1f, 0x1f, 0x0e, 0x0e, 0x0e, 0x0e],\n             input: [0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef],\n             output: [0xa7, 0x90, 0x79, 0x51, 0x08, 0xea, 0x3c, 0xae]),\n\n    TestData(key: [0xe0, 0xfe, 0xe0, 0xfe, 0xf1, 0xfe, 0xf1, 0xfe],\n             input: [0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef],\n             output: [0xc3, 0x9e, 0x07, 0x2d, 0x9f, 0xac, 0x63, 0x1d]),\n\n    TestData(key: [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n             input: [0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff],\n             output: [0x01, 0x49, 0x33, 0xe0, 0xcd, 0xaf, 0xf6, 0xe4]),\n\n    TestData(key: [0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff],\n             input: [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n             output: [0xf2, 0x1e, 0x9a, 0x77, 0xb7, 0x1c, 0x49, 0xbc]),\n\n    TestData(key: [0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef],\n             input: [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n             output: [0x24, 0x59, 0x46, 0x88, 0x57, 0x54, 0x36, 0x9a]),\n\n    TestData(key: [0xfe, 0xdc, 0xba, 0x98, 0x76, 0x54, 0x32, 0x10],\n             input: [0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff],\n             output: [0x6b, 0x5c, 0x5a, 0x9c, 0x5d, 0x9e, 0x0a, 0x5a])\n  ]\n\n  func testEncrypt() {\n    for test in self.tests {\n      XCTAssertEqual(try Blowfish(key: test.key, blockMode: ECB(), padding: .noPadding).encrypt(test.input), test.output)\n    }\n  }\n\n  func testDecrypt() {\n    for test in self.tests {\n      XCTAssertEqual(try Blowfish(key: test.key, blockMode: ECB(), padding: .noPadding).decrypt(test.output), test.input)\n    }\n  }\n\n  func testCBCZeroPadding() {\n    let key = Array<UInt8>(hex: \"0123456789ABCDEFF0E1D2C3B4A59687\")\n    let iv = Array<UInt8>(hex: \"FEDCBA9876543210\")\n    let input = Array<UInt8>(hex: \"37363534333231204E6F77206973207468652074696D6520666F722000\")\n    XCTAssertEqual(try Blowfish(key: key, blockMode: CBC(iv: iv), padding: .zeroPadding).encrypt(input), Array<UInt8>(hex: \"6B77B4D63006DEE605B156E27403979358DEB9E7154616D959F1652BD5FF92CC\"))\n  }\n\n  func testEncryptDecrypt() {\n    let key = Array<UInt8>.init(hex: \"0123456789ABCDEFF0E1D2C3B4A59687\")\n    let iv = Array<UInt8>.init(hex: \"FEDCBA9876543210\")\n    let input = Array<UInt8>.init(hex: \"37363534333231204E6F77206973207468652074696D6520666F722000\")\n\n    do {\n      let cipher = try Blowfish(key: key, blockMode: CBC(iv: iv), padding: .pkcs7)\n      let ciphertext = try cipher.encrypt(input)\n      let plaintext = try cipher.decrypt(ciphertext)\n      XCTAssertEqual(plaintext, input)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/issues/415\n  func testDecryptCFB415() {\n    do {\n      let plaintext = \"secret12\".bytes\n      let key = \"passwordpassword\".bytes\n      let iv = \"12345678\".bytes\n      let encrypted = try Blowfish(key: key, blockMode: CFB(iv: iv), padding: .noPadding).encrypt(plaintext)\n      let decrypted = try Blowfish(key: key, blockMode: CFB(iv: iv), padding: .noPadding).decrypt(encrypted)\n      XCTAssertEqual(plaintext, decrypted)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n}\n\nextension BlowfishTests {\n  static func allTests() -> [(String, (BlowfishTests) -> () -> Void)] {\n    let tests = [\n      (\"testEncrypt\", testEncrypt),\n      (\"testDecrypt\", testDecrypt),\n      (\"testCBCZeroPadding\", testCBCZeroPadding),\n      (\"testEncryptDecrypt\", testEncryptDecrypt),\n      (\"testDecryptCFB415\", testDecryptCFB415)\n    ]\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/Bridging.h",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose,including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n#ifndef CryptoSwift_Bridging_h\n#define CryptoSwift_Bridging_h\n\n#import <CommonCrypto/CommonCrypto.h>\n\n#endif\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/CBCMacTests.swift",
    "content": "////  CryptoSwift\n//\n//  Copyright (C) 2014-__YEAR__ Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass CBCMacTests: XCTestCase {\n  func testMessageLength0() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let msg: Array<UInt8> = []\n    let expectedMac: Array<UInt8> = [0xf6, 0xc7, 0x1e, 0xed, 0xc3, 0xd9, 0x9b, 0xb1, 0x83, 0xcb, 0x5b, 0x8d, 0x15, 0x68, 0xe6, 0x06]\n\n    let cbcmac = try! CBCMAC(key: key).authenticate(msg)\n    XCTAssertEqual(cbcmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testMessageLength16() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let msg: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expectedMac: Array<UInt8> = [0x05, 0x39, 0xbd, 0xa3, 0x0b, 0x3f, 0x76, 0x34, 0x46, 0x6a, 0x75, 0xd9, 0x84, 0x18, 0xbf, 0x65]\n\n    let cbcmac = try! CBCMAC(key: key).authenticate(msg)\n    XCTAssertEqual(cbcmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testMessageLength40() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let msg: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11]\n    let expectedMac: Array<UInt8> = [0xa5, 0x26, 0x0f, 0x98, 0xf1, 0xab, 0xf2, 0xb2, 0x75, 0x62, 0xed, 0x5f, 0xc1, 0xfb, 0xeb, 0x8d]\n\n    let cbcmac = try! CBCMAC(key: key).authenticate(msg)\n    XCTAssertEqual(cbcmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testMessageLength64() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let msg: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10]\n    let expectedMac: Array<UInt8> = [0x5b, 0xf8, 0x2f, 0x1f, 0xe7, 0x48, 0x3b, 0x9a, 0x87, 0x5c, 0xaf, 0x3d, 0xed, 0x3a, 0x01, 0x71]\n\n    let cbcmac = try! CBCMAC(key: key).authenticate(msg)\n    XCTAssertEqual(cbcmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  static let allTests = [\n    (\"testMessageLength0\", testMessageLength0),\n    (\"testMessageLength16\", testMessageLength16),\n    (\"testMessageLength40\", testMessageLength40),\n    (\"testMessageLength64\", testMessageLength64)\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/CMACTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// Test vectors from https://tools.ietf.org/html/rfc4493\n// Text vectors from http://www.nuee.nagoya-u.ac.jp/labs/tiwata/omac/tv/omac1-tv.txt\n\nimport XCTest\n@testable import CryptoSwift\n\nfinal class CMACTests: XCTestCase {\n  func testMessageLength0() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let msg: Array<UInt8> = []\n    let expectedMac: Array<UInt8> = [0xbb, 0x1d, 0x69, 0x29, 0xe9, 0x59, 0x37, 0x28, 0x7f, 0xa3, 0x7d, 0x12, 0x9b, 0x75, 0x67, 0x46]\n\n    let cmac = try! CMAC(key: key).authenticate(msg)\n    XCTAssertEqual(cmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testMessageLength16() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let msg: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a]\n    let expectedMac: Array<UInt8> = [0x07, 0x0a, 0x16, 0xb4, 0x6b, 0x4d, 0x41, 0x44, 0xf7, 0x9b, 0xdd, 0x9d, 0xd0, 0x4a, 0x28, 0x7c]\n\n    let cmac = try! CMAC(key: key).authenticate(msg)\n    XCTAssertEqual(cmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testMessageLength40() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let msg: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11]\n    let expectedMac: Array<UInt8> = [0xdf, 0xa6, 0x67, 0x47, 0xde, 0x9a, 0xe6, 0x30, 0x30, 0xca, 0x32, 0x61, 0x14, 0x97, 0xc8, 0x27]\n\n    let cmac = try! CMAC(key: key).authenticate(msg)\n    XCTAssertEqual(cmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testMessageLength64() {\n    let key: Array<UInt8> = [0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c]\n    let msg: Array<UInt8> = [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10]\n    let expectedMac: Array<UInt8> = [0x51, 0xf0, 0xbe, 0xbf, 0x7e, 0x3b, 0x9d, 0x92, 0xfc, 0x49, 0x74, 0x17, 0x79, 0x36, 0x3c, 0xfe]\n\n    let cmac = try! CMAC(key: key).authenticate(msg)\n    XCTAssertEqual(cmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testOMACTextVectors() {\n    // Test vectors: http://www.nuee.nagoya-u.ac.jp/labs/tiwata/omac/tv/omac1-tv.txt\n    let vectors: [(key: [UInt8], msg: [UInt8], cmac: [UInt8])] = [\n      // AES-192\n      (key: [0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b],\n       msg: [],\n       cmac: [0xd1, 0x7d, 0xdf, 0x46, 0xad, 0xaa, 0xcd, 0xe5, 0x31, 0xca, 0xc4, 0x83, 0xde, 0x7a, 0x93, 0x67]),\n      (key: [0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b],\n       msg: [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a],\n       cmac: [0x9e, 0x99, 0xa7, 0xbf, 0x31, 0xe7, 0x10, 0x90, 0x06, 0x62, 0xf6, 0x5e, 0x61, 0x7c, 0x51, 0x84]),\n      (key: [0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b],\n       msg: [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11],\n       cmac: [0x8a, 0x1d, 0xe5, 0xbe, 0x2e, 0xb3, 0x1a, 0xad, 0x08, 0x9a, 0x82, 0xe6, 0xee, 0x90, 0x8b, 0x0e]),\n      (key: [0x8e, 0x73, 0xb0, 0xf7, 0xda, 0x0e, 0x64, 0x52, 0xc8, 0x10, 0xf3, 0x2b, 0x80, 0x90, 0x79, 0xe5, 0x62, 0xf8, 0xea, 0xd2, 0x52, 0x2c, 0x6b, 0x7b],\n       msg: [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10],\n       cmac: [0xa1, 0xd5, 0xdf, 0x0e, 0xed, 0x79, 0x0f, 0x79, 0x4d, 0x77, 0x58, 0x96, 0x59, 0xf3, 0x9a, 0x11]),\n      // AES-256\n      (key: [0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4],\n       msg: [],\n       cmac: [0x02, 0x89, 0x62, 0xf6, 0x1b, 0x7b, 0xf8, 0x9e, 0xfc, 0x6b, 0x55, 0x1f, 0x46, 0x67, 0xd9, 0x83]),\n      (key: [0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4],\n       msg: [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a],\n       cmac: [0x28, 0xa7, 0x02, 0x3f, 0x45, 0x2e, 0x8f, 0x82, 0xbd, 0x4b, 0xf2, 0x8d, 0x8c, 0x37, 0xc3, 0x5c]),\n      (key: [0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4],\n       msg: [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11],\n       cmac: [0xaa, 0xf3, 0xd8, 0xf1, 0xde, 0x56, 0x40, 0xc2, 0x32, 0xf5, 0xb1, 0x69, 0xb9, 0xc9, 0x11, 0xe6]),\n      (key: [0x60, 0x3d, 0xeb, 0x10, 0x15, 0xca, 0x71, 0xbe, 0x2b, 0x73, 0xae, 0xf0, 0x85, 0x7d, 0x77, 0x81, 0x1f, 0x35, 0x2c, 0x07, 0x3b, 0x61, 0x08, 0xd7, 0x2d, 0x98, 0x10, 0xa3, 0x09, 0x14, 0xdf, 0xf4],\n       msg: [0x6b, 0xc1, 0xbe, 0xe2, 0x2e, 0x40, 0x9f, 0x96, 0xe9, 0x3d, 0x7e, 0x11, 0x73, 0x93, 0x17, 0x2a, 0xae, 0x2d, 0x8a, 0x57, 0x1e, 0x03, 0xac, 0x9c, 0x9e, 0xb7, 0x6f, 0xac, 0x45, 0xaf, 0x8e, 0x51, 0x30, 0xc8, 0x1c, 0x46, 0xa3, 0x5c, 0xe4, 0x11, 0xe5, 0xfb, 0xc1, 0x19, 0x1a, 0x0a, 0x52, 0xef, 0xf6, 0x9f, 0x24, 0x45, 0xdf, 0x4f, 0x9b, 0x17, 0xad, 0x2b, 0x41, 0x7b, 0xe6, 0x6c, 0x37, 0x10],\n       cmac: [0xe1, 0x99, 0x21, 0x90, 0x54, 0x9f, 0x6e, 0xd5, 0x69, 0x6a, 0x2c, 0x05, 0x6c, 0x31, 0x54, 0x10]),\n    ]\n\n    for v in vectors {\n      let cmac = try! CMAC(key: v.key).authenticate(v.msg)\n      XCTAssertEqual(cmac, v.cmac, \"Failed \\(v)\")\n    }\n  }\n\n  static let allTests = [\n    (\"testMessageLength0\", testMessageLength0),\n    (\"testMessageLength16\", testMessageLength16),\n    (\"testMessageLength40\", testMessageLength40),\n    (\"testMessageLength64\", testMessageLength64),\n    (\"testOMACTextVectors\", testOMACTextVectors)\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/ChaCha20Poly1305Tests.swift",
    "content": "//\n//  ChaCha20Poly1305Tests.swift\n//  CryptoSwiftTests\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n//\n//  https://tools.ietf.org/html/rfc7539#section-2.8.1\n\nimport XCTest\n@testable import CryptoSwift\n\nclass ChaCha20Poly1305Tests: XCTestCase {\n  static let allTests = [\n    (\"testCCPoly1\", test1),\n    (\"testCCPoly2\", test2),\n    (\"testCCPoly3\", test3)\n  ]\n\n  func test1() {\n    self.executeTestCase(\"6b65792e6b65792e6b65792e6b65792e6b65792e6b65792e6b65792e6b65792e\",\n                         \"6e6f6e63652e6e6f6e63652e\",\n                         \"\",\n                         \"6d657373616765\",\n                         \"5d9c0a9fe7d5e5\",\n                         \"c93aa61fc3cc66a819ac96f6ce365aee\")\n  }\n\n  func test2() {\n    /* Test vector from section 2.8.2. */\n    self.executeTestCase(\"808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f\",\n                         \"070000004041424344454647\",\n                         \"50515253c0c1c2c3c4c5c6c7\",\n                         \"4c616469657320616e642047656e746c656d656e206f662074686520636c617373206f66202739393a204966204920636f756c64206f6666657220796f75206f6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73637265656e20776f756c642062652069742e\",\n                         \"d31a8d34648e60db7b86afbc53ef7ec2a4aded51296e08fea9e2b5a736ee62d63dbea45e8ca9671282fafb69da92728b1a71de0a9e060b2905d6a5b67ecd3b3692ddbd7f2d778b8c9803aee328091b58fab324e4fad675945585808b4831d7bc3ff4def08e4b7a9de576d26586cec64b6116\",\n                         \"1ae10b594f09e26a7e902ecbd0600691\")\n  }\n\n  func test3() {\n    /* Test vector from A.5. */\n    self.executeTestCase(\"1c9240a5eb55d38af333888604f6b5f0473917c1402b80099dca5cbc207075c0\",\n                         \"000000000102030405060708\",\n                         \"f33388860000000000004e91\",\n                         \"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\",\n                         \"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\",\n                         \"eead9d67890cbb22392336fea1851f38\")\n  }\n\n  func executeTestCase(_ key: String, _ nonce: String, _ header: String, _ message: String, _ cipher: String, _ tag: String) {\n    let keyArr = Array<UInt8>(hex: key)\n    let nonceArr = Array<UInt8>(hex: nonce)\n    let headerArr = Array<UInt8>(hex: header)\n    let messageArr = Array<UInt8>(hex: message)\n    let cipherArr = Array<UInt8>(hex: cipher)\n    let tagArr = Array<UInt8>(hex: tag)\n\n    do {\n      let encryptResult = try AEADChaCha20Poly1305.encrypt(messageArr, key: keyArr, iv: nonceArr, authenticationHeader: headerArr)\n\n      XCTAssertEqual(encryptResult.cipherText, cipherArr, \"cipher not equal\")\n      XCTAssertEqual(encryptResult.authenticationTag, tagArr, \"tag not equal\")\n    } catch {\n      XCTAssert(false, \"Encryption Failed with error: \\(error.localizedDescription)\")\n    }\n\n    do {\n      let decryptResult = try AEADChaCha20Poly1305.decrypt(cipherArr, key: keyArr, iv: nonceArr, authenticationHeader: headerArr, authenticationTag: tagArr)\n\n      XCTAssertEqual(decryptResult.success, true, \"decrypt mac check failed\")\n      XCTAssertEqual(decryptResult.plainText, messageArr, \"message not equal\")\n    } catch {\n      XCTAssert(false, \"Encryption Failed with error: \\(error.localizedDescription)\")\n    }\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/ChaCha20Tests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class ChaCha20Tests: XCTestCase {\n  func testChaCha20() {\n    let keys: [Array<UInt8>] = [\n      [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n      [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01],\n      [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n      [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n      [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f]\n    ]\n\n    let ivs: [Array<UInt8>] = [\n      [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n      [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n      [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01],\n      [0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n      [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07]\n    ]\n\n    let expectedHexes = [\n      \"76B8E0ADA0F13D90405D6AE55386BD28BDD219B8A08DED1AA836EFCC8B770DC7DA41597C5157488D7724E03FB8D84A376A43B8F41518A11CC387B669B2EE6586\",\n      \"4540F05A9F1FB296D7736E7B208E3C96EB4FE1834688D2604F450952ED432D41BBE2A0B6EA7566D2A5D1E7E20D42AF2C53D792B1C43FEA817E9AD275AE546963\",\n      \"DE9CBA7BF3D69EF5E786DC63973F653A0B49E015ADBFF7134FCB7DF137821031E85A050278A7084527214F73EFC7FA5B5277062EB7A0433E445F41E3\",\n      \"EF3FDFD6C61578FBF5CF35BD3DD33B8009631634D21E42AC33960BD138E50D32111E4CAF237EE53CA8AD6426194A88545DDC497A0B466E7D6BBDB0041B2F586B\",\n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n    ]\n\n    for idx in 0..<keys.count {\n      let expectedHex = expectedHexes[idx]\n      let message = Array<UInt8>(repeating: 0, count: expectedHex.count / 2)\n\n      do {\n        let encrypted = try message.encrypt(cipher: ChaCha20(key: keys[idx], iv: ivs[idx]))\n        let decrypted = try encrypted.decrypt(cipher: ChaCha20(key: keys[idx], iv: ivs[idx]))\n        XCTAssertEqual(message, decrypted, \"ChaCha20 decryption failed\")\n        XCTAssertEqual(encrypted, Array<UInt8>(hex: expectedHex))\n      } catch CipherError.encrypt {\n        XCTAssert(false, \"Encryption failed\")\n      } catch CipherError.decrypt {\n        XCTAssert(false, \"Decryption failed\")\n      } catch {\n        XCTAssert(false, \"Failed\")\n      }\n    }\n  }\n\n  func testCore() {\n    let key: Array<UInt8> = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31]\n    var counter: Array<UInt8> = [1, 0, 0, 0, 0, 0, 0, 9, 0, 0, 0, 74, 0, 0, 0, 0]\n    let input = Array<UInt8>.init(repeating: 0, count: 129)\n    let chacha = try! ChaCha20(key: key, iv: Array(key[4..<16]))\n    let result = chacha.process(bytes: input.slice, counter: &counter, key: key)\n    XCTAssertEqual(result.toHexString(), \"10f1e7e4d13b5915500fdd1fa32071c4c7d1f4c733c068030422aa9ac3d46c4ed2826446079faa0914c2d705d98b02a2b5129cd1de164eb9cbd083e8a2503c4e0a88837739d7bf4ef8ccacb0ea2bb9d69d56c394aa351dfda5bf459f0a2e9fe8e721f89255f9c486bf21679c683d4f9c5cf2fa27865526005b06ca374c86af3bdc\")\n  }\n\n  func testVector1Py() {\n    let key: Array<UInt8> = [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]\n    let iv: Array<UInt8> = [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00]\n    let expected: Array<UInt8> = [0x76, 0xb8, 0xe0, 0xad, 0xa0, 0xf1, 0x3d, 0x90, 0x40, 0x5d, 0x6a, 0xe5, 0x53, 0x86, 0xbd, 0x28, 0xbd, 0xd2, 0x19, 0xb8, 0xa0, 0x8d, 0xed, 0x1a, 0xa8, 0x36, 0xef, 0xcc, 0x8b, 0x77, 0x0d, 0xc7, 0xda, 0x41, 0x59, 0x7c, 0x51, 0x57, 0x48, 0x8d, 0x77, 0x24, 0xe0, 0x3f, 0xb8, 0xd8, 0x4a, 0x37, 0x6a, 0x43, 0xb8, 0xf4, 0x15, 0x18, 0xa1, 0x1c, 0xc3, 0x87, 0xb6, 0x69, 0xb2, 0xee, 0x65, 0x86]\n    let message = Array<UInt8>(repeating: 0, count: expected.count)\n\n    do {\n      let encrypted = try ChaCha20(key: key, iv: iv).encrypt(message)\n      XCTAssertEqual(encrypted, expected, \"Ciphertext failed\")\n    } catch {\n      XCTFail()\n    }\n  }\n\n  func testChaCha20EncryptPartial() {\n    let key: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07]\n    let expectedHex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n    let plaintext: Array<UInt8> = Array<UInt8>(repeating: 0, count: expectedHex.count / 2)\n\n    do {\n      let cipher = try ChaCha20(key: key, iv: iv)\n\n      var ciphertext = Array<UInt8>()\n      var encryptor = cipher.makeEncryptor()\n      ciphertext += try encryptor.update(withBytes: Array(plaintext[0..<8]))\n      ciphertext += try encryptor.update(withBytes: Array(plaintext[8..<16]))\n      ciphertext += try encryptor.update(withBytes: Array(plaintext[16..<80]))\n      ciphertext += try encryptor.update(withBytes: Array(plaintext[80..<256]))\n      ciphertext += try encryptor.finish()\n      XCTAssertEqual(Array<UInt8>(hex: expectedHex), ciphertext)\n    } catch {\n      XCTFail()\n    }\n  }\n}\n\nextension ChaCha20Tests {\n  static func allTests() -> [(String, (ChaCha20Tests) -> () -> Void)] {\n    let tests = [\n      (\"testChaCha20\", testChaCha20),\n      (\"testCore\", testCore),\n      (\"testVector1Py\", testVector1Py),\n      (\"testChaCha20EncryptPartial\", testChaCha20EncryptPartial)\n    ]\n\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/ChaCha20TestsPerf.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class ChaCha20TestsPerf: XCTestCase {\n  func testChaCha20Performance() {\n    let key: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f]\n    let iv: Array<UInt8> = [0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07]\n    let message = Array<UInt8>(repeating: 7, count: 1024 * 1024)\n    measureMetrics([XCTPerformanceMetric.wallClockTime], automaticallyStartMeasuring: true) { () -> Void in\n      do {\n        _ = try ChaCha20(key: key, iv: iv).encrypt(message)\n      } catch {\n        XCTFail()\n      }\n      self.stopMeasuring()\n    }\n  }\n}\n\nextension ChaCha20TestsPerf {\n  static func allTests() -> [(String, (ChaCha20TestsPerf) -> () -> Void)] {\n    let tests = [(\"testChaCha20Performance\", testChaCha20Performance)]\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/DigestTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// http://www.di-mgt.com.au/sha_testvectors.html (http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/SHA_All.pdf)\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class DigestTests: XCTestCase {\n  func testMD5() {\n    XCTAssertEqual(\"123\".md5(), \"202cb962ac59075b964b07152d234b70\", \"MD5 calculation failed\")\n    XCTAssertEqual(\"\".md5(), \"d41d8cd98f00b204e9800998ecf8427e\", \"MD5 calculation failed\")\n    XCTAssertEqual(\"a\".md5(), \"0cc175b9c0f1b6a831c399e269772661\", \"MD5 calculation failed\")\n    XCTAssertEqual(\"abc\".md5(), \"900150983cd24fb0d6963f7d28e17f72\", \"MD5 calculation failed\")\n    XCTAssertEqual(\"message digest\".md5(), \"f96b697d7cb7938d525a2f31aaf161d0\", \"MD5 calculation failed\")\n    XCTAssertEqual(\"abcdefghijklmnopqrstuvwxyz\".md5(), \"c3fcd3d76192e4007dfb496cca67e13b\", \"MD5 calculation failed\")\n    XCTAssertEqual(\"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789\".md5(), \"d174ab98d277d9f5a5611c2c9f419d9f\", \"MD5 calculation failed\")\n    XCTAssertEqual(\"12345678901234567890123456789012345678901234567890123456789012345678901234567890\".md5(), \"57edf4a22be3c955ac49da2e2107b67a\", \"MD5 calculation failed\")\n  }\n\n  func testSHA1() {\n    XCTAssertEqual(SHA1().calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"a9993e364706816aba3e25717850c26c9cd0d89d\")\n    XCTAssertEqual(SHA1().calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"da39a3ee5e6b4b0d3255bfef95601890afd80709\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha1(), \"84983e441c3bd26ebaae4aa1f95129e5e54670f1\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha1(), \"a49b2446a02c645bf419f995b67091253a04a259\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha1(), Array<UInt8>(hex: \"34aa973cd4c4daa4f61eeb2bdbad27316534016f\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n\n    // https://github.com/krzyzanowskim/CryptoSwift/issues/363\n    XCTAssertEqual(\"1477304791&1XpnGSRhOlZz2etXMeOdfNaHILTjW16U&8mpBBbzwsgs\".sha1(), \"0809bbf8489c594131c2030a84be364a0851a635\", \"Failed\")\n    XCTAssertEqual(\"1477304791&1XpnGSRhOlZz2etXMeOdfNaHILTjW16U&8mpBBbzwsgsa\".sha1(), \"d345b525ebada7becc8107c54e07fa88644471f5\", \"Failed\")\n    XCTAssertEqual(\"1477304791&1XpnGSRhOlZz2etXMeOdfNaHILTjW16U&8mpBBbzwsg\".sha1(), \"c106aa0a98606294ee35fd2d937e928ebb5339e0\", \"Failed\")\n  }\n\n  func testSHA2() {\n    XCTAssertEqual(SHA2(variant: .sha224).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"23097d223405d8228642a477bda255b32aadbce4bda0b3f7e36c9da7\")\n    XCTAssertEqual(SHA2(variant: .sha256).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"ba7816bf8f01cfea414140de5dae2223b00361a396177a9cb410ff61f20015ad\")\n    XCTAssertEqual(SHA2(variant: .sha384).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"cb00753f45a35e8bb5a03d699ac65007272c32ab0eded1631a8b605a43ff5bed8086072ba1e7cc2358baeca134c825a7\")\n    XCTAssertEqual(SHA2(variant: .sha512).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f\")\n\n    XCTAssertEqual(SHA2(variant: .sha224).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"d14a028c2a3a2bc9476102bb288234c415a2b01f828ea62ac5b3e42f\")\n    XCTAssertEqual(SHA2(variant: .sha256).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855\")\n    XCTAssertEqual(SHA2(variant: .sha384).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"38b060a751ac96384cd9327eb1b1e36a21fdb71114be07434c0cc7bf63f6e1da274edebfe76f65fbd51ad2f14898b95b\")\n    XCTAssertEqual(SHA2(variant: .sha512).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e\")\n\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha224(), \"75388b16512776cc5dba5da1fd890150b0c6455cb4f58b1952522525\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha256(), \"248d6a61d20638b8e5c026930c3e6039a33ce45964ff2167f6ecedd419db06c1\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha384(), \"3391fdddfc8dc7393707a65b1b4709397cf8b1d162af05abfe8f450de5f36bc6b0455a8520bc4e6f5fe95b1fe3c8452b\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha512(), \"204a8fc6dda82f0a0ced7beb8e08a41657c16ef468b228a8279be331a703c33596fd15c13b1b07f9aa1d3bea57789ca031ad85c7a71dd70354ec631238ca3445\")\n\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha224(), \"c97ca9a559850ce97a04a96def6d99a9e0e0e2ab14e6b8df265fc0b3\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha256(), \"cf5b16a778af8380036ce59e7b0492370b249b11e8f07a51afac45037afee9d1\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha384(), \"09330c33f71147e83d192fc782cd1b4753111b173b3b05d22fa08086e3b0f712fcc7c71a557e2db966c3e9fa91746039\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha512(), \"8e959b75dae313da8cf4f72814fc143f8f7779c6eb9f7fa17299aeadb6889018501d289e4900f7e4331b99dec4b5433ac7d329eeb6dd26545e96e55b874be909\")\n\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha224(), Array<UInt8>(hex: \"20794655980c91d8bbb4c1ea97618a4bf03f42581948b2ee4ee7ad67\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha256(), Array<UInt8>(hex: \"cdc76e5c9914fb9281a1c7e284d73e67f1809a48a497200e046d39ccc7112cd0\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha384(), Array<UInt8>(hex: \"9d0e1809716474cb086e834e310a4a1ced149e9c00f248527972cec5704c2a5b07b8b3dc38ecc4ebae97ddd87f3d8985\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha512(), Array<UInt8>(hex: \"e718483d0ce769644e2e42c7bc15b4638e1f98b13b2044285632a803afa973ebde0ff244877ea60a4cb0432ce577c31beb009c5c2c49aa2e4eadb217ad8cc09b\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n\n    XCTAssertEqual(\"Rosetta code\".sha256(), \"764faf5c61ac315f1497f9dfa542713965b785e5cc2f707d6468d7d1124cdfcf\", \"SHA256 calculation failed\")\n    XCTAssertEqual(\"The quick brown fox jumps over the lazy dog.\".sha384(), \"ed892481d8272ca6df370bf706e4d7bc1b5739fa2177aae6c50e946678718fc67a7af2819a021c2fc34e91bdb63409d7\", \"SHA384 calculation failed\")\n  }\n\n  func testSHA3() {\n    XCTAssertEqual(SHA3(variant: .sha224).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"e642824c3f8cf24ad09234ee7d3c766fc9a3a5168d0c94ad73b46fdf\")\n    XCTAssertEqual(SHA3(variant: .sha256).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"3a985da74fe225b2045c172d6bd390bd855f086e3e9d525b46bfe24511431532\")\n    XCTAssertEqual(SHA3(variant: .sha384).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"ec01498288516fc926459f58e2c6ad8df9b473cb0fc08c2596da7cf0e49be4b298d88cea927ac7f539f1edf228376d25\")\n    XCTAssertEqual(SHA3(variant: .sha512).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"b751850b1a57168a5693cd924b6b096e08f621827444f70d884f5d0240d2712e10e116e9192af3c91a7ec57647e3934057340b4cf408d5a56592f8274eec53f0\")\n    XCTAssertEqual(SHA3(variant: .keccak224).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"c30411768506ebe1c2871b1ee2e87d38df342317300a9b97a95ec6a8\")\n    XCTAssertEqual(SHA3(variant: .keccak256).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"4e03657aea45a94fc7d47ba826c8d667c0d1e6e33a64a036ec44f58fa12d6c45\")\n    XCTAssertEqual(SHA3(variant: .keccak384).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"f7df1165f033337be098e7d288ad6a2f74409d7a60b49c36642218de161b1f99f8c681e4afaf31a34db29fb763e3c28e\")\n    XCTAssertEqual(SHA3(variant: .keccak512).calculate(for: Array<UInt8>(hex: \"616263\")).toHexString(), \"18587dc2ea106b9a1563e32b3312421ca164c7f1f07bc922a9c83d77cea3a1e5d0c69910739025372dc14ac9642629379540c17e2a65b19d77aa511a9d00bb96\")\n\n    XCTAssertEqual(SHA3(variant: .sha224).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"6b4e03423667dbb73b6e15454f0eb1abd4597f9a1b078e3f5b5a6bc7\")\n    XCTAssertEqual(SHA3(variant: .sha256).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"a7ffc6f8bf1ed76651c14756a061d662f580ff4de43b49fa82d80a4b80f8434a\")\n    XCTAssertEqual(SHA3(variant: .sha384).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"0c63a75b845e4f7d01107d852e4c2485c51a50aaaa94fc61995e71bbee983a2ac3713831264adb47fb6bd1e058d5f004\")\n    XCTAssertEqual(SHA3(variant: .sha512).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"a69f73cca23a9ac5c8b567dc185a756e97c982164fe25859e0d1dcc1475c80a615b2123af1f5f94c11e3e9402c3ac558f500199d95b6d3e301758586281dcd26\")\n    XCTAssertEqual(SHA3(variant: .keccak224).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"f71837502ba8e10837bdd8d365adb85591895602fc552b48b7390abd\")\n    XCTAssertEqual(SHA3(variant: .keccak256).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"c5d2460186f7233c927e7db2dcc703c0e500b653ca82273b7bfad8045d85a470\")\n    XCTAssertEqual(SHA3(variant: .keccak384).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"2c23146a63a29acf99e73b88f8c24eaa7dc60aa771780ccc006afbfa8fe2479b2dd2b21362337441ac12b515911957ff\")\n    XCTAssertEqual(SHA3(variant: .keccak512).calculate(for: Array<UInt8>(hex: \"\")).toHexString(), \"0eab42de4c3ceb9235fc91acffe746b29c29a8c366b7c60e4e67c466f36a4304c00fa9caf9d87976ba469bcbe06713b435f091ef2769fb160cdab33d3670680e\")\n\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha3(.sha224), \"8a24108b154ada21c9fd5574494479ba5c7e7ab76ef264ead0fcce33\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha3(.sha256), \"41c0dba2a9d6240849100376a8235e2c82e1b9998a999e21db32dd97496d3376\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha3(.sha384), \"991c665755eb3a4b6bbdfb75c78a492e8c56a22c5c4d7e429bfdbc32b9d4ad5aa04a1f076e62fea19eef51acd0657c22\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha3(.sha512), \"04a371e84ecfb5b8b77cb48610fca8182dd457ce6f326a0fd3d7ec2f1e91636dee691fbe0c985302ba1b0d8dc78c086346b533b49c030d99a27daf1139d6e75e\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha3(.keccak224), \"e51faa2b4655150b931ee8d700dc202f763ca5f962c529eae55012b6\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha3(.keccak256), \"45d3b367a6904e6e8d502ee04999a7c27647f91fa845d456525fd352ae3d7371\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha3(.keccak384), \"b41e8896428f1bcbb51e17abd6acc98052a3502e0d5bf7fa1af949b4d3c855e7c4dc2c390326b3f3e74c7b1e2b9a3657\")\n    XCTAssertEqual(\"abcdbcdecdefdefgefghfghighijhijkijkljklmklmnlmnomnopnopq\".sha3(.keccak512), \"6aa6d3669597df6d5a007b00d09c20795b5c4218234e1698a944757a488ecdc09965435d97ca32c3cfed7201ff30e070cd947f1fc12b9d9214c467d342bcba5d\")\n\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha3(.sha224), \"543e6868e1666c1a643630df77367ae5a62a85070a51c14cbf665cbc\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha3(.sha256), \"916f6061fe879741ca6469b43971dfdb28b1a32dc36cb3254e812be27aad1d18\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha3(.sha384), \"79407d3b5916b59c3e30b09822974791c313fb9ecc849e406f23592d04f625dc8c709b98b43b3852b337216179aa7fc7\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha3(.sha512), \"afebb2ef542e6579c50cad06d2e578f9f8dd6881d7dc824d26360feebf18a4fa73e3261122948efcfd492e74e82e2189ed0fb440d187f382270cb455f21dd185\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha3(.keccak224), \"344298994b1b06873eae2ce739c425c47291a2e24189e01b524f88dc\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha3(.keccak256), \"f519747ed599024f3882238e5ab43960132572b7345fbeb9a90769dafd21ad67\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha3(.keccak384), \"cc063f34685135368b34f7449108f6d10fa727b09d696ec5331771da46a923b6c34dbd1d4f77e595689c1f3800681c28\")\n    XCTAssertEqual(\"abcdefghbcdefghicdefghijdefghijkefghijklfghijklmghijklmnhijklmnoijklmnopjklmnopqklmnopqrlmnopqrsmnopqrstnopqrstu\".sha3(.keccak512), \"ac2fb35251825d3aa48468a9948c0a91b8256f6d97d8fa4160faff2dd9dfcc24f3f1db7a983dad13d53439ccac0b37e24037e7b95f80f59f37a2f683c4ba4682\")\n\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha3(.sha224), Array<UInt8>(hex: \"d69335b93325192e516a912e6d19a15cb51c6ed5c15243e7a7fd653c\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha3(.sha256), Array<UInt8>(hex: \"5c8875ae474a3634ba4fd55ec85bffd661f32aca75c6d699d0cdcb6c115891c1\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha3(.sha384), Array<UInt8>(hex: \"eee9e24d78c1855337983451df97c8ad9eedf256c6334f8e948d252d5e0e76847aa0774ddb90a842190d2c558b4b8340\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha3(.sha512), Array<UInt8>(hex: \"3c3a876da14034ab60627c077bb98f7e120a2a5370212dffb3385a18d4f38859ed311d0a9d5141ce9cc5c66ee689b266a8aa18ace8282a0e0db596c90b0a7b87\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha3(.keccak224), Array<UInt8>(hex: \"19f9167be2a04c43abd0ed554788101b9c339031acc8e1468531303f\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha3(.keccak256), Array<UInt8>(hex: \"fadae6b49f129bbb812be8407b7b2894f34aecf6dbd1f9b0f0c7e9853098fc96\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha3(.keccak384), Array<UInt8>(hex: \"0c8324e1ebc182822c5e2a086cac07c2fe00e3bce61d01ba8ad6b71780e2dec5fb89e5ae90cb593e57bc6258fdd94e17\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x61, count: 1_000_000).sha3(.keccak512), Array<UInt8>(hex: \"5cf53f2e556be5a624425ede23d0e8b2c7814b4ba0e4e09cbbf3c2fac7056f61e048fc341262875ebc58a5183fea651447124370c1ebf4d6c89bc9a7731063bb\"), \"One million (1,000,000) repetitions of the character 'a' (0x61)\")\n\n    // *** Multiple of block size ***\n\n    // keccak block size bytes\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 144).sha3(.keccak224), Array<UInt8>(hex: \"a50976d8ed54c961a052bfd01a64cd79b11928a9d5b75146a0828888\"), \"Block size bytes for keccak224\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 136).sha3(.keccak256), Array<UInt8>(hex: \"3a5912a7c5faa06ee4fe906253e339467a9ce87d533c65be3c15cb231cdb25f9\"), \"Block size bytes for keccak256\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 104).sha3(.keccak384), Array<UInt8>(hex: \"768e10c2eb9903fba6bf290669bf98bd03ce42e7492da9abb88cbbe2212ed153c857e4e883fb1b03a498391935ec6112\"), \"Block size bytes for keccak384\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 72).sha3(.keccak512), Array<UInt8>(hex: \"bcf38e5b375422155b4d8eb150682a14778b0695d709cec479d013a772497bc8d7050ef2a23d69609d609b15e5001f275c4619270ffbd6e8c06a7a5bf72334b3\"), \"Block size bytes for keccak512\")\n\n    // keccak two times block size bytes\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 288).sha3(.keccak224), Array<UInt8>(hex: \"846f930bf21e7ec2175a635379adbdbce9ed9de6a34396c4a11aaf3c\"), \"Two times block size bytes for keccak224\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 272).sha3(.keccak256), Array<UInt8>(hex: \"a8005c7a3125b6c3629b4181eca54d18721e41fef639718d205beb00b366ed7d\"), \"Two times block size bytes for keccak256\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 208).sha3(.keccak384), Array<UInt8>(hex: \"db6451e6fb59ca16c9ba896de2967b07ca331e9558e21257cb6b26f126ed480c841d37788907f77ef71f8258218b0203\"), \"Two times block size bytes for keccak384\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 144).sha3(.keccak512), Array<UInt8>(hex: \"04ddaacd88ce54a4acb468b792d5177ace573e9871dc10b33d02be637b674373601ba5f433b67cc6ba8dc3a1707052f1f6bffc55ef1580aca021ead8bc8e1f22\"), \"Two times block size bytes for keccak512\")\n\n    // nist sha3 block size bytes\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 144).sha3(.sha224), Array<UInt8>(hex: \"f2b8486fceee2c6a11a604ce4efe217da854829c2c2dcc9a23758b4d\"), \"Block size bytes for sha3 sha224\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 136).sha3(.sha256), Array<UInt8>(hex: \"e772c9cf9eb9c991cdfcf125001b454fdbc0a95f188d1b4c844aa032ad6e075e\"), \"Block size bytes for sha3 sha256\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 104).sha3(.sha384), Array<UInt8>(hex: \"aaed6beb61b1f9a9b469d38a27a35edde7f676f4603e67f5424c7588043b869ebbfcfc3ecee2ae6f5ecfaf7f706c49e3\"), \"Block size bytes for sha3 sha384\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 72).sha3(.sha512), Array<UInt8>(hex: \"f8d76fdd8a082a67eaab47b5518ac486cb9a90dcb9f3c9efcfd86d5c8b3f1831601d3c8435f84b9e56da91283d5b98040e6e7b2c8dd9aa5bd4ebdf1823a7cf29\"), \"Block size bytes for sha3 sha512\")\n\n    // nist sha3 two times block size bytes\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 288).sha3(.sha224), Array<UInt8>(hex: \"920370d3fec17c0ecbc2b5b7cd64f551860fb93384e0dc4fcaf2e1ba\"), \"Two times block size bytes for sha3 sha224\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 272).sha3(.sha256), Array<UInt8>(hex: \"5d86a8cc4aa8f0d98146a747281865a625a19f9580eef32e38905920bc532c5c\"), \"Two times block size bytes for sha3 sha256\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 208).sha3(.sha384), Array<UInt8>(hex: \"e741867850b8753bf7fa714b11c1ca9904d0494adaf5e2db43cca42f39637bd67685279d9dfcc45d56e8c288273904af\"), \"Two times block size bytes for sha3 sha384\")\n    XCTAssertEqual(Array<UInt8>(repeating: 0x00, count: 144).sha3(.sha512), Array<UInt8>(hex: \"07625da1770011d59b0a71a8dec551f0ddf1917e4117fc860bd7e0a0e42f3e012284f86d509e2f22a8682aea5930197fc1f3c353d0141665c9ac2643278c3821\"), \"Two times block size bytes for sha3 sha512\")\n    // *** End Multiple of block size ***\n  }\n\n  func testMD5Data() {\n    let data = [0x31, 0x32, 0x33] as Array<UInt8> // \"1\", \"2\", \"3\"\n    XCTAssertEqual(Digest.md5(data), [0x20, 0x2C, 0xB9, 0x62, 0xAC, 0x59, 0x07, 0x5B, 0x96, 0x4B, 0x07, 0x15, 0x2D, 0x23, 0x4B, 0x70], \"MD5 calculation failed\")\n  }\n\n  func testMD5Updates() {\n    do {\n      var hash = MD5()\n      _ = try hash.update(withBytes: [0x31, 0x32])\n      _ = try hash.update(withBytes: [0x33])\n      let result = try hash.finish()\n      XCTAssertEqual(result, [0x20, 0x2C, 0xB9, 0x62, 0xAC, 0x59, 0x07, 0x5B, 0x96, 0x4B, 0x07, 0x15, 0x2D, 0x23, 0x4B, 0x70])\n    } catch {\n      XCTFail()\n    }\n  }\n\n  func testSHA1Updatable1() {\n    do {\n      var hash = SHA1()\n      _ = try hash.update(withBytes: [0x31, 0x32])\n      _ = try hash.update(withBytes: [0x33])\n      XCTAssertEqual(try hash.finish().toHexString(), \"40bd001563085fc35165329ea1ff5c5ecbdbbeef\", \"Failed\")\n    } catch {\n      XCTFail()\n    }\n  }\n\n  func testSHA1Updatable2() {\n    do {\n      var hash = SHA1()\n      _ = try hash.update(withBytes: [0x31, 0x32])\n      _ = try hash.update(withBytes: [0x33])\n      _ = try hash.update(withBytes: Array<UInt8>(repeating: 0x33, count: 64))\n      XCTAssertEqual(try hash.finish().toHexString(), \"0e659367eff83a6b868a35b96ac305b270025e86\", \"Failed\")\n    } catch {\n      XCTFail()\n    }\n  }\n\n  func testCRC32() {\n    let data: Data = Data(bytes: [49, 50, 51] as Array<UInt8>, count: 3)\n    XCTAssertEqual(data.crc32(seed: nil).toHexString(), \"884863d2\", \"CRC32 calculation failed\")\n\n    XCTAssertEqual(\"\".crc32(seed: nil), \"00000000\", \"CRC32 calculation failed\")\n  }\n\n  func testCRC32C() {\n    let data: Data = Data(bytes: [0x32, 0, 0, 0] as Array<UInt8>, count: 4)\n    XCTAssertEqual(data.crc32c(seed: nil).toHexString(), \"c941cdf0\", \"CRC32C calculation failed\")\n    XCTAssertEqual(\"\".crc32c(seed: nil), \"00000000\", \"CRC32 calculation failed\")\n  }\n\n  func testCRC32NotReflected() {\n    let bytes: Array<UInt8> = [0x31, 0x32, 0x33, 0x34, 0x35, 0x36, 0x37, 0x38, 0x39]\n    let data: Data = Data(bytes: bytes, count: bytes.count)\n    XCTAssertEqual(data.crc32(seed: nil, reflect: false).toHexString(), \"fc891918\", \"CRC32 (with reflection) calculation failed\")\n\n    XCTAssertEqual(\"\".crc32(seed: nil, reflect: false), \"00000000\", \"CRC32 (with reflection) calculation failed\")\n  }\n\n  func testCRC16() {\n    let result = Checksum.crc16([49, 50, 51, 52, 53, 54, 55, 56, 57] as Array<UInt8>)\n    XCTAssert(result == 0xBB3D, \"CRC16 failed\")\n  }\n\n  func testChecksum() {\n    let data: Data = Data(bytes: [49, 50, 51] as Array<UInt8>, count: 3)\n    XCTAssert(data.checksum() == 0x96, \"Invalid checksum\")\n  }\n\n  func testChecksumPerformance() {\n    let len = 1_000_000\n    let a = [UInt8](unsafeUninitializedCapacity: len) { buf, count in\n      for i in 0..<len {\n        buf[i] = UInt8.random(in: 0...UInt8.max)\n      }\n      count = len\n    }\n    let data: Data = Data(bytes: a, count: len)\n    self.measure {\n      _ = data.checksum()\n    }\n  }\n\n  func testSHAPartialUpdates() {\n    do {\n      let testSize = 1024 * 1024 * 5\n      let buf = malloc(testSize)!\n      defer { free(buf) }\n      let input = Data(bytes: buf, count: testSize)\n\n      // SHA1\n      let sha1Once = SHA1().calculate(for: input.byteArray)\n\n      var sha1Partial = SHA1()\n      for batch in input.batched(by: 17) {\n        _ = try sha1Partial.update(withBytes: batch.byteArray)\n      }\n      let sha1Result = try sha1Partial.finish()\n      XCTAssertEqual(sha1Once, sha1Result)\n\n      // SHA2\n      let sha2Once = SHA2(variant: .sha224).calculate(for: input.byteArray)\n\n      var sha2Partial = SHA2(variant: .sha224)\n      for batch in input.batched(by: 17) {\n        _ = try sha2Partial.update(withBytes: batch.byteArray)\n      }\n      let sha2Result = try sha2Partial.finish()\n      XCTAssertEqual(sha2Once, sha2Result)\n\n      // SHA3\n      let sha3Once = SHA3(variant: .sha224).calculate(for: input.byteArray)\n\n      var sha3Partial = SHA3(variant: .sha224)\n      for batch in input.batched(by: 17) {\n        _ = try sha3Partial.update(withBytes: batch.byteArray)\n      }\n      let sha3Result = try sha3Partial.finish()\n      XCTAssertEqual(sha3Once, sha3Result)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n}\n\nextension DigestTests {\n  static func allTests() -> [(String, (DigestTests) -> () -> Void)] {\n    let tests = [\n      (\"testMD5\", testMD5),\n      (\"testSHA1\", testSHA1),\n      (\"testSHA2\", testSHA2),\n      (\"testSHA3\", testSHA3),\n      (\"testMD5Data\", testMD5Data),\n      (\"testMD5Updates\", testMD5Updates),\n      (\"testSHA1Updatable1\", testSHA1Updatable1),\n      (\"testSHA1Updatable2\", testSHA1Updatable2),\n      (\"testCRC32\", testCRC32),\n      (\"testCRC32NotReflected\", testCRC32NotReflected),\n      (\"testCRC16\", testCRC16),\n      (\"testChecksum\", testChecksum),\n      (\"testSHAPartialUpdates\", testSHAPartialUpdates)\n    ]\n\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/DigestTestsPerf.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n// http://www.di-mgt.com.au/sha_testvectors.html (http://csrc.nist.gov/groups/ST/toolkit/documents/Examples/SHA_All.pdf)\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class DigestTestsPerf: XCTestCase {\n  func testMD5Performance() {\n    measureMetrics([XCTPerformanceMetric.wallClockTime], automaticallyStartMeasuring: false) {\n      let arr = Array<UInt8>(repeating: 200, count: 1024 * 1024)\n      self.startMeasuring()\n      _ = Digest.md5(arr)\n      self.stopMeasuring()\n    }\n  }\n\n  func testSHA1Performance() {\n    measureMetrics([XCTPerformanceMetric.wallClockTime], automaticallyStartMeasuring: false) {\n      let arr = Array<UInt8>(repeating: 200, count: 1024 * 1024)\n      self.startMeasuring()\n      _ = Digest.sha1(arr)\n      self.stopMeasuring()\n    }\n  }\n\n  // Keep it to compare\n  /*\n   func testSHA1PerformanceCC() {\n       measureMetrics([XCTPerformanceMetric.wallClockTime], automaticallyStartMeasuring: false) {\n           let arr = Array<UInt8>(repeating: 200, count: 1024 * 1024)\n           self.startMeasuring()\n           var digest = Array<UInt8>(repeating: 0, count: Int(CC_SHA1_DIGEST_LENGTH))\n           CC_SHA1(arr, CC_LONG(arr.count), &digest)\n           self.stopMeasuring()\n       }\n   }\n   */\n}\n\nextension DigestTestsPerf {\n  static func allTests() -> [(String, (DigestTestsPerf) -> () -> Void)] {\n    [\n      (\"testMD5Performance\", testMD5Performance),\n      (\"testSHA1Performance\", testSHA1Performance)\n    ]\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/Error+Extension.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\n\n#if !_runtime(_ObjC)\n\n  extension Error {\n    var localizedDescription: String {\n      \"\\(self)\"\n    }\n  }\n#endif\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/ExtensionsTest.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class ExtensionsTest: XCTestCase {\n  func testBytes() {\n    let size = MemoryLayout<UInt32>.size // 32 or 64  bit\n\n    let i: UInt32 = 1024\n    var bytes = i.bytes()\n    XCTAssertTrue(bytes.count == size, \"Invalid bytes length =  \\(bytes.count)\")\n\n    // test padding\n    bytes = i.bytes(totalBytes: 16)\n    XCTAssertTrue(bytes.count == 16, \"Invalid return type \\(bytes.count)\")\n    XCTAssertTrue(bytes[14] == 4, \"Invalid return type \\(bytes.count)\")\n  }\n\n  func testToUInt32Array() {\n    let chunk: ArraySlice<UInt8> = [0x8, 0x7, 0x6, 0x5, 0x4, 0x3, 0x2, 0x1]\n    let result = chunk.toUInt32Array()\n\n    XCTAssert(result.count == 2, \"Invalid conversion\")\n    XCTAssertEqual(result[0], 0x5060708)\n    XCTAssertEqual(result[1], 0x1020304)\n  }\n\n  func testToUInt32Performance() {\n    let len = 1_000_000\n    let a = [UInt8](unsafeUninitializedCapacity: len) { buf, count in\n      for i in 0..<len {\n      buf[i] = UInt8.random(in: 0...UInt8.max)\n      }\n      count = len\n    }\n    self.measure {\n      _ = a.toUInt32Array()\n    }\n  }\n\n  func testToUInt64Performance() {\n    let len = 1_000_000\n    let a = [UInt8](unsafeUninitializedCapacity: len) { buf, count in\n      for i in 0..<len {\n        buf[i] = UInt8.random(in: 0...UInt8.max)\n      }\n      count = len\n    }\n    self.measure {\n      _ = a.toUInt64Array()\n    }\n  }\n\n  func testDataInit() {\n    let data = Data( [0x01, 0x02, 0x03])\n    XCTAssert(data.count == 3, \"Invalid data\")\n  }\n\n  func testStringEncrypt() {\n    do {\n      let encryptedHex = try \"my secret string\".encrypt(cipher: AES(key: \"secret0key000000\", iv: \"0123456789012345\"))\n      XCTAssertEqual(encryptedHex, \"68f7ff8bdb61f625febdfe3d791ecf624daaed2e719a6de39112de8e0cc7349b\")\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testEmptyStringEncrypt() {\n    do {\n      let cipher = try AES(key: \"secret0key000000\".bytes.md5(), blockMode: ECB())\n      let encrypted = try \"\".encryptToBase64(cipher: cipher)\n      let decrypted = try encrypted.decryptBase64ToString(cipher: cipher)\n      XCTAssertEqual(\"\", decrypted)\n\n      XCTAssertThrowsError(try \"\".decryptBase64(cipher: cipher))\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testStringDecryptBase64() {\n    let encryptedBase64 = \"aPf/i9th9iX+vf49eR7PYk2q7S5xmm3jkRLejgzHNJs=\"\n    let decrypted = try! encryptedBase64.decryptBase64ToString(cipher: AES(key: \"secret0key000000\", iv: \"0123456789012345\"))\n    XCTAssertEqual(decrypted, \"my secret string\")\n  }\n\n  func testArrayInitHex() {\n    let bytes = Array<UInt8>(hex: \"0xb1b1b2b2\")\n    XCTAssertEqual(bytes, [177, 177, 178, 178])\n\n    let str = \"b1b2b3b3b3b3b3b3b1b2b3b3b3b3b3b3\"\n    let array = Array<UInt8>(hex: str)\n    let hex = array.toHexString()\n    XCTAssertEqual(str, hex)\n  }\n\n  func testToHexStringPerformance() {\n    let len = 100000\n    let a = [UInt8](unsafeUninitializedCapacity: len) { buf, count in\n        for i in 0..<len {\n            buf[i] = UInt8.random(in: 0...UInt8.max)\n        }\n        count = len\n    }\n    self.measure {\n        _ = a.toHexString()\n    }\n  }\n}\n\nextension ExtensionsTest {\n  static func allTests() -> [(String, (ExtensionsTest) -> () -> Void)] {\n    let tests = [\n      (\"testBytes\", testBytes),\n      (\"testToUInt32Array\", testToUInt32Array),\n      (\"testDataInit\", testDataInit),\n      (\"testStringEncrypt\", testStringEncrypt),\n      (\"testStringDecryptBase64\", testStringDecryptBase64),\n      (\"testEmptyStringEncrypt\", testEmptyStringEncrypt),\n      (\"testArrayInitHex\", testArrayInitHex)\n    ]\n\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/ExtensionsTestPerf.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class ExtensionsTestPerf: XCTestCase {\n  func testArrayInitHexPerformance() {\n    var str = \"b1b2b3b3b3b3b3b3b1b2b3b3b3b3b3b3\"\n    for _ in 0...12 {\n      str += str\n    }\n    measure {\n      _ = Array<UInt8>(hex: str)\n    }\n  }\n}\n\nextension ExtensionsTestPerf {\n  static func allTests() -> [(String, (ExtensionsTestPerf) -> () -> Void)] {\n    let tests = [\n      (\"testArrayInitHexPerformance\", testArrayInitHexPerformance)\n    ]\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/HKDFTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass HKDFTests: XCTestCase {\n  /// All test cases are implemented with regard to RFC 5869\n  /// https://www.ietf.org/rfc/rfc5869.txt\n\n  func testHKDF1() {\n    let password = Array<UInt8>(hex: \"0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b\")\n    let salt = Array<UInt8>(hex: \"0x000102030405060708090a0b0c\")\n    let info = Array<UInt8>(hex: \"0xf0f1f2f3f4f5f6f7f8f9\")\n    let keyLength = 42\n    let variant = HMAC.Variant.sha2(.sha256)\n    let reference = Array<UInt8>(hex: \"0x3cb25f25faacd57a90434f64d0362f2a2d2d0a90cf1a5a4c5db02d56ecc4c5bf34007208d5b887185865\")\n\n    XCTAssertEqual(reference, try HKDF(password: password, salt: salt, info: info, keyLength: keyLength, variant: variant).calculate())\n  }\n\n  func testHKDF2() {\n    let password = Array<UInt8>(hex: \"0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f\")\n    let salt = Array<UInt8>(hex: \"0x606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf\")\n    let info = Array<UInt8>(hex: \"0xb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff\")\n    let keyLength = 82\n    let variant = HMAC.Variant.sha2(.sha256)\n    let reference = Array<UInt8>(hex: \"0xb11e398dc80327a1c8e7f78c596a49344f012eda2d4efad8a050cc4c19afa97c59045a99cac7827271cb41c65e590e09da3275600c2f09b8367793a9aca3db71cc30c58179ec3e87c14c01d5c1f3434f1d87\")\n\n    XCTAssertEqual(reference, try HKDF(password: password, salt: salt, info: info, keyLength: keyLength, variant: variant).calculate())\n  }\n\n  func testHKDF3() {\n    let password = Array<UInt8>(hex: \"0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b\")\n    let keyLength = 42\n    let variant = HMAC.Variant.sha2(.sha256)\n    let reference = Array<UInt8>(hex: \"0x8da4e775a563c18f715f802a063c5a31b8a11f5c5ee1879ec3454e5f3c738d2d9d201395faa4b61a96c8\")\n\n    XCTAssertEqual(reference, try HKDF(password: password, keyLength: keyLength, variant: variant).calculate())\n  }\n\n  func testHKDF4() {\n    let password = Array<UInt8>(hex: \"0x0b0b0b0b0b0b0b0b0b0b0b\")\n    let salt = Array<UInt8>(hex: \"0x000102030405060708090a0b0c\")\n    let info = Array<UInt8>(hex: \"0xf0f1f2f3f4f5f6f7f8f9\")\n    let keyLength = 42\n    let variant = HMAC.Variant.sha1\n    let reference = Array<UInt8>(hex: \"0x085a01ea1b10f36933068b56efa5ad81a4f14b822f5b091568a9cdd4f155fda2c22e422478d305f3f896\")\n\n    XCTAssertEqual(reference, try HKDF(password: password, salt: salt, info: info, keyLength: keyLength, variant: variant).calculate())\n  }\n\n  func testHKDF5() {\n    let password = Array<UInt8>(hex: \"0x000102030405060708090a0b0c0d0e0f101112131415161718191a1b1c1d1e1f202122232425262728292a2b2c2d2e2f303132333435363738393a3b3c3d3e3f404142434445464748494a4b4c4d4e4f\")\n    let salt = Array<UInt8>(hex: \"0x606162636465666768696a6b6c6d6e6f707172737475767778797a7b7c7d7e7f808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9fa0a1a2a3a4a5a6a7a8a9aaabacadaeaf\")\n    let info = Array<UInt8>(hex: \"0xb0b1b2b3b4b5b6b7b8b9babbbcbdbebfc0c1c2c3c4c5c6c7c8c9cacbcccdcecfd0d1d2d3d4d5d6d7d8d9dadbdcdddedfe0e1e2e3e4e5e6e7e8e9eaebecedeeeff0f1f2f3f4f5f6f7f8f9fafbfcfdfeff\")\n    let keyLength = 82\n    let variant = HMAC.Variant.sha1\n    let reference = Array<UInt8>(hex: \"0x0bd770a74d1160f7c9f12cd5912a06ebff6adcae899d92191fe4305673ba2ffe8fa3f1a4e5ad79f3f334b3b202b2173c486ea37ce3d397ed034c7f9dfeb15c5e927336d0441f4c4300e2cff0d0900b52d3b4\")\n\n    XCTAssertEqual(reference, try HKDF(password: password, salt: salt, info: info, keyLength: keyLength, variant: variant).calculate())\n  }\n\n  func testHKDF6() {\n    let password = Array<UInt8>(hex: \"0x0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b0b\")\n    let keyLength = 42\n    let variant = HMAC.Variant.sha1\n    let reference = Array<UInt8>(hex: \"0x0ac1af7002b3d761d1e55298da9d0506b9ae52057220a306e07b6b87e8df21d0ea00033de03984d34918\")\n\n    XCTAssertEqual(reference, try HKDF(password: password, keyLength: keyLength, variant: variant).calculate())\n  }\n\n  static func allTests() -> [(String, (HKDFTests) -> () -> Void)] {\n    let tests = [\n      (\"Basic test case with SHA-256\", testHKDF1),\n      (\"Test with SHA-256 and longer inputs/outputs\", testHKDF2),\n      (\"Test with SHA-256 and zero-length salt/info\", testHKDF3),\n      (\"Basic test case with SHA-1\", testHKDF4),\n      (\"Test with SHA-1 and longer inputs/outputs\", testHKDF5),\n      (\"Test with SHA-1 and zero-length salt/info\", testHKDF6)\n    ]\n\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/HMACTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nfinal class HMACTests: XCTestCase {\n  func testMD5() {\n    let key: Array<UInt8> = []\n    let msg: Array<UInt8> = []\n    let expectedMac: Array<UInt8> = [0x74, 0xe6, 0xf7, 0x29, 0x8a, 0x9c, 0x2d, 0x16, 0x89, 0x35, 0xf5, 0x8c, 0x00, 0x1b, 0xad, 0x88]\n\n    let hmac = try! HMAC(key: key, variant: .md5).authenticate(msg)\n    XCTAssertEqual(hmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testSHA1() {\n    XCTAssertEqual(try HMAC(key: [], variant: .sha1).authenticate([]), Array<UInt8>(hex: \"fbdb1d1b18aa6c08324b7d64b71fb76370690e1d\"))\n    // echo -n \"test\" | openssl sha1 -hmac 'test'\n    XCTAssertEqual(try HMAC(key: Array<UInt8>(hex: \"74657374\"), variant: .sha1).authenticate(Array<UInt8>(hex: \"74657374\")), Array<UInt8>(hex: \"0c94515c15e5095b8a87a50ba0df3bf38ed05fe6\"))\n    // echo -n \"test\" | openssl sha1 -hmac '0123456789012345678901234567890123456789012345678901234567890123'\n    XCTAssertEqual(try HMAC(key: Array<UInt8>(hex: \"30313233343536373839303132333435363738393031323334353637383930313233343536373839303132333435363738393031323334353637383930313233\"), variant: .sha1).authenticate(Array<UInt8>(hex: \"74657374\")), Array<UInt8>(hex: \"23cea58b0c484ed005434938ee70a938d7524e91\"))\n  }\n\n  func testSHA256() {\n    let key: Array<UInt8> = []\n    let msg: Array<UInt8> = []\n    let expectedMac: Array<UInt8> = [0xb6, 0x13, 0x67, 0x9a, 0x08, 0x14, 0xd9, 0xec, 0x77, 0x2f, 0x95, 0xd7, 0x78, 0xc3, 0x5f, 0xc5, 0xff, 0x16, 0x97, 0xc4, 0x93, 0x71, 0x56, 0x53, 0xc6, 0xc7, 0x12, 0x14, 0x42, 0x92, 0xc5, 0xad]\n\n    let hmac = try! HMAC(key: key, variant: .sha2(.sha256)).authenticate(msg)\n    XCTAssertEqual(hmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testSHA384() {\n    let key: Array<UInt8> = []\n    let msg: Array<UInt8> = []\n    let expectedMac: Array<UInt8> = [0x6c, 0x1f, 0x2e, 0xe9, 0x38, 0xfa, 0xd2, 0xe2, 0x4b, 0xd9, 0x12, 0x98, 0x47, 0x43, 0x82, 0xca, 0x21, 0x8c, 0x75, 0xdb, 0x3d, 0x83, 0xe1, 0x14, 0xb3, 0xd4, 0x36, 0x77, 0x76, 0xd1, 0x4d, 0x35, 0x51, 0x28, 0x9e, 0x75, 0xe8, 0x20, 0x9c, 0xd4, 0xb7, 0x92, 0x30, 0x28, 0x40, 0x23, 0x4a, 0xdc]\n\n    let hmac = try! HMAC(key: key, variant: .sha2(.sha384)).authenticate(msg)\n    XCTAssertEqual(hmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  func testSHA512() {\n    let key: Array<UInt8> = []\n    let msg: Array<UInt8> = []\n    let expectedMac: Array<UInt8> = [0xb9, 0x36, 0xce, 0xe8, 0x6c, 0x9f, 0x87, 0xaa, 0x5d, 0x3c, 0x6f, 0x2e, 0x84, 0xcb, 0x5a, 0x42, 0x39, 0xa5, 0xfe, 0x50, 0x48, 0x0a, 0x6e, 0xc6, 0x6b, 0x70, 0xab, 0x5b, 0x1f, 0x4a, 0xc6, 0x73, 0x0c, 0x6c, 0x51, 0x54, 0x21, 0xb3, 0x27, 0xec, 0x1d, 0x69, 0x40, 0x2e, 0x53, 0xdf, 0xb4, 0x9a, 0xd7, 0x38, 0x1e, 0xb0, 0x67, 0xb3, 0x38, 0xfd, 0x7b, 0x0c, 0xb2, 0x22, 0x47, 0x22, 0x5d, 0x47]\n\n    let hmac = try! HMAC(key: key, variant: .sha2(.sha512)).authenticate(msg)\n    XCTAssertEqual(hmac, expectedMac, \"Invalid authentication result\")\n  }\n\n  static let allTests = [\n    (\"testMD5\", testMD5),\n    (\"testSHA1\", testSHA1),\n    (\"testSHA256\", testSHA256),\n    (\"testSHA384\", testSHA384),\n    (\"testSHA512\", testSHA512)\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/PBKDF.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass PBKDF: XCTestCase {\n  func testPBKDF1() {\n    let password: Array<UInt8> = [0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64]\n    let salt: Array<UInt8> = [0x78, 0x57, 0x8e, 0x5a, 0x5d, 0x63, 0xcb, 0x06]\n    let value = try! PKCS5.PBKDF1(password: password, salt: salt, iterations: 1000, keyLength: 16).calculate()\n    XCTAssertEqual(value.toHexString(), \"dc19847e05c64d2faf10ebfb4a3d2a20\")\n  }\n\n  func testPBKDF2() {\n    // P = \"password\", S = \"salt\", c = 1, dkLen = 20\n    XCTAssertEqual([0x0c, 0x60, 0xc8, 0x0f, 0x96, 0x1f, 0x0e, 0x71, 0xf3, 0xa9, 0xb5, 0x24, 0xaf, 0x60, 0x12, 0x06, 0x2f, 0xe0, 0x37, 0xa6],\n                   try PKCS5.PBKDF2(password: [0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64], salt: [0x73, 0x61, 0x6c, 0x74], iterations: 1, keyLength: 20, variant: .sha1).calculate())\n\n    // P = \"password\", S = \"salt\", c = 2, dkLen = 20\n    XCTAssertEqual([0xea, 0x6c, 0x01, 0x4d, 0xc7, 0x2d, 0x6f, 0x8c, 0xcd, 0x1e, 0xd9, 0x2a, 0xce, 0x1d, 0x41, 0xf0, 0xd8, 0xde, 0x89, 0x57],\n                   try PKCS5.PBKDF2(password: [0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64], salt: [0x73, 0x61, 0x6c, 0x74], iterations: 2, keyLength: 20, variant: .sha1).calculate())\n\n    // P = \"password\", S = \"salt\", c = 4096, dkLen = 20\n    XCTAssertEqual([0x4b, 0x00, 0x79, 0x01, 0xb7, 0x65, 0x48, 0x9a, 0xbe, 0xad, 0x49, 0xd9, 0x26, 0xf7, 0x21, 0xd0, 0x65, 0xa4, 0x29, 0xc1],\n                   try PKCS5.PBKDF2(password: [0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64], salt: [0x73, 0x61, 0x6c, 0x74], iterations: 4096, keyLength: 20, variant: .sha1).calculate())\n\n    // P = \"password\", S = \"salt\", c = 16777216, dkLen = 20\n    // Commented because it takes a lot of time with Debug build to finish.\n    // XCTAssertEqual([0xee, 0xfe, 0x3d, 0x61, 0xcd, 0x4d, 0xa4, 0xe4, 0xe9, 0x94, 0x5b, 0x3d, 0x6b, 0xa2, 0x15, 0x8c, 0x26, 0x34, 0xe9, 0x84],\n    //               try PKCS5.PBKDF2(password: [0x70, 0x61, 0x73, 0x73, 0x77, 0x6F, 0x72, 0x64], salt: [0x73, 0x61, 0x6C, 0x74], iterations: 16777216, keyLength: 20, variant: .sha1).calculate())\n\n    // P = \"passwordPASSWORDpassword\", S = \"saltSALTsaltSALTsaltSALTsaltSALTsalt\", c = 4096, dkLen = 25\n    XCTAssertEqual([0x3d, 0x2e, 0xec, 0x4f, 0xe4, 0x1c, 0x84, 0x9b, 0x80, 0xc8, 0xd8, 0x36, 0x62, 0xc0, 0xe4, 0x4a, 0x8b, 0x29, 0x1a, 0x96, 0x4c, 0xf2, 0xf0, 0x70, 0x38],\n                   try PKCS5.PBKDF2(password: [0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64, 0x50, 0x41, 0x53, 0x53, 0x57, 0x4f, 0x52, 0x44, 0x70, 0x61, 0x73, 0x73, 0x77, 0x6f, 0x72, 0x64], salt: [0x73, 0x61, 0x6c, 0x74, 0x53, 0x41, 0x4c, 0x54, 0x73, 0x61, 0x6c, 0x74, 0x53, 0x41, 0x4c, 0x54, 0x73, 0x61, 0x6c, 0x74, 0x53, 0x41, 0x4c, 0x54, 0x73, 0x61, 0x6c, 0x74, 0x53, 0x41, 0x4c, 0x54, 0x73, 0x61, 0x6c, 0x74], iterations: 4096, keyLength: 25, variant: .sha1).calculate())\n\n    // P = \"pass\\0word\", S = \"sa\\0lt\", c = 4096, dkLen = 16\n    XCTAssertEqual([0x56, 0xfa, 0x6a, 0xa7, 0x55, 0x48, 0x09, 0x9d, 0xcc, 0x37, 0xd7, 0xf0, 0x34, 0x25, 0xe0, 0xc3],\n                   try PKCS5.PBKDF2(password: [0x70, 0x61, 0x73, 0x73, 0x00, 0x77, 0x6f, 0x72, 0x64], salt: [0x73, 0x61, 0x00, 0x6c, 0x74], iterations: 4096, keyLength: 16, variant: .sha1).calculate())\n\n    // P = \"\", S = \"salt\", c = 1, dkLen = 20\n    XCTAssertEqual([0xa3, 0x3d, 0xdd, 0xc3, 0x04, 0x78, 0x18, 0x55, 0x15, 0x31, 0x1f, 0x87, 0x52, 0x89, 0x5d, 0x36, 0xea, 0x43, 0x63, 0xa2],\n                   try PKCS5.PBKDF2(password: [], salt: [0x73, 0x61, 0x6c, 0x74], iterations: 1, keyLength: 20, variant: .sha1).calculate())\n  }\n\n  func testPBKDF2Length() {\n    let password: Array<UInt8> = \"s33krit\".bytes\n    let salt: Array<UInt8> = \"nacl\".bytes\n    let value = try! PKCS5.PBKDF2(password: password, salt: salt, iterations: 2, keyLength: 8, variant: .sha1).calculate()\n    XCTAssertEqual(value.toHexString(), \"a53cf3df485e5cd9\")\n  }\n\n  static func allTests() -> [(String, (PBKDF) -> () -> Void)] {\n    let tests = [\n      (\"testPBKDF1\", testPBKDF1),\n      (\"testPBKDF2\", testPBKDF2),\n      (\"testPBKDF2Length\", testPBKDF2Length)\n    ]\n\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/PBKDFPerf.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass PBKDFPerf: XCTestCase {\n  func testPerformance() {\n    let password: Array<UInt8> = \"s33krit\".bytes\n    let salt: Array<UInt8> = \"nacl\".bytes\n    measure {\n      _ = try! PKCS5.PBKDF2(password: password, salt: salt, iterations: 65536, keyLength: 32, variant: .sha1).calculate()\n    }\n  }\n\n  static func allTests() -> [(String, (PBKDFPerf) -> () -> Void)] {\n    let tests = [(\"testPerformance\", testPerformance)]\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/PaddingTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nfinal class PaddingTests: XCTestCase {\n  func testPKCS7_0() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6]\n    let expected: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16, 16]\n    let padded = PKCS7.Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded, expected, \"PKCS7 failed\")\n    let clean = PKCS7.Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"PKCS7 failed\")\n  }\n\n  func testPKCS7_1() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5]\n    let expected: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 1]\n    let padded = PKCS7.Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded, expected, \"PKCS7 failed\")\n    let clean = PKCS7.Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"PKCS7 failed\")\n  }\n\n  func testPKCS7_2() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4]\n    let expected: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 2, 2]\n    let padded = PKCS7.Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded, expected, \"PKCS7 failed\")\n    let clean = PKCS7.Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"PKCS7 failed\")\n  }\n\n  func testZeroPadding1() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9]\n    let expected: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 0, 0, 0, 0, 0, 0]\n    let padding = ZeroPadding()\n    XCTAssertEqual(padding.add(to: input, blockSize: 16), expected, \"ZeroPadding failed\")\n    XCTAssertEqual(padding.remove(from: padding.add(to: input, blockSize: 16), blockSize: 16), input, \"ZeroPadding failed\")\n  }\n\n  func testZeroPadding2() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6]\n    let expected: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]\n    let padding = ZeroPadding()\n    XCTAssertEqual(padding.add(to: input, blockSize: 16), expected, \"ZeroPadding failed\")\n    XCTAssertEqual(padding.remove(from: padding.add(to: input, blockSize: 16), blockSize: 16), input, \"ZeroPadding failed\")\n  }\n\n  func testISO78164_0() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 0x80]\n    let expected: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 0x80, 0x80]\n    let padded = ISO78164Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded, expected, \"ISO78164 failed\")\n    let clean = ISO78164Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"ISO78164 failed\")\n  }\n\n  func testISO78164_1() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 0]\n    let expected: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 0, 0x80] + [UInt8](repeating: UInt8(0), count: 15)\n    let padded = ISO78164Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded, expected, \"ISO78164 failed\")\n    let clean = ISO78164Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"ISO78164 failed\")\n  }\n\n  func testISO78164_2() {\n    let input: Array<UInt8> = []\n    let expected: Array<UInt8> = [0x80] + [UInt8](repeating: UInt8(0), count: 15)\n    let padded = ISO78164Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded, expected, \"ISO78164 failed\")\n    let clean = ISO78164Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"ISO78164 failed\")\n  }\n\n  func testISO10126_0() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3]\n    let padded = ISO10126Padding().add(to: input, blockSize: 16)\n    XCTAssertTrue(padded.starts(with: input), \"ISO10126 failed\")\n    XCTAssertEqual(padded.last, 3, \"ISO10126 failed\")\n    XCTAssertEqual(padded.count, 16)\n    let clean = ISO10126Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"ISO10126 failed\")\n  }\n\n  func testISO10126_1() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6]\n    let padded = ISO10126Padding().add(to: input, blockSize: 16)\n    XCTAssertTrue(padded.starts(with: input), \"ISO10126 failed\")\n    XCTAssertEqual(padded.last, 16, \"ISO10126 failed\")\n    XCTAssertEqual(padded.count, 32)\n    let clean = ISO10126Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"ISO10126 failed\")\n  }\n\n  func testISO10126_2() {\n    let input: Array<UInt8> = []\n    let padded = ISO10126Padding().add(to: input, blockSize: 16)\n    XCTAssertTrue(padded.starts(with: input), \"ISO10126 failed\")\n    XCTAssertEqual(padded.last, 16, \"ISO10126 failed\")\n    XCTAssertEqual(padded.count, 16)\n    let clean = ISO10126Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"ISO10126 failed\")\n  }\n\n  func testEMSAPKCS1v15_1() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6]\n    let padded = EMSAPKCS1v15Padding().add(to: input, blockSize: 32)\n    XCTAssertEqual(padded.prefix(2), [0, 1], \"EMSAPKCS1v15 failed\")\n    XCTAssertTrue(padded.suffix(16) == input, \"EMSAPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 32)\n    let clean = EMSAPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMSAPKCS1v15 failed\")\n  }\n\n  func testEMSAPKCS1v15_2() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6]\n    let padded = EMSAPKCS1v15Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded.prefix(2), [0, 1], \"EMSAPKCS1v15 failed\")\n    XCTAssertTrue(padded.suffix(16) == input, \"EMSAPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 32)\n    let clean = EMSAPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMSAPKCS1v15 failed\")\n  }\n\n  func testEMSAPKCS1v15_3() {\n    let input: Array<UInt8> = []\n    let padded = EMSAPKCS1v15Padding().add(to: input, blockSize: 16)\n    XCTAssertTrue(padded.starts(with: input), \"EMSAPKCS1v15 failed\")\n    XCTAssertEqual(padded.last, 0, \"EMSAPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 16)\n    let clean = EMSAPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMSAPKCS1v15 failed\")\n  }\n\n  func testEMSAPKCS1v15_4() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3]\n    let padded = EMSAPKCS1v15Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded.prefix(2), [0, 1], \"EMSAPKCS1v15 failed\")\n    XCTAssertTrue(padded.suffix(13) == input, \"EMSAPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 32)\n    let clean = EMSAPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMSAPKCS1v15 failed\")\n  }\n\n  func testEMSAPKCS1v15_5() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2]\n    let padded = EMSAPKCS1v15Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded.prefix(2), [0, 1], \"EMSAPKCS1v15 failed\")\n    XCTAssertTrue(padded.suffix(12) == input, \"EMSAPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 16)\n    let clean = EMSAPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMSAPKCS1v15 failed\")\n  }\n\n  func testEMEPKCS1v15_1() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6]\n    let padded = EMEPKCS1v15Padding().add(to: input, blockSize: 32)\n    XCTAssertEqual(padded.prefix(2), [0, 2], \"EMEPKCS1v15 failed\")\n    XCTAssertTrue(padded.suffix(16) == input, \"EMEPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 32)\n    let clean = EMEPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMEPKCS1v15 failed\")\n  }\n\n  func testEMEPKCS1v15_2() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3, 4, 5, 6]\n    let padded = EMEPKCS1v15Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded.prefix(2), [0, 2], \"EMEPKCS1v15 failed\")\n    XCTAssertTrue(padded.suffix(16) == input, \"EMEPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 32)\n    let clean = EMEPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMEPKCS1v15 failed\")\n  }\n\n  func testEMEPKCS1v15_3() {\n    let input: Array<UInt8> = []\n    let padded = EMEPKCS1v15Padding().add(to: input, blockSize: 16)\n    XCTAssertTrue(padded.starts(with: input), \"EMEPKCS1v15 failed\")\n    XCTAssertEqual(padded.last, 0, \"EMEPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 16)\n    let clean = EMEPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMEPKCS1v15 failed\")\n  }\n\n  func testEMEPKCS1v15_4() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2, 3]\n    let padded = EMEPKCS1v15Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded.prefix(2), [0, 2], \"EMEPKCS1v15 failed\")\n    XCTAssertTrue(padded.suffix(13) == input, \"EMEPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 32)\n    let clean = EMEPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMEPKCS1v15 failed\")\n  }\n\n  func testEMEPKCS1v15_5() {\n    let input: Array<UInt8> = [1, 2, 3, 4, 5, 6, 7, 8, 9, 0, 1, 2]\n    let padded = EMEPKCS1v15Padding().add(to: input, blockSize: 16)\n    XCTAssertEqual(padded.prefix(2), [0, 2], \"EMEPKCS1v15 failed\")\n    XCTAssertTrue(padded.suffix(12) == input, \"EMEPKCS1v15 failed\")\n    XCTAssertEqual(padded.count, 16)\n    let clean = EMEPKCS1v15Padding().remove(from: padded, blockSize: nil)\n    XCTAssertEqual(clean, input, \"EMEPKCS1v15 failed\")\n  }\n\n  static let allTests = [\n    (\"testPKCS7_0\", testPKCS7_0),\n    (\"testPKCS7_1\", testPKCS7_1),\n    (\"testPKCS7_2\", testPKCS7_2),\n    (\"testZeroPadding1\", testZeroPadding1),\n    (\"testZeroPadding2\", testZeroPadding2),\n    (\"testISO78164_0\", testISO78164_0),\n    (\"testISO78164_1\", testISO78164_1),\n    (\"testISO78164_2\", testISO78164_2),\n    (\"testISO10126_0\", testISO10126_0),\n    (\"testISO10126_1\", testISO10126_1),\n    (\"testISO10126_2\", testISO10126_2),\n    (\"testEMSAPKCS1v15_1\", testEMSAPKCS1v15_1),\n    (\"testEMSAPKCS1v15_2\", testEMSAPKCS1v15_2),\n    (\"testEMSAPKCS1v15_3\", testEMSAPKCS1v15_3),\n    (\"testEMSAPKCS1v15_4\", testEMSAPKCS1v15_4),\n    (\"testEMSAPKCS1v15_5\", testEMSAPKCS1v15_5),\n    (\"testEMEPKCS1v15_1\", testEMEPKCS1v15_1),\n    (\"testEMEPKCS1v15_2\", testEMEPKCS1v15_2),\n    (\"testEMEPKCS1v15_3\", testEMEPKCS1v15_3),\n    (\"testEMEPKCS1v15_4\", testEMEPKCS1v15_4),\n    (\"testEMEPKCS1v15_5\", testEMEPKCS1v15_5),\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/Poly1305Tests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class Poly1305Tests: XCTestCase {\n  func testPoly1305() {\n    let key: Array<UInt8> = [0xdd, 0xde, 0xdf, 0xe0, 0xe1, 0xe2, 0xe3, 0xe4, 0xe5, 0xe6, 0xe7, 0xe8, 0xe9, 0xea, 0xeb, 0xec, 0xed, 0xee, 0xef, 0xf0, 0xf1, 0xf2, 0xf3, 0xf4, 0xf5, 0xf6, 0xf7, 0xf8, 0xf9, 0xfa, 0xfb, 0xfc]\n    let msg: Array<UInt8> = [0x79, 0x7a, 0x7b, 0x7c, 0x7d, 0x7e, 0x7f, 0x80, 0x81, 0x82, 0x83, 0x84, 0x85, 0x86, 0x87, 0x88, 0x89, 0x8a, 0x8b, 0x8c, 0x8d, 0x8e, 0x8f, 0x90, 0x91, 0x92, 0x93, 0x94, 0x95, 0x96, 0x97, 0x98, 0x99, 0x9a, 0x9b, 0x9c, 0x9d, 0x9e, 0x9f, 0xa0, 0xa1, 0xa2, 0xa3, 0xa4, 0xa5, 0xa6, 0xa7, 0xa8, 0xa9, 0xaa, 0xab, 0xac, 0xad, 0xae, 0xaf, 0xb0, 0xb1, 0xb2, 0xb3, 0xb4, 0xb5, 0xb6, 0xb7, 0xb8, 0xb9, 0xba, 0xbb, 0xbc, 0xbd, 0xbe, 0xbf, 0xc0, 0xc1]\n    let expectedMac: Array<UInt8> = [0xdd, 0xb9, 0xda, 0x7d, 0xdd, 0x5e, 0x52, 0x79, 0x27, 0x30, 0xed, 0x5c, 0xda, 0x5f, 0x90, 0xa4]\n\n    XCTAssertEqual(try Poly1305(key: key).authenticate(msg), expectedMac)\n\n    // extensions\n    let msgData = Data( msg)\n    XCTAssertEqual(try msgData.authenticate(with: Poly1305(key: key)), Data( expectedMac), \"Invalid authentication result\")\n  }\n\n  // https://github.com/krzyzanowskim/CryptoSwift/issues/183\n  func testIssue183() {\n    let key: Array<UInt8> = [111, 53, 197, 181, 1, 92, 67, 199, 37, 92, 76, 167, 12, 35, 75, 226, 198, 34, 107, 84, 79, 6, 231, 10, 25, 221, 14, 155, 81, 244, 15, 203]\n    let message: Array<UInt8> = [208, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 162, 210, 40, 78, 3, 161, 87, 187, 96, 253, 104, 187, 87, 87, 249, 56, 5, 156, 122, 121, 196, 192, 254, 58, 98, 22, 47, 151, 205, 201, 108, 143, 197, 99, 182, 109, 59, 63, 172, 111, 120, 185, 175, 129, 59, 126, 68, 140, 237, 126, 175, 49, 224, 249, 245, 37, 75, 252, 69, 215, 171, 27, 163, 16, 185, 239, 184, 144, 37, 131, 242, 12, 90, 134, 24, 237, 209, 127, 71, 86, 122, 173, 238, 73, 186, 58, 102, 112, 90, 217, 243, 251, 110, 85, 106, 18, 172, 167, 179, 173, 73, 125, 9, 129, 132, 80, 70, 4, 254, 178, 211, 200, 207, 231, 232, 17, 176, 127, 153, 120, 71, 164, 139, 56, 106, 71, 96, 79, 11, 213, 243, 66, 53, 167, 108, 233, 250, 136, 69, 190, 191, 12, 136, 24, 157, 202, 49, 158, 152, 150, 34, 88, 132, 112, 74, 168, 153, 116, 31, 7, 61, 60, 22, 199, 108, 187, 209, 114, 234, 185, 247, 41, 68, 184, 95, 169, 60, 126, 73, 59, 54, 126, 162, 90, 18, 32, 230, 123, 2, 40, 74, 177, 127, 219, 93, 186, 22, 75, 251, 101, 95, 160, 68, 235, 77, 2, 10, 202, 2, 0, 0, 0, 0, 0, 0, 0, 208, 0, 0, 0, 0, 0, 0, 0]\n    let expectedMac: Array<UInt8> = [68, 216, 92, 163, 164, 144, 55, 43, 185, 18, 83, 92, 41, 133, 72, 168]\n    XCTAssertEqual(try message.authenticate(with: Poly1305(key: key)), expectedMac)\n  }\n\n  static let allTests = [\n    (\"testPoly1305\", testPoly1305),\n    (\"testIssue183\", testIssue183)\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/RSASecKeyTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2021 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\n#if canImport(Security)\n\n  import Security\n  import XCTest\n  @testable import CryptoSwift\n\n  final class RSASecKeyTests: XCTestCase {\n\n    // MARK: SecKey <-> RSA Interoperability\n\n    /// From CryptoSwift RSA -> External Representation -> SecKey\n    ///\n    /// This test enforces that\n    /// 1) We can export the raw external representation of a CryptoSwift RSA Public Key\n    /// 2) And that we can import / create an RSA SecKey from that raw external representation\n    /// 3) Proves interoperability between Apple's `Security` Framework and `CryptoSwift`\n    func testRSAExternalRepresentationPublic() throws {\n\n      // Generate a CryptoSwift RSA Key\n      let rsaCryptoSwift = try RSA(keySize: 1024)\n\n      // Get the key's rawExternalRepresentation\n      let rsaCryptoSwiftRawRep = try rsaCryptoSwift.publicKeyDER()\n\n      // We should be able to instantiate an RSA SecKey from this data\n      let attributes: [String: Any] = [\n        kSecAttrKeyType as String: kSecAttrKeyTypeRSA,\n        kSecAttrKeyClass as String: kSecAttrKeyClassPublic,\n        kSecAttrKeySizeInBits as String: 1024,\n        kSecAttrIsPermanent as String: false\n      ]\n      var error: Unmanaged<CFError>?\n      guard let rsaSecKey = SecKeyCreateWithData(Data(rsaCryptoSwiftRawRep) as CFData, attributes as CFDictionary, &error) else {\n        XCTFail(\"Error constructing SecKey from raw key data: \\(error.debugDescription)\")\n        return\n      }\n\n      // Get the SecKey's external representation\n      var externalRepError: Unmanaged<CFError>?\n      guard let rsaSecKeyRawRep = SecKeyCopyExternalRepresentation(rsaSecKey, &externalRepError) as? Data else {\n        XCTFail(\"Failed to copy external representation for RSA SecKey\")\n        return\n      }\n\n      // Ensure both the CryptoSwift Ext Rep and the SecKey Ext Rep match\n      XCTAssertEqual(rsaSecKeyRawRep, Data(rsaCryptoSwiftRawRep))\n      XCTAssertEqual(rsaSecKeyRawRep, try rsaCryptoSwift.publicKeyExternalRepresentation())\n    }\n      \n    /// From CryptoSwift RSA -> External Representation -> SecKey\n    ///\n    /// This test enforces that\n    /// 1) We can export the raw external representation of a 1 byte CryptoSwift RSA Public Key\n    /// 2) And that we can import / create an RSA SecKey from that raw external representation\n    /// 3) Proves interoperability between Apple's `Security` Framework and `CryptoSwift`\n    func testRSAExternalRepresentationPublic_1ByteExponent() throws {\n\n      // Generate a CryptoSwift RSA Key\n      let n: Array<UInt8> = [\n        0xDF, 0x74, 0xEA, 0xA8, 0xB4, 0x77, 0x79, 0xE5, 0x26, 0x0E, 0xD1, 0xD2, 0xF3, 0xDA, 0x85, 0xDE,\n        0x9E, 0x0C, 0x3F, 0xB5, 0x9F, 0xAA, 0xDD, 0x99, 0x8E, 0x3D, 0xE5, 0x66, 0x32, 0xE3, 0x8C, 0x21,\n        0x83, 0xBF, 0x0A, 0xFD, 0x70, 0x93, 0x65, 0x34, 0x38, 0xAE, 0x29, 0xBA, 0x0E, 0x0E, 0x05, 0x22,\n        0x4F, 0x86, 0x5D, 0x3D, 0x66, 0xCE, 0x88, 0xC0, 0x1F, 0x0D, 0xC0, 0xF3, 0x94, 0xEC, 0x40, 0xD3,\n        0x80, 0xC3, 0x9C, 0x41, 0x46, 0x01, 0xFF, 0xA4, 0x0D, 0x08, 0x8D, 0x49, 0xED, 0x99, 0xB6, 0xA0,\n        0xBB, 0x6E, 0x72, 0x1C, 0xF3, 0xE2, 0x92, 0x1B, 0xFA, 0x8E, 0x19, 0x02, 0x15, 0x69, 0xAC, 0xB8,\n        0x51, 0xCA, 0xFA, 0xA2, 0xF0, 0xE4, 0xCA, 0x43, 0xB9, 0x1F, 0x19, 0xFB, 0x39, 0x4E, 0xEC, 0x26,\n        0x9F, 0x53, 0x3F, 0xD1, 0xF4, 0x24, 0x7F, 0x33, 0x31, 0x00, 0x3A, 0x63, 0x38, 0xA3, 0x60, 0x7F,\n        0x4B, 0xB2, 0xEA, 0x53, 0x7A, 0xBA, 0xD8, 0xDD, 0x4E, 0xB3, 0xCA, 0x28, 0x55, 0x10, 0x35, 0xD7,\n        0x3A, 0xFD, 0x3C, 0xBC, 0x11, 0xE4, 0xE7, 0x40, 0x4C, 0x14, 0x96, 0xC4, 0xF6, 0x2C, 0x05, 0xC2,\n        0x7C, 0x42, 0xB1, 0x4E, 0x7E, 0x51, 0x95, 0x19, 0x63, 0x0F, 0x3B, 0x52, 0xED, 0x27, 0xE0, 0xB3,\n        0xC5, 0x4B, 0xD0, 0x53, 0xF2, 0xD5, 0x08, 0xBC, 0x07, 0xE7, 0x45, 0x72, 0x04, 0x58, 0x28, 0x5A,\n        0xDC, 0xA6, 0xC5, 0x5A, 0x67, 0x59, 0x41, 0x99, 0x72, 0xAC, 0x5C, 0x34, 0x6E, 0xE5, 0x04, 0x7F,\n        0x46, 0x0D, 0xDF, 0xF4, 0x34, 0x6A, 0xE0, 0x64, 0x75, 0xB0, 0xD1, 0xFC, 0x44, 0xB6, 0x3D, 0xB8,\n        0x0A, 0x4C, 0x97, 0x64, 0x8D, 0xCF, 0xEB, 0x11, 0xE3, 0x34, 0x4F, 0x1B, 0xCE, 0x51, 0xFE, 0xC7,\n        0xB9, 0x43, 0x4E, 0x86, 0xBB, 0x40, 0x54, 0x43, 0x75, 0x0F, 0x9B, 0xAE, 0xC4, 0x4D, 0x56, 0x4B\n      ]\n\n      let e: Array<UInt8> = [\n        0x03\n      ]\n\n      let rsaCryptoSwift = RSA(n: n, e: e)\n\n      // Get the key's rawExternalRepresentation\n      let rsaCryptoSwiftRawRep = try rsaCryptoSwift.publicKeyDER()\n\n      // We should be able to instantiate an RSA SecKey from this data\n      let attributes: [String: Any] = [\n        kSecAttrKeyType as String: kSecAttrKeyTypeRSA,\n        kSecAttrKeyClass as String: kSecAttrKeyClassPublic,\n        kSecAttrKeySizeInBits as String: 2048,\n        kSecAttrIsPermanent as String: false\n      ]\n      var error: Unmanaged<CFError>?\n      guard let rsaSecKey = SecKeyCreateWithData(Data(rsaCryptoSwiftRawRep) as CFData, attributes as CFDictionary, &error) else {\n        XCTFail(\"Error constructing SecKey from raw key data: \\(error.debugDescription)\")\n        return\n      }\n\n      // Get the SecKey's external representation\n      var externalRepError: Unmanaged<CFError>?\n      guard let rsaSecKeyRawRep = SecKeyCopyExternalRepresentation(rsaSecKey, &externalRepError) as? Data else {\n        XCTFail(\"Failed to copy external representation for RSA SecKey\")\n        return\n      }\n\n      // Ensure both the CryptoSwift Ext Rep and the SecKey Ext Rep match\n      XCTAssertEqual(rsaSecKeyRawRep, Data(rsaCryptoSwiftRawRep))\n      XCTAssertEqual(rsaSecKeyRawRep, try rsaCryptoSwift.publicKeyExternalRepresentation())\n    }\n    \n    /// From CryptoSwift RSA -> External Representation -> SecKey\n    ///\n    /// This test enforces that\n    /// 1) We can export the raw external representation of a CryptoSwift RSA Private Key\n    /// 2) And that we can import / create an RSA SecKey from that raw external representation\n    /// 3) Proves interoperability between Apple's `Security` Framework and `CryptoSwift`\n    func testRSAExternalRepresentationPrivate() throws {\n\n      // Generate a CryptoSwift RSA Key\n      let rsaCryptoSwift = try RSA(keySize: 1024)\n\n      // Get the key's rawExternalRepresentation\n      let rsaCryptoSwiftRawRep = try rsaCryptoSwift.privateKeyDER()\n\n      // We should be able to instantiate an RSA SecKey from this data\n      let attributes: [String: Any] = [\n        kSecAttrKeyType as String: kSecAttrKeyTypeRSA,\n        kSecAttrKeyClass as String: kSecAttrKeyClassPrivate,\n        kSecAttrKeySizeInBits as String: 1024,\n        kSecAttrIsPermanent as String: false\n      ]\n      var error: Unmanaged<CFError>?\n      guard let rsaSecKey = SecKeyCreateWithData(Data(rsaCryptoSwiftRawRep) as CFData, attributes as CFDictionary, &error) else {\n        XCTFail(\"Error constructing SecKey from raw key data: \\(error.debugDescription)\")\n        return\n      }\n\n      // Get the SecKey's external representation\n      var externalRepError: Unmanaged<CFError>?\n      guard let rsaSecKeyRawRep = SecKeyCopyExternalRepresentation(rsaSecKey, &externalRepError) as? Data else {\n        XCTFail(\"Failed to copy external representation for RSA SecKey\")\n        return\n      }\n\n      // Ensure both the CryptoSwift Ext Rep and the SecKey Ext Rep match\n      XCTAssertEqual(rsaSecKeyRawRep, Data(rsaCryptoSwiftRawRep))\n      XCTAssertEqual(rsaSecKeyRawRep, try rsaCryptoSwift.externalRepresentation())\n    }\n\n    /// From SecKey -> External Representation -> CryptoSwift RSA\n    ///\n    /// This test enforces that\n    /// 1) Given the raw external representation of a Public RSA SecKey, we can import that same key into CryptoSwift\n    /// 2) When we export the raw external representation of the RSA Key we get the exact same data\n    /// 3) Proves interoperability between Apple's `Security` Framework and `CryptoSwift`\n    func testSecKeyExternalRepresentationPublic() throws {\n      // Generate a SecKey RSA Key\n      let parameters: [CFString: Any] = [\n        kSecAttrKeyType: kSecAttrKeyTypeRSA,\n        kSecAttrKeySizeInBits: 1024\n      ]\n\n      var error: Unmanaged<CFError>?\n\n      // Generate the RSA SecKey\n      guard let rsaSecKey = SecKeyCreateRandomKey(parameters as CFDictionary, &error) else {\n        XCTFail(\"Key Generation Error: \\(error.debugDescription)\")\n        return\n      }\n\n      // Extract the public key from the private RSA SecKey\n      guard let rsaSecKeyPublic = SecKeyCopyPublicKey(rsaSecKey) else {\n        XCTFail(\"Public Key Extraction Error\")\n        return\n      }\n\n      // Let's grab the external representation of the public key\n      var externalRepError: Unmanaged<CFError>?\n      guard let rsaSecKeyRawRep = SecKeyCopyExternalRepresentation(rsaSecKeyPublic, &externalRepError) as? Data else {\n        XCTFail(\"Failed to copy external representation for RSA SecKey\")\n        return\n      }\n\n      // Ensure we can import the private RSA key into CryptoSwift\n      let rsaCryptoSwift = try RSA(rawRepresentation: rsaSecKeyRawRep)\n\n      XCTAssertNil(rsaCryptoSwift.d)\n      XCTAssertEqual(rsaSecKeyRawRep, try rsaCryptoSwift.externalRepresentation())\n    }\n\n    /// From SecKey -> External Representation -> CryptoSwift RSA\n    ///\n    /// This test enforces that\n    /// 1) Given the raw external representation of a Private RSA SecKey, we can import that same key into CryptoSwift\n    /// 2) When we export the raw external representation of the RSA Key we get the exact same data\n    /// 3) Proves interoperability between Apple's `Security` Framework and `CryptoSwift`\n    func testSecKeyExternalRepresentationPrivate() throws {\n      // Generate a SecKey RSA Key\n      let parameters: [CFString: Any] = [\n        kSecAttrKeyType: kSecAttrKeyTypeRSA,\n        kSecAttrKeySizeInBits: 1024\n      ]\n\n      var error: Unmanaged<CFError>?\n\n      // Generate the RSA SecKey\n      guard let rsaSecKey = SecKeyCreateRandomKey(parameters as CFDictionary, &error) else {\n        XCTFail(\"Key Generation Error: \\(error.debugDescription)\")\n        return\n      }\n\n      // Let's grab the external representation\n      var externalRepError: Unmanaged<CFError>?\n      guard let rsaSecKeyRawRep = SecKeyCopyExternalRepresentation(rsaSecKey, &externalRepError) as? Data else {\n        XCTFail(\"Failed to copy external representation for RSA SecKey\")\n        return\n      }\n\n      // Ensure we can import the private RSA key into CryptoSwift\n      let rsaCryptoSwift = try RSA(rawRepresentation: rsaSecKeyRawRep)\n\n      XCTAssertNotNil(rsaCryptoSwift.d)\n      XCTAssertEqual(rsaSecKeyRawRep, try rsaCryptoSwift.externalRepresentation())\n    }\n\n    /// This test generates X RSA keys and tests them between `Security` and `CryptoSwift` for interoperability\n    ///\n    /// For each key generated, this test enforces that\n    /// 1) We can import the raw external representation (generated by the `Security` framework) of the RSA Key into `CryptoSwift`\n    /// 2) When signing messages using a deterministic variant, we get the same output from both `Security` and `CryptoSwift`\n    /// 3) We can verify a signature generated from `CryptoSwift` with `Security` and vice versa\n    /// 4) We can encrypt and decrypt a message generated from `CryptoSwift` with `Security` and vice versa\n    func testRSASecKeys() throws {\n\n      let tests = 3\n      let messageToSign: String = \"RSA Keys!\"\n\n      for _ in 0..<tests {\n\n        // Generate a SecKey RSA Key\n        let parameters: [CFString: Any] = [\n          kSecAttrKeyType: kSecAttrKeyTypeRSA,\n          kSecAttrKeySizeInBits: 1024\n        ]\n\n        var error: Unmanaged<CFError>?\n\n        // Generate the RSA SecKey\n        guard let rsaSecKey = SecKeyCreateRandomKey(parameters as CFDictionary, &error) else {\n          XCTFail(\"Key Generation Error: \\(error.debugDescription)\")\n          break\n        }\n\n        // Let's grab the external representation\n        var externalRepError: Unmanaged<CFError>?\n        guard let rsaSecKeyRawRep = SecKeyCopyExternalRepresentation(rsaSecKey, &externalRepError) as? Data else {\n          XCTFail(\"Failed to copy external representation for RSA SecKey\")\n          break\n        }\n\n        // Ensure we can import the private RSA key into CryptoSwift\n        let rsaCryptoSwift = try RSA(rawRepresentation: rsaSecKeyRawRep)\n\n        // Sign the message with both keys and ensure they're the same (the pkcs1v15 signature variant is deterministic)\n        let csSignature = try rsaCryptoSwift.sign(messageToSign.bytes, variant: .message_pkcs1v15_SHA256)\n\n        let skSignature = try secKeySign(messageToSign.bytes, variant: .rsaSignatureMessagePKCS1v15SHA256, withKey: rsaSecKey)\n\n        XCTAssertEqual(csSignature, skSignature.byteArray, \"Signatures don't match!\")\n\n        // Ensure we can verify each signature using the opposite library\n        XCTAssertTrue(try rsaCryptoSwift.verify(signature: skSignature.byteArray, for: messageToSign.bytes, variant: .message_pkcs1v15_SHA256))\n        XCTAssertTrue(try self.secKeyVerify(csSignature, forBytes: messageToSign.bytes, usingVariant: .rsaSignatureMessagePKCS1v15SHA256, withKey: rsaSecKey))\n\n        // Encrypt with SecKey\n        let skEncryption = try secKeyEncrypt(messageToSign.bytes, usingVariant: .rsaEncryptionRaw, withKey: rsaSecKey)\n        // Decrypt with CryptoSwift Key\n        XCTAssertEqual(try rsaCryptoSwift.decrypt(skEncryption.byteArray, variant: .raw), messageToSign.bytes, \"CryptoSwift Decryption of SecKey Encryption Failed\")\n\n        // Encrypt with CryptoSwift\n        let csEncryption = try rsaCryptoSwift.encrypt(messageToSign.bytes, variant: .raw)\n        // Decrypt with SecKey\n        XCTAssertEqual(try self.secKeyDecrypt(csEncryption, usingVariant: .rsaEncryptionRaw, withKey: rsaSecKey).byteArray, messageToSign.bytes, \"SecKey Decryption of CryptoSwift Encryption Failed\")\n\n        XCTAssertEqual(csEncryption, skEncryption.byteArray, \"Encrypted Data Does Not Match\")\n\n        // Encrypt with SecKey\n        let skEncryption2 = try secKeyEncrypt(messageToSign.bytes, usingVariant: .rsaEncryptionPKCS1, withKey: rsaSecKey)\n        // Decrypt with CryptoSwift Key\n        XCTAssertEqual(try rsaCryptoSwift.decrypt(skEncryption2.byteArray, variant: .pksc1v15), messageToSign.bytes, \"CryptoSwift Decryption of SecKey Encryption Failed\")\n\n        // Encrypt with CryptoSwift\n        let csEncryption2 = try rsaCryptoSwift.encrypt(messageToSign.bytes, variant: .pksc1v15)\n        // Decrypt with SecKey\n        XCTAssertEqual(try self.secKeyDecrypt(csEncryption2, usingVariant: .rsaEncryptionPKCS1, withKey: rsaSecKey).byteArray, messageToSign.bytes, \"SecKey Decryption of CryptoSwift Encryption Failed\")\n      }\n    }\n\n    private func secKeySign(_ bytes: Array<UInt8>, variant: SecKeyAlgorithm, withKey key: SecKey) throws -> Data {\n      var error: Unmanaged<CFError>?\n\n      // Sign the data\n      guard let signature = SecKeyCreateSignature(\n        key,\n        variant,\n        Data(bytes) as CFData,\n        &error\n      ) as Data?\n      else { throw NSError(domain: \"Failed to sign bytes: \\(bytes)\", code: 0) }\n\n      return signature\n    }\n\n    private func secKeyVerify(_ signature: Array<UInt8>, forBytes bytes: Array<UInt8>, usingVariant variant: SecKeyAlgorithm, withKey key: SecKey) throws -> Bool {\n      let pubKey = SecKeyCopyPublicKey(key)!\n\n      var error: Unmanaged<CFError>?\n\n      // Perform the signature verification\n      let result = SecKeyVerifySignature(\n        pubKey,\n        variant,\n        Data(bytes) as CFData,\n        Data(signature) as CFData,\n        &error\n      )\n\n      // Throw the error if we encountered one...\n      if let error = error { throw error.takeRetainedValue() as Error }\n\n      // return the result of the verification\n      return result\n    }\n\n    private func secKeyEncrypt(_ bytes: Array<UInt8>, usingVariant variant: SecKeyAlgorithm, withKey key: SecKey) throws -> Data {\n      let pubKey = SecKeyCopyPublicKey(key)!\n\n      var error: Unmanaged<CFError>?\n\n      guard let encryptedData = SecKeyCreateEncryptedData(pubKey, variant, Data(bytes) as CFData, &error) else {\n        throw NSError(domain: \"Error Encrypting Data: \\(error.debugDescription)\", code: 0, userInfo: nil)\n      }\n\n      // Throw the error if we encountered one...\n      if let error = error { throw error.takeRetainedValue() as Error }\n\n      // return the result of the encryption\n      return encryptedData as Data\n    }\n\n    private func secKeyDecrypt(_ bytes: Array<UInt8>, usingVariant variant: SecKeyAlgorithm, withKey key: SecKey) throws -> Data {\n      var error: Unmanaged<CFError>?\n      guard let decryptedData = SecKeyCreateDecryptedData(key, variant, Data(bytes) as CFData, &error) else {\n        throw NSError(domain: \"Error Decrypting Data: \\(error.debugDescription)\", code: 0, userInfo: nil)\n      }\n      return (decryptedData as Data).drop { $0 == 0x00 }\n    }\n  }\n\n  extension RSASecKeyTests {\n    static func allTests() -> [(String, (RSASecKeyTests) -> () throws -> Void)] {\n      let tests = [\n        (\"testRSAExternalRepresentationPublic\", testRSAExternalRepresentationPublic),\n        (\"testRSAExternalRepresentationPrivate\", testRSAExternalRepresentationPrivate),\n        (\"testSecKeyExternalRepresentationPublic\", testSecKeyExternalRepresentationPublic),\n        (\"testSecKeyExternalRepresentationPrivate\", testSecKeyExternalRepresentationPrivate),\n        (\"testRSASecKeys\", testRSASecKeys)\n      ]\n\n      return tests\n    }\n  }\n\n  // - MARK: Test Fixture Generation Code\n  extension RSASecKeyTests {\n\n    /// This 'Test' generates an RSA Key and uses that key to sign and encrypt a series of messages that we can test against.\n    ///\n    /// It prints a `Fixture` object that can be copy and pasted / used in other tests.\n    func testCreateTestFixture() throws {\n\n      let keySize = 1024\n      let messages = [\n        \"\",\n        \"👋\",\n        \"RSA Keys\",\n        \"CryptoSwift RSA Keys!\",\n        \"CryptoSwift RSA Keys are really cool! They support encrypting / decrypting messages, signing and verifying signed messages, and importing and exporting encrypted keys for use between sessions 🔐\"\n      ]\n      print(messages.map { $0.bytes.count })\n\n      /// Generate a SecKey RSA Key\n      let parameters: [CFString: Any] = [\n        kSecAttrKeyType: kSecAttrKeyTypeRSA,\n        kSecAttrKeySizeInBits: keySize\n      ]\n\n      var error: Unmanaged<CFError>?\n\n      // Generate the RSA SecKey\n      guard let rsaSecKey = SecKeyCreateRandomKey(parameters as CFDictionary, &error) else {\n        XCTFail(\"Key Generation Error: \\(error.debugDescription)\")\n        return\n      }\n\n      // Extract the public key from the private RSA SecKey\n      guard let rsaSecKeyPublic = SecKeyCopyPublicKey(rsaSecKey) else {\n        XCTFail(\"Public Key Extraction Error\")\n        return\n      }\n\n      /// Let's grab the external representation of the public key\n      var publicExternalRepError: Unmanaged<CFError>?\n      guard let publicRSASecKeyRawRep = SecKeyCopyExternalRepresentation(rsaSecKeyPublic, &publicExternalRepError) as? Data else {\n        XCTFail(\"Failed to copy external representation for RSA SecKey\")\n        return\n      }\n\n      /// Let's grab the external representation of the private key\n      var privateExternalRepError: Unmanaged<CFError>?\n      guard let privateRSASecKeyRawRep = SecKeyCopyExternalRepresentation(rsaSecKey, &privateExternalRepError) as? Data else {\n        XCTFail(\"Failed to copy external representation for RSA SecKey\")\n        return\n      }\n\n      var template = RSASecKeyTests.FixtureTemplate\n      template = template.replacingOccurrences(of: \"{{KEY_SIZE}}\", with: \"\\(keySize)\")\n      template = template.replacingOccurrences(of: \"{{PUBLIC_DER}}\", with: \"\\(publicRSASecKeyRawRep.base64EncodedString())\")\n      template = template.replacingOccurrences(of: \"{{PRIVATE_DER}}\", with: \"\\(privateRSASecKeyRawRep.base64EncodedString())\")\n\n      var messageEntries: [String] = []\n      for message in messages {\n        var messageTemplate = RSASecKeyTests.MessageTemplate\n        messageTemplate = messageTemplate.replacingOccurrences(of: \"{{PLAINTEXT_MESSAGE}}\", with: message)\n\n        let encryptedMessages = try encrypt(data: message.data(using: .utf8)!, with: rsaSecKeyPublic)\n        messageTemplate = messageTemplate.replacingOccurrences(of: \"{{ENCRYPTED_MESSAGES}}\", with: encryptedMessages.joined(separator: \",\\n\\t\\t  \"))\n\n        let signedMessages = try sign(message: message.data(using: .utf8)!, using: rsaSecKey)\n        messageTemplate = messageTemplate.replacingOccurrences(of: \"{{SIGNED_MESSAGES}}\", with: signedMessages.joined(separator: \",\\n\\t\\t  \"))\n\n        messageEntries.append(messageTemplate)\n      }\n\n      template = template.replacingOccurrences(of: \"{{MESSAGE_TEMPLATES}}\", with: \"\\(messageEntries.joined(separator: \",\\n\\t\"))\")\n\n      print(\"\\n**************************\")\n      print(\"   Test Fixture Output      \")\n      print(\"**************************\\n\")\n      print(template)\n      print(\"\\n**************************\")\n    }\n\n    private static let FixtureTemplate = \"\"\"\n      static let RSA_{{KEY_SIZE}} = Fixture(\n        keySize: {{KEY_SIZE}},\n        publicDER: \\\"\\\"\\\"\n    {{PUBLIC_DER}}\n    \\\"\\\"\\\",\n        privateDER: \\\"\\\"\\\"\n    {{PRIVATE_DER}}\n    \\\"\\\"\\\",\n        messages: [\n          {{MESSAGE_TEMPLATES}}\n        ]\n      )\n    \"\"\"\n\n    private static let MessageTemplate = \"\"\"\n    \"{{PLAINTEXT_MESSAGE}}\": (\n      encryptedMessage: [\n        {{ENCRYPTED_MESSAGES}}\n      ],\n      signedMessage: [\n        {{SIGNED_MESSAGES}}\n      ]\n    )\n    \"\"\"\n\n    private func initSecKey(rawRepresentation rawKey: Data) throws -> SecKey {\n      let attributes: [String: Any] = [\n        kSecAttrKeyType as String: kSecAttrKeyTypeRSA,\n        kSecAttrKeyClass as String: kSecAttrKeyClassPrivate,\n        kSecAttrKeySizeInBits as String: 1024,\n        kSecAttrIsPermanent as String: false\n      ]\n\n      var error: Unmanaged<CFError>?\n      guard let secKey = SecKeyCreateWithData(rawKey as CFData, attributes as CFDictionary, &error) else {\n        throw NSError(domain: \"Error constructing SecKey from raw key data: \\(error.debugDescription)\", code: 0, userInfo: nil)\n      }\n\n      return secKey\n    }\n\n    // We don't support PSS yet so we skip these variants\n    private func sign(message: Data, using key: SecKey) throws -> [String] {\n      let algorithms: [SecKeyAlgorithm] = [\n        .rsaSignatureRaw,\n        //.rsaSignatureDigestPSSSHA1,\n        //.rsaSignatureDigestPSSSHA224,\n        //.rsaSignatureDigestPSSSHA256,\n        //.rsaSignatureDigestPSSSHA384,\n        //.rsaSignatureDigestPSSSHA512,\n        .rsaSignatureDigestPKCS1v15Raw,\n        .rsaSignatureDigestPKCS1v15SHA1,\n        .rsaSignatureDigestPKCS1v15SHA224,\n        .rsaSignatureDigestPKCS1v15SHA256,\n        .rsaSignatureDigestPKCS1v15SHA384,\n        .rsaSignatureDigestPKCS1v15SHA512,\n        //.rsaSignatureMessagePSSSHA1,\n        //.rsaSignatureMessagePSSSHA224,\n        //.rsaSignatureMessagePSSSHA256,\n        //.rsaSignatureMessagePSSSHA384,\n        //.rsaSignatureMessagePSSSHA512,\n        .rsaSignatureMessagePKCS1v15SHA1,\n        .rsaSignatureMessagePKCS1v15SHA224,\n        .rsaSignatureMessagePKCS1v15SHA256,\n        .rsaSignatureMessagePKCS1v15SHA384,\n        .rsaSignatureMessagePKCS1v15SHA512,\n      ]\n\n      var sigs: [String] = []\n\n      for algo in algorithms {\n        var error: Unmanaged<CFError>?\n\n        // Sign the data\n        guard let signature = SecKeyCreateSignature(\n          key,\n          algo,\n          message as CFData,\n          &error\n        ) as Data?\n        else {\n          print(\"\\\"\\(algo.rawValue)\\\": \\\"nil\\\",\")\n          sigs.append(\"\\\"\\(algo.rawValue)\\\": \\\"\\\"\")\n          continue\n        }\n\n        // Throw the error if we encountered one\n        if let error = error { print(\"\\\"\\(algo.rawValue)\\\": \\\"\\(error.takeRetainedValue())\\\",\"); continue }\n\n        // Append the signature\n        sigs.append(\"\\\"\\(algo.rawValue)\\\": \\\"\\(signature.base64EncodedString())\\\"\")\n      }\n\n      return sigs\n    }\n\n    private func encrypt(data: Data, with key: SecKey) throws -> [String] {\n      let algorithms: [SecKeyAlgorithm] = [\n        .rsaEncryptionRaw,\n        .rsaEncryptionPKCS1\n      ]\n\n      var encryptions: [String] = []\n\n      for algo in algorithms {\n        var error: Unmanaged<CFError>?\n        guard let encryptedData = SecKeyCreateEncryptedData(key, algo, data as CFData, &error) as? Data else {\n          print(\"\\\"\\(algo.rawValue)\\\": \\\"\\(error?.takeRetainedValue().localizedDescription ?? \"nil\")\\\",\")\n          encryptions.append(\"\\\"\\(algo.rawValue)\\\": \\\"\\\"\")\n          continue\n        }\n        encryptions.append(\"\\\"\\(algo.rawValue)\\\": \\\"\\(encryptedData.base64EncodedString())\\\"\")\n      }\n\n      return encryptions\n    }\n  }\n\n#endif\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/RSATests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class RSATests: XCTestCase {\n\n  func testSmallRSA() {\n    /*\n     * Example taken from the book \"Understanding Cryptography\"\n     *\n     * p = 3; q = 11; n = pq = 33; e = 3; d = 7\n     */\n\n    let n: Array<UInt8> = [33]\n    let e: Array<UInt8> = [3]\n    let d: Array<UInt8> = [7]\n    let message: Array<UInt8> = [4]\n    let expected: Array<UInt8> = [31]\n\n    let rsa = RSA(n: n, e: e, d: d)\n    XCTAssertEqual(rsa.keySize, 6, \"key size is not correct\")\n\n    let encrypted = try! rsa.encrypt(message, variant: .unsafe)\n    XCTAssertEqual(encrypted, expected, \"small encrypt failed\")\n\n    let decrypted = try! rsa.decrypt(encrypted, variant: .unsafe)\n    XCTAssertEqual(decrypted, message, \"small decrypt failed\")\n  }\n\n  func testRSA1() {\n    /*\n     * Taken from http://cryptomanager.com/tv.html\n     *\n     * 1. 1024-bit RSA bare exponentiation\n     */\n\n    let n: Array<UInt8> = [\n      0xF0, 0xC4, 0x2D, 0xB8, 0x48, 0x6F, 0xEB, 0x95, 0x95, 0xD8, 0xC7, 0x8F, 0x90, 0x8D, 0x04, 0xA9,\n      0xB6, 0xC8, 0xC7, 0x7A, 0x36, 0x10, 0x5B, 0x1B, 0xF2, 0x75, 0x53, 0x77, 0xA6, 0x89, 0x3D, 0xC4,\n      0x38, 0x3C, 0x54, 0xEC, 0x6B, 0x52, 0x62, 0xE5, 0x68, 0x8E, 0x5F, 0x9D, 0x9D, 0xD1, 0x64, 0x97,\n      0xD0, 0xE3, 0xEA, 0x83, 0x3D, 0xEE, 0x2C, 0x8E, 0xBC, 0xD1, 0x43, 0x83, 0x89, 0xFC, 0xCA, 0x8F,\n      0xED, 0xE7, 0xA8, 0x8A, 0x81, 0x25, 0x7E, 0x8B, 0x27, 0x09, 0xC4, 0x94, 0xD4, 0x2F, 0x72, 0x3D,\n      0xEC, 0x2E, 0x0B, 0x5C, 0x09, 0x73, 0x1C, 0x55, 0x0D, 0xCC, 0x9D, 0x7E, 0x75, 0x25, 0x89, 0x89,\n      0x1C, 0xBB, 0xC3, 0x02, 0x13, 0x07, 0xDD, 0x91, 0x8E, 0x10, 0x0B, 0x34, 0xC0, 0x14, 0xA5, 0x59,\n      0xE0, 0xE1, 0x82, 0xAF, 0xB2, 0x1A, 0x72, 0xB3, 0x07, 0xCC, 0x39, 0x5D, 0xEC, 0x99, 0x57, 0x47\n    ]\n    let e: Array<UInt8> = [\n      0x01, 0x00, 0x01\n    ]\n    let d: Array<UInt8> = [\n      0x24, 0x89, 0x10, 0x8B, 0x0B, 0x6A, 0xF8, 0x6B, 0xED, 0x9E, 0x44, 0xC2, 0x33, 0x64, 0x42, 0xD5,\n      0xE2, 0x27, 0xDB, 0xA5, 0x5E, 0xF8, 0xE2, 0x6A, 0x7E, 0x43, 0x71, 0x94, 0x11, 0x90, 0x77, 0xF0,\n      0x03, 0xBC, 0x9C, 0x02, 0x78, 0x52, 0xBB, 0x31, 0x26, 0xC9, 0x9C, 0x16, 0xD5, 0xF1, 0x05, 0x7B,\n      0xC8, 0x36, 0x1D, 0xCB, 0x26, 0xA5, 0xB2, 0xDB, 0x42, 0x29, 0xDB, 0x3D, 0xE5, 0xBD, 0x97, 0x9B,\n      0x2E, 0x59, 0x7D, 0x19, 0x16, 0xD7, 0xBB, 0xC9, 0x27, 0x46, 0xFC, 0x07, 0x59, 0x5C, 0x76, 0xB4,\n      0x4B, 0x39, 0xA4, 0x76, 0xA6, 0x5C, 0x86, 0xF0, 0x86, 0xDC, 0x92, 0x83, 0xCA, 0x6D, 0x1E, 0xEF,\n      0xC1, 0x49, 0x15, 0x98, 0x2F, 0x9C, 0x4C, 0xED, 0x5F, 0x62, 0xA9, 0xFF, 0x3B, 0xE2, 0x42, 0x18,\n      0xA9, 0x93, 0x57, 0xB5, 0xB6, 0x5C, 0x3B, 0x10, 0xAE, 0xB3, 0x67, 0xE9, 0x11, 0xEB, 0x9E, 0x21\n    ]\n    let message: Array<UInt8> = [\n      0x11, 0x22, 0x33, 0x44\n    ]\n    let expected: Array<UInt8> = [\n      0x50, 0x5B, 0x09, 0xBD, 0x5D, 0x0E, 0x66, 0xD7, 0xC8, 0x82, 0x9F, 0x5B, 0x47, 0x3E, 0xD3, 0x4D,\n      0xB5, 0xCF, 0xDB, 0xB5, 0xD5, 0x8C, 0xE7, 0x83, 0x29, 0xC8, 0xBF, 0x85, 0x20, 0xE4, 0x86, 0xD3,\n      0xC4, 0xCF, 0x9B, 0x70, 0xC6, 0x34, 0x65, 0x94, 0x35, 0x80, 0x80, 0xF4, 0x3F, 0x47, 0xEE, 0x86,\n      0x3C, 0xFA, 0xF2, 0xA2, 0xE5, 0xF0, 0x3D, 0x1E, 0x13, 0xD6, 0xFE, 0xC5, 0x7D, 0xFB, 0x1D, 0x55,\n      0x22, 0x24, 0xC4, 0x61, 0xDA, 0x41, 0x1C, 0xFE, 0x5D, 0x0B, 0x05, 0xBA, 0x87, 0x7E, 0x3A, 0x42,\n      0xF6, 0xDE, 0x4D, 0xA4, 0x6A, 0x96, 0x5C, 0x9B, 0x69, 0x5E, 0xE2, 0xD5, 0x0E, 0x40, 0x08, 0x94,\n      0x06, 0x1C, 0xB0, 0xA2, 0x1C, 0xA3, 0xA5, 0x24, 0xB4, 0x07, 0xE9, 0xFF, 0xBA, 0x87, 0xFC, 0x96,\n      0x6B, 0x3B, 0xA9, 0x45, 0x90, 0x84, 0x9A, 0xEB, 0x90, 0x8A, 0xAF, 0xF4, 0xC7, 0x19, 0xC2, 0xE4\n    ]\n\n    let rsa = RSA(n: n, e: e, d: d)\n    XCTAssertEqual(rsa.keySize, 1024, \"key size is not correct\")\n\n    let encrypted = try! rsa.encrypt(message, variant: .unsafe)\n    XCTAssertEqual(encrypted, expected, \"encrypt failed\")\n\n    let decrypted = try! rsa.decrypt(encrypted, variant: .unsafe)\n    XCTAssertEqual(decrypted, message, \"decrypt failed\")\n  }\n\n  func testRSA2() {\n    /*\n     * Taken from http://cryptomanager.com/tv.html\n     *\n     * 2. 2048-bit PKCS V. 1.5 enciphering.\n     */\n\n    let n: Array<UInt8> = [\n      0xF7, 0x48, 0xD8, 0xD9, 0x8E, 0xD0, 0x57, 0xCF, 0x39, 0x8C, 0x43, 0x7F, 0xEF, 0xC6, 0x15, 0xD7,\n      0x57, 0xD3, 0xF8, 0xEC, 0xE6, 0xF2, 0xC5, 0x80, 0xAE, 0x07, 0x80, 0x76, 0x8F, 0x9E, 0xC8, 0x3A,\n      0xAA, 0x08, 0x1F, 0xF0, 0x9E, 0x53, 0x17, 0xED, 0x60, 0x99, 0xC6, 0x3F, 0xD1, 0x5C, 0xFE, 0x11,\n      0x17, 0x2F, 0x78, 0x90, 0x8C, 0xD5, 0x8C, 0x03, 0xAE, 0xC9, 0x3A, 0x48, 0x1F, 0xF5, 0x0E, 0x17,\n      0x22, 0x04, 0xAF, 0xED, 0xFC, 0x1F, 0x16, 0xAF, 0xDB, 0x99, 0x0A, 0xAB, 0x45, 0xBE, 0x19, 0x0B,\n      0xC1, 0x92, 0x59, 0xBD, 0x4A, 0x1B, 0xFC, 0xDF, 0xBE, 0x2A, 0x29, 0x8B, 0x3C, 0x0E, 0x31, 0x8F,\n      0x78, 0xA3, 0x39, 0x19, 0x88, 0x23, 0x28, 0xDA, 0xCA, 0xC8, 0x5C, 0xB3, 0x5A, 0x0D, 0xE5, 0x37,\n      0xB1, 0x63, 0x76, 0x97, 0x52, 0x17, 0xE5, 0xA5, 0xEA, 0xAF, 0x98, 0x26, 0x6B, 0x58, 0x8C, 0x2D,\n      0xBA, 0xFD, 0x0B, 0xE3, 0x71, 0xC3, 0x49, 0x89, 0xCB, 0x36, 0xE6, 0x23, 0xD7, 0x5E, 0xFF, 0xED,\n      0xBE, 0x4A, 0x95, 0x1A, 0x68, 0x40, 0x98, 0x2B, 0xC2, 0x79, 0xB3, 0x0F, 0xCD, 0x41, 0xDA, 0xC8,\n      0x7C, 0x00, 0x74, 0xD4, 0x62, 0xF1, 0x01, 0x29, 0x00, 0xB8, 0x97, 0x3B, 0x46, 0xAD, 0xC7, 0xEA,\n      0xC0, 0x17, 0x70, 0xDF, 0xC6, 0x32, 0xEA, 0x96, 0x7F, 0x94, 0x71, 0xE9, 0x78, 0x98, 0x31, 0xF3,\n      0xA4, 0x10, 0x73, 0x0F, 0xF9, 0x14, 0x34, 0x8B, 0xE1, 0x11, 0x86, 0x3C, 0x13, 0x37, 0x63, 0x01,\n      0x07, 0x97, 0x56, 0xA1, 0x47, 0xD8, 0x01, 0x03, 0xCE, 0x9F, 0xA6, 0x88, 0xA3, 0x38, 0xE2, 0x2B,\n      0x2D, 0x91, 0x6C, 0xAD, 0x42, 0xD6, 0x73, 0xC9, 0xD0, 0x0F, 0x08, 0x21, 0x4D, 0xE5, 0x44, 0xF5,\n      0xDE, 0x81, 0x2A, 0x9A, 0x94, 0x91, 0x89, 0x07, 0x8B, 0x2B, 0xDA, 0x14, 0xB2, 0x8C, 0xA6, 0x2F\n    ]\n    let e: Array<UInt8> = [\n      0x01, 0x00, 0x01\n    ]\n    let d: Array<UInt8> = [\n      0x1C, 0xBC, 0x9A, 0x76, 0xAD, 0xE2, 0x08, 0x52, 0x4C, 0x9D, 0xC0, 0x3A, 0x5D, 0xE2, 0xE7, 0x26,\n      0xDF, 0x4E, 0x02, 0xDF, 0x84, 0xF7, 0x31, 0x7C, 0x82, 0xBC, 0xDC, 0x70, 0xEA, 0xBF, 0xC9, 0x05,\n      0x08, 0x3D, 0x69, 0x78, 0xCC, 0xED, 0x5B, 0x1A, 0x7A, 0xDF, 0x63, 0xEA, 0x86, 0xAA, 0x07, 0xDC,\n      0x74, 0x95, 0x4F, 0xAD, 0x7C, 0xB0, 0x54, 0x55, 0x19, 0x3A, 0xC9, 0x4B, 0x18, 0x6B, 0xA1, 0xF7,\n      0x8E, 0x3C, 0x7D, 0x35, 0x6A, 0xD7, 0x32, 0x0B, 0xBD, 0xB9, 0x4B, 0x44, 0x1C, 0x16, 0xBB, 0x52,\n      0x62, 0x6C, 0x5F, 0x81, 0x5F, 0xDB, 0x60, 0xC7, 0x9F, 0x91, 0xC6, 0xC2, 0x27, 0x78, 0x7E, 0xC9,\n      0xED, 0x7B, 0x0A, 0x67, 0xAD, 0x2A, 0x68, 0xD5, 0x04, 0x3B, 0xC4, 0x8A, 0x13, 0x2D, 0x0A, 0x36,\n      0x2E, 0xA7, 0x20, 0x60, 0xF5, 0x69, 0x51, 0x86, 0xB6, 0x7F, 0x31, 0x6F, 0x45, 0x8A, 0x44, 0xBF,\n      0xD1, 0x40, 0x3D, 0x93, 0xA9, 0xB9, 0x12, 0xCB, 0xB5, 0x98, 0x15, 0x91, 0x6A, 0x14, 0xA2, 0xBA,\n      0xD4, 0xF9, 0xA1, 0xED, 0x57, 0x8E, 0xBD, 0x2B, 0x5D, 0x47, 0x2F, 0x62, 0x3B, 0x4B, 0xB5, 0xF9,\n      0xB8, 0x0B, 0x93, 0x57, 0x2B, 0xEA, 0x61, 0xBD, 0x10, 0x68, 0x09, 0x4E, 0x41, 0xE8, 0x39, 0x0E,\n      0x2E, 0x28, 0xA3, 0x51, 0x43, 0x3E, 0xDD, 0x1A, 0x09, 0x9A, 0x8C, 0x6E, 0x68, 0x92, 0x60, 0x4A,\n      0xEF, 0x16, 0x3A, 0x43, 0x9B, 0x1C, 0xAE, 0x6A, 0x09, 0x5E, 0x68, 0x94, 0x3C, 0xA6, 0x7B, 0x18,\n      0xC8, 0xDC, 0x7F, 0x98, 0xCC, 0x5F, 0x8E, 0xFA, 0x22, 0xBB, 0xC8, 0x7D, 0x2E, 0x73, 0x57, 0x83,\n      0xD2, 0xBA, 0xA3, 0x8F, 0x4C, 0x17, 0xD5, 0xED, 0x0C, 0x58, 0x36, 0x6D, 0xCE, 0xF5, 0xE8, 0x52,\n      0xDD, 0x3D, 0x6E, 0x0F, 0x63, 0x72, 0x95, 0x43, 0xE2, 0x63, 0x8B, 0x29, 0x14, 0xD7, 0x2A, 0x01\n    ]\n    let message: Array<UInt8> = [\n      0x11, 0x22, 0x33, 0x44\n    ]\n    let expected: Array<UInt8> = [\n      0xEE, 0x69, 0x09, 0x9A, 0xFD, 0x9F, 0x99, 0xD6, 0x06, 0x5D, 0x65, 0xE1, 0x5F, 0x90, 0xB9, 0x23,\n      0x7C, 0x16, 0x98, 0x7D, 0x48, 0x72, 0xE2, 0xB9, 0x94, 0xED, 0x2B, 0x9E, 0x56, 0x85, 0xF9, 0xBA,\n      0x48, 0x9A, 0xB9, 0x36, 0xCC, 0x1E, 0x3D, 0xFD, 0x15, 0xB3, 0x5F, 0xEE, 0x21, 0x53, 0x6F, 0x8C,\n      0x22, 0x20, 0xAE, 0x43, 0x21, 0x7D, 0x91, 0xD8, 0x1C, 0x9E, 0xD0, 0x1D, 0xE5, 0xBA, 0xEE, 0xF4,\n      0xEF, 0xC7, 0x21, 0xD7, 0x0D, 0x67, 0xB5, 0x16, 0x6E, 0x43, 0xD8, 0x27, 0x24, 0xF3, 0x9B, 0xF0,\n      0xBD, 0x19, 0x7C, 0x31, 0xE7, 0x48, 0x51, 0x8D, 0xEE, 0x63, 0xEC, 0x10, 0x98, 0x7A, 0x08, 0x39,\n      0x0B, 0x15, 0xCC, 0x41, 0x57, 0x67, 0x7C, 0x54, 0x22, 0x6A, 0x8B, 0x04, 0xB4, 0x76, 0x84, 0xAE,\n      0xDD, 0x02, 0xB4, 0x8C, 0x8E, 0xD4, 0x8A, 0x44, 0xBD, 0x13, 0x53, 0x97, 0xAC, 0x28, 0x69, 0x76,\n      0x9B, 0x68, 0xC7, 0xD3, 0xBF, 0xAC, 0xDB, 0x72, 0xAF, 0xCD, 0x74, 0x42, 0xC2, 0x25, 0x17, 0xE0,\n      0x44, 0x99, 0x6C, 0xB6, 0x8E, 0x0A, 0x31, 0x1D, 0xF5, 0xD6, 0xD2, 0xD2, 0x86, 0x37, 0x25, 0x56,\n      0xF0, 0x19, 0x31, 0x66, 0xCC, 0x36, 0x4E, 0x65, 0x4E, 0xF4, 0x05, 0xDD, 0x22, 0xFB, 0xE5, 0x84,\n      0xDB, 0xF6, 0x0F, 0x05, 0x52, 0x96, 0x06, 0x68, 0xFB, 0x69, 0x52, 0x2C, 0x1B, 0x52, 0x64, 0xF1,\n      0x94, 0xFA, 0xC9, 0xF3, 0x56, 0x22, 0xE9, 0x82, 0x27, 0x63, 0x8F, 0xF2, 0x8B, 0x91, 0x0D, 0x8C,\n      0xC9, 0x0E, 0x50, 0x11, 0x02, 0x12, 0x12, 0xC9, 0x6C, 0x64, 0xC8, 0x58, 0x20, 0x87, 0x7A, 0x7D,\n      0x15, 0x59, 0x23, 0x5E, 0x99, 0xC3, 0x2A, 0xBE, 0xF3, 0x3D, 0x95, 0xE2, 0x8E, 0x18, 0xCC, 0xA3,\n      0x44, 0x2E, 0x6E, 0x3A, 0x43, 0x2F, 0xFF, 0xEA, 0x10, 0x10, 0x4A, 0x8E, 0xEE, 0x94, 0xC3, 0x62\n    ]\n\n    let rsa = RSA(n: n, e: e, d: d)\n    XCTAssertEqual(rsa.keySize, 2048, \"key size is not correct\")\n\n    let encrypted = try! rsa.encrypt(message, variant: .unsafe)\n    XCTAssertEqual(encrypted, expected, \"encrypt failed\")\n\n    let decrypted = try! rsa.decrypt(encrypted, variant: .unsafe)\n    XCTAssertEqual(decrypted, message, \"decrypt failed\")\n  }\n\n  func testGenerateKeyPair() {\n    /*\n     * To test key generation and its validity\n     */\n    let message: Array<UInt8> = [\n      0x11, 0x22, 0x33, 0x44\n    ]\n\n    do {\n      let rsa = try RSA(keySize: 2048)\n      // Sometimes the modulus size is 2047 bits, but it's okay (with two 1024 bits primes)\n      //XCTAssertEqual(rsa.keySize, 2048, \"key size is not correct\")\n\n      let decrypted = try rsa.decrypt(rsa.encrypt(message, variant: .unsafe), variant: .unsafe)\n      XCTAssertEqual(decrypted, message, \"encrypt+decrypt failed\")\n    } catch {\n      XCTFail(\"\\(error)\")\n    }\n  }\n\n  /// This test walks through the PKCS1 Encryption scheme manually\n  ///\n  /// This test enforces that\n  /// 1) We can decrypt a message appropriately using the PKCS1v15 Encryption Scheme\n  ///     - Note: This signature scheme is non-deterministic so we can only test that decryption results in the expected message.\n  func testRSAPKCS1_v15EncryptionManual() throws {\n    let fixture = TestFixtures.RSA_1024\n\n    guard let privateDERData = Data(base64Encoded: fixture.privateDER) else {\n      XCTFail(\"Invalid Base64String Public DER\")\n      return\n    }\n\n    // Import RSA Key\n    let rsa = try RSA(rawRepresentation: privateDERData)\n\n    let expectedMessage = \"RSA Keys\"\n    let messageToDecrypt = Data(base64Encoded: fixture.messages[expectedMessage]!.encryptedMessage[\"algid:encrypt:RSA:PKCS1\"]!)!.byteArray\n\n    // Decrypt the data\n    let decrypted = BigUInteger(Data(messageToDecrypt)).power(rsa.d!, modulus: rsa.n).serialize().byteArray\n\n    let unpadded = Padding.eme_pkcs1v15.remove(from: [0x00] + decrypted, blockSize: rsa.keySize)\n\n    XCTAssertEqual(expectedMessage, String(data: Data(unpadded), encoding: .utf8), \"Failed to decrypt the message\")\n  }\n\n  /// This test focuses on ensuring that the encryption & decryption round trip works as expected.\n  ///\n  /// This test enforces that\n  /// 1) We can encrypt and then decrypt a random integer\n  /// 2) We recover the original integer after decryption\n  func testEncryptDecryptRoundTripRandomIntegers() {\n    do {\n      let rsa = try RSA(keySize: 1024)\n\n      for _ in 0..<5 {\n        let message = BigUInteger.randomInteger(withMaximumWidth: 256).serialize().byteArray\n\n        let decrypted = try rsa.decrypt(rsa.encrypt(message, variant: .pksc1v15), variant: .pksc1v15)\n        XCTAssertEqual(decrypted, message, \"encrypt+decrypt failed\")\n      }\n    } catch {\n      XCTFail(\"\\(error)\")\n    }\n  }\n\n  /// This test focuses on ensuring that the signature & signature verification works as expected.\n  ///\n  /// This test enforces that\n  /// 1) We can sign and then verify a random integer\n  /// 2) if we modify the signature or the message in any way, the verify function returns false or throws an error.\n  func testSignatureVerificationRandomIntegers() {\n    do {\n      let rsa = try RSA(keySize: 1024)\n\n      for _ in 0..<5 {\n        let message = BigUInteger.randomInteger(withMaximumWidth: 256).serialize().byteArray\n\n        let signature = try rsa.sign(message, variant: .message_pkcs1v15_SHA256)\n        XCTAssertTrue(try rsa.verify(signature: signature, for: message, variant: .message_pkcs1v15_SHA256), \"Failed to Verify Signature for `\\(message)`\")\n        XCTAssertFalse(try rsa.verify(signature: signature, for: message.shuffled()))\n        XCTAssertFalse(try rsa.verify(signature: signature.shuffled(), for: message))\n        XCTAssertThrowsError(try rsa.verify(signature: signature.dropLast(), for: message))\n      }\n    } catch {\n      XCTFail(\"\\(error)\")\n    }\n  }\n\n  /// This test walks through the PKCS1 Signature scheme manually\n  ///\n  /// This test enforces that\n  /// 1) We can prepare and sign a message appropriately using the PKCS1v15 Signature Scheme\n  ///     - Note: This signature scheme is deterministic so we can test against a known static value\n  func testRSAPKCS1_v15SignatureManual() throws {\n    let fixture = TestFixtures.RSA_1024\n\n    guard let privateDERData = Data(base64Encoded: fixture.privateDER) else {\n      XCTFail(\"Invalid Base64String Public DER\")\n      return\n    }\n\n    // Import RSA Key\n    let rsa = try RSA(rawRepresentation: privateDERData)\n\n    let message = \"CryptoSwift RSA Keys!\"\n\n    /// 1.  Apply the hash function to the message M to produce a hash\n    let hashedMessage = SHA2(variant: .sha256).calculate(for: message.bytes)\n\n    /// 2. Encode the algorithm ID for the hash function and the hash value into an ASN.1 value of type DigestInfo\n    /// PKCS#1_15 DER Structure (OID == sha256WithRSAEncryption)\n    let asn: ASN1.Node = .sequence(nodes: [\n      .sequence(nodes: [\n        .objectIdentifier(data: Data(Array<UInt8>(arrayLiteral: 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x02, 0x01))),\n        .null\n      ]),\n      .octetString(data: Data(hashedMessage))\n    ])\n\n    let t = ASN1.Encoder.encode(asn)\n\n    /// 3.  If emLen < tLen + 11, output \"intended encoded message length too short\" and stop\n    if rsa.keySizeBytes < t.count + 11 { throw RSA.Error.invalidMessageLengthForSigning }\n\n    /// 4.  Generate an octet string PS consisting of emLen - tLen - 3\n    /// octets with hexadecimal value 0xff. The length of PS will be\n    /// at least 8 octets.\n    /// 5.  Concatenate PS, the DER encoding T, and other padding to form\n    /// the encoded message EM as EM = 0x00 || 0x01 || PS || 0x00 || T.\n    let padded = EMSAPKCS1v15Padding().add(to: t, blockSize: rsa.keySizeBytes)\n\n    // Sign the data\n    let signedData = BigUInteger(Data(padded)).power(rsa.d!, modulus: rsa.n).serialize().byteArray\n\n    // Ensure the signed data matches that of our test fixture\n    XCTAssertEqual(signedData.toBase64(), fixture.messages[message]!.signedMessage[\"algid:sign:RSA:message-PKCS1v15:SHA256\"], \"Failed to correctly sign the data\")\n  }\n\n  /// Tests invalid message length for signatures\n  ///\n  /// This test enforces that\n  /// 1) The signature method throws an error when the data you're trying to sign is of an invalid length while using the `digest` variant\n  ///     - The `digest` variants skip the hashing step\n  /// 2) The signature method hashes and signs the message appropriately when using the `message` variant\n  func testRSAPKCS1_v15SignaturesLength() throws {\n    let fixture = TestFixtures.RSA_1024\n\n    guard let privateDERData = Data(base64Encoded: fixture.privateDER) else {\n      XCTFail(\"Invalid Base64String Public DER\")\n      return\n    }\n\n    // Import RSA Key\n    let rsa = try RSA(rawRepresentation: privateDERData)\n\n    let message = Data(\"This is a long message that if not hashed, will be tool large to safely sign / encrypt, therefore it should throw an error instead of resulting in a signature\".utf8).byteArray\n\n    // The unhashed message is too long to sign, we expect an error to be thrown...\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA1))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA224))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA256))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA384))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA512))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA512_224))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA512_256))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA3_256))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA3_384))\n    XCTAssertThrowsError(try rsa.sign(message, variant: .digest_pkcs1v15_SHA3_512))\n\n    // But if we hash the message first, then the signature works as expected...\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA1))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA224))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA256))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA384))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA512))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA512_224))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA512_256))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA3_256))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA3_384))\n    XCTAssertNoThrow(try rsa.sign(message, variant: .message_pkcs1v15_SHA3_512))\n  }\n\n  /// This test uses the Fixtures (generated using Apple's `Security` framework) to test the entirety of an RSA keys functionality\n  ///\n  /// - Note: These Fixtures were generated using the `testCreateTestFixture` function in `RSASecKeyTests` file.\n  ///\n  /// For each fixture in the `fixtures` array, we test...\n  /// 1) Importing the RSA Public DER Representation\n  ///   - Ensure the key was imported correctly\n  ///   - Ensure that we can export the public key in it's DER representation and that it matches the expected data\n  ///   - Ensure that we are able to encrypt the messages and that we receive the same data when testing deterministic encryption variants\n  ///   - Ensure that attempting to decrypt a message without a private key throws and error\n  ///   - Ensure that attempting to sign data without a private key throws an error\n  ///   - Ensure that we can verify that the signed data was in fact signed with this public keys corresponding private key\n  /// 2) Importing the RSA Private DER Representation\n  ///   - Ensure the key was imported correctly\n  ///   - Ensure that we can export the public key in it's DER representation and that it matches the expected data\n  ///   - Ensure that we can export the private key in it's DER representation and that it matches the expected data\n  ///   - Ensure that we are able to encrypt the messages and that we receive the same data when testing deterministic encryption variants\n  ///   - Ensure that we are able to decrypt the messages and that we recover the original plaintext message\n  ///   - Ensure that we are able to sign the plaintext messages and that it produces the expected data\n  ///   - Ensure that we can verify that the signed data was in fact signed with this public keys corresponding private key\n  func testRSAKeys() {\n    // These tests can take a very long time. Therefore the larger keys have been commented out in order to make the tests complete a little quicker.\n    let fixtures = [TestFixtures.RSA_1023, TestFixtures.RSA_1024, TestFixtures.RSA_1056, TestFixtures.RSA_2048] //, TestFixtures.RSA_3072, TestFixtures.RSA_4096]\n\n    do {\n      /// Public Key Functionality\n      for fixture in fixtures {\n        print(\"Testing RSA<\\(fixture.keySize)>:Public Key Fixture\")\n\n        let tic = DispatchTime.now().uptimeNanoseconds\n\n        guard let publicDERData = Data(base64Encoded: fixture.publicDER) else {\n          XCTFail(\"Invalid Base64String Public DER\")\n          return\n        }\n\n        // Import RSA Key\n        let rsa = try RSA(rawRepresentation: publicDERData)\n\n        // Ensure that the Key Size is correct\n        XCTAssertEqual(rsa.keySize, fixture.keySize, \"\\(rsa)::Invalid Key Size after import\")\n\n        // Ensure that we do not have a private key by checking the private exponent\n        XCTAssertNil(rsa.d, \"\\(rsa)::Private exponent not nil \")\n\n        // Ensure the public external representation matches the fixture\n        XCTAssertEqual(try rsa.publicKeyExternalRepresentation(), Data(base64Encoded: fixture.publicDER), \"\\(rsa)::Public Key external Representation doesn't match fixture\")\n\n        // Ensure externalRepresentation results in the publicDER\n        XCTAssertEqual(try rsa.externalRepresentation(), Data(base64Encoded: fixture.publicDER), \"\\(rsa)::Public Key external Representation doesn't match fixture\")\n\n        for message in fixture.messages {\n          // Ensure each encryption algo matches the fixture\n          for test in message.value.encryptedMessage {\n            guard let variant = encryptionAlgoToVariant(test.key) else {\n              print(\"Warning::RSA<\\(fixture.keySize)>::Skipping Encryption Algorithm \\(test.key)\")\n              continue\n            }\n\n            if variant == .raw {\n              if test.value == \"\" {\n                XCTAssertThrowsError(try rsa.encrypt(message.key.bytes, variant: variant), \"Encryption<\\(test.key)>::Did not throw error while encrypting `\\(message.key)`\")\n              } else {\n                // The Raw encryption method is deterministic so we can test that encrypting the message matches the data in the test fixture...\n                let encrypted = try rsa.encrypt(message.key.bytes, variant: variant)\n                XCTAssertEqual(encrypted.toHexString(), Data(base64Encoded: message.value.encryptedMessage[\"algid:encrypt:RSA:raw\"]!)!.byteArray.toHexString(), \"Encryption<\\(test.key)>::Failed to encrypt the message `\\(message.key)`\")\n\n                // Decryption requires access to the Private Key, therefore attempting to decrypt with only a public key should throw an error\n                XCTAssertThrowsError(try rsa.decrypt(Data(base64Encoded: message.value.encryptedMessage[\"algid:encrypt:RSA:raw\"]!)!.byteArray), \"Encryption<\\(test.key)>::Did not throw error while decrypting `\\(message.key)`\")\n              }\n            } else {\n              // Sometimes the message is too long to be safely encrypted by our key. When this happens we should encounter an error and our test value should be empty.\n              if test.value == \"\" {\n                XCTAssertThrowsError(try rsa.encrypt(message.key.bytes, variant: variant), \"Encryption<\\(test.key)>::Did not throw error while encrypting `\\(message.key)`\")\n              } else {\n                // We should be able to encrypt the data using just the public key\n                let encrypted = try rsa.encrypt(test.key.bytes, variant: variant)\n                XCTAssertNotEqual(encrypted, test.key.bytes)\n\n                // Decryption requires a private key, so this should throw an error\n                XCTAssertThrowsError(try rsa.decrypt(encrypted, variant: variant), \"Encryption<\\(test.key)>::Did not throw error while decrypting `\\(message.key)`\")\n              }\n            }\n          }\n\n          // Ensure each signature algo matches the fixture\n          for test in message.value.signedMessage {\n            guard let variant = signatureAlgoToVariant(test.key) else {\n              print(\"Warning::RSA<\\(fixture.keySize)>::Skipping Signature Algorithm \\(test.key)\")\n              continue\n            }\n\n            // Signing data requires access to the private key, therefore this should throw an error when called on a public key\n            XCTAssertThrowsError(try rsa.sign(message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Did not throw error\")\n\n            // Sometimes the message is too long to be safely signed by our key. When this happens we should encounter an error and our test value should be empty.\n            if test.value == \"\" {\n              XCTAssertThrowsError(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray, for: message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Did not throw error\")\n            } else {\n              // Ensure the signature is valid for the test fixtures rawMessage\n              XCTAssertTrue(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray, for: message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Verification Failed\")\n              // Ensure a modified message results in a false / invalid signature verification\n              XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray, for: message.key.bytes + [0x00], variant: variant), \"Signature<\\(test.key)>::Verified a signature for an incorrect message `\\(message.key)`\")\n              if !message.key.bytes.isEmpty {\n                XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray, for: message.key.bytes.dropLast(), variant: variant), \"Signature<\\(test.key)>::Verified a signature for an incorrect message `\\(message.key)`\")\n              }\n              // Ensure a modified signature results in a false / invalid signature verification (we replace the last element with a 1 in case the signature is all 0's)\n              XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray.shuffled().dropLast() + [0x01], for: message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Verified a False signature for message `\\(message.key)`\")\n              // Ensure an invalid signature results in an error being thrown\n              XCTAssertThrowsError(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray.dropLast(), for: message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Verified a False signature for message `\\(message.key)`\")\n            }\n          }\n        }\n        print(\"RSA<\\(fixture.keySize)>Public Test took \\(DispatchTime.now().uptimeNanoseconds - tic)ns\")\n      }\n\n      /// Private Key Functionality\n      for fixture in fixtures {\n        print(\"Testing RSA<\\(fixture.keySize)>:Private Key Fixture\")\n\n        let tic = DispatchTime.now().uptimeNanoseconds\n\n        guard let privateDERData = Data(base64Encoded: fixture.privateDER) else {\n          XCTFail(\"Invalid Base64String Private DER\")\n          return\n        }\n\n        // Import RSA Key\n        let rsa = try RSA(rawRepresentation: privateDERData)\n\n        // Ensure that the Key Size is correct\n        XCTAssertEqual(rsa.keySize, fixture.keySize, \"\\(rsa)::Invalid Key Size after import\")\n\n        // Ensure that we have a private key by checking the private exponent\n        XCTAssertNotNil(rsa.d, \"\\(rsa)::Failed to import private exponent from Private Key external representation\")\n\n        // Ensure the public external representation matches the fixture\n        XCTAssertEqual(try rsa.publicKeyExternalRepresentation(), Data(base64Encoded: fixture.publicDER), \"\\(rsa)::Public Key external Representation doesn't match fixture\")\n\n        // Ensure the private external representation matches the fixture\n        XCTAssertEqual(try rsa.externalRepresentation(), Data(base64Encoded: fixture.privateDER), \"\\(rsa)::Private Key external representation doesn't match fixture\")\n\n        for message in fixture.messages {\n          // Ensure each encryption algo matches the fixture\n          for test in message.value.encryptedMessage {\n            guard let variant = encryptionAlgoToVariant(test.key) else {\n              print(\"Warning::RSA<\\(fixture.keySize)>::Skipping Encryption Algorithm \\(test.key)\")\n              continue\n            }\n\n            //print(\"Testing \\(rsa) Encryption<\\(variant)> - Encrypting Message `\\(message.key)`\")\n\n            if variant == .raw {\n              if test.value == \"\" {\n                XCTAssertThrowsError(try rsa.encrypt(message.key.bytes, variant: variant))\n              } else {\n                // The Raw encryption method is deterministic so we can test that encrypting the message matches the data in the test fixture...\n                let encrypted = try rsa.encrypt(message.key.bytes, variant: variant)\n                XCTAssertEqual(encrypted.toHexString(), Data(base64Encoded: message.value.encryptedMessage[\"algid:encrypt:RSA:raw\"]!)!.byteArray.toHexString(), \"Encryption<\\(test.key)>::Failed to encrypt the message `\\(message.key)`\")\n\n                // Decrypt the fixtures encrypted message and ensure it matches the plaintext message\n                let decrypted = try rsa.decrypt(Data(base64Encoded: test.value)!.byteArray, variant: variant)\n                XCTAssertEqual(String(data: Data(decrypted), encoding: .utf8), message.key, \"Encryption<\\(test.key)>::Failed to decrypt the message `\\(message.key)`\")\n              }\n            } else {\n              if test.value == \"\" {\n                XCTAssertThrowsError(try rsa.encrypt(message.key.bytes, variant: variant), \"Encryption<\\(test.key)>::Encrypted invalid message `\\(message.key)`. Should have thrown an error...\")\n              } else {\n                // We should be able to encrypt the data using just the public key\n                let encrypted = try rsa.encrypt(test.key.bytes, variant: variant)\n                XCTAssertNotEqual(encrypted, test.key.bytes)\n\n                // Ensure we can decrypt the data and that it matches the original message\n                let decrypted = try rsa.decrypt(encrypted, variant: variant)\n                XCTAssertEqual(test.key.bytes, decrypted, \"Encryption<\\(test.key)>::Failed to decrypt the message `\\(message.key)`\")\n\n                // Ensure the encrypted fixture can be decrypted and results in the expected raw message\n                let decryptedFixture = try rsa.decrypt(Data(base64Encoded: test.value)!.byteArray, variant: variant)\n                XCTAssertEqual(decryptedFixture, message.key.bytes, \"Encryption<\\(test.key)>::Failed to decrypt the message `\\(message.key)`\")\n              }\n            }\n          }\n\n          // Ensure each signature algo matches the fixture\n          for test in message.value.signedMessage {\n            guard let variant = signatureAlgoToVariant(test.key) else {\n              print(\"Warning::RSA<\\(fixture.keySize)>::Skipping Signature Algorithm \\(test.key)\")\n              continue\n            }\n\n            // Our Message is too long for some of our hashing / padding schemes. When this happens we should encouter an error and our test value should be empty.\n            if test.value == \"\" {\n              XCTAssertThrowsError(try rsa.sign(message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Did not throw error\")\n            } else {\n              let signature = try rsa.sign(message.key.bytes, variant: variant)\n              XCTAssertEqual(signature, Data(base64Encoded: test.value)?.byteArray, \"Signature<\\(test.key)>::Signature does not match fixture\")\n\n              // Ensure the signature is valid for the test fixtures rawMessage\n              XCTAssertTrue(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray, for: message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Verification Failed\")\n              // Ensure a modified message results in a false / invalid signature verification\n              XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray, for: message.key.bytes + [0x00], variant: variant), \"Signature<\\(test.key)>::Verified a signature for an incorrect message `\\(message.key)`\")\n              if !message.key.bytes.isEmpty {\n                XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray, for: message.key.bytes.dropLast(), variant: variant), \"Signature<\\(test.key)>::Verified a signature for an incorrect message `\\(message.key)`\")\n              }\n              // Ensure a modified signature results in a false / invalid signature verification (we replace the last element with a 1 in case the signature is all 0's)\n              XCTAssertFalse(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray.shuffled().dropLast() + [0x01], for: message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Verified a False signature for message `\\(message.key)`\")\n              // Ensure an invalid signature results in an error being thrown\n              XCTAssertThrowsError(try rsa.verify(signature: Data(base64Encoded: test.value)!.byteArray.dropLast(), for: message.key.bytes, variant: variant), \"Signature<\\(test.key)>::Verified a False signature for message `\\(message.key)`\")\n            }\n          }\n        }\n        print(\"RSA<\\(fixture.keySize)>Private Test took \\(DispatchTime.now().uptimeNanoseconds - tic)ns\")\n      }\n    } catch {\n      print(error)\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  /// Converts an algorithm string key from our test fixture into an RSA.SignatureVariant enum case\n  private func signatureAlgoToVariant(_ algoString: String) -> RSA.SignatureVariant? {\n    switch algoString {\n      case \"algid:sign:RSA:raw\":\n        return .raw\n      case \"algid:sign:RSA:digest-PKCS1v15\":\n        return .digest_pkcs1v15_RAW\n      case \"algid:sign:RSA:digest-PKCS1v15:SHA1\":\n        return .digest_pkcs1v15_SHA1\n      case \"algid:sign:RSA:digest-PKCS1v15:SHA224\":\n        return .digest_pkcs1v15_SHA224\n      case \"algid:sign:RSA:digest-PKCS1v15:SHA256\":\n        return .digest_pkcs1v15_SHA256\n      case \"algid:sign:RSA:digest-PKCS1v15:SHA384\":\n        return .digest_pkcs1v15_SHA384\n      case \"algid:sign:RSA:digest-PKCS1v15:SHA512\":\n        return .digest_pkcs1v15_SHA512\n      case \"algid:sign:RSA:message-PKCS1v15:SHA1\":\n        return .message_pkcs1v15_SHA1\n      case \"algid:sign:RSA:message-PKCS1v15:SHA224\":\n        return .message_pkcs1v15_SHA224\n      case \"algid:sign:RSA:message-PKCS1v15:SHA256\":\n        return .message_pkcs1v15_SHA256\n      case \"algid:sign:RSA:message-PKCS1v15:SHA384\":\n        return .message_pkcs1v15_SHA384\n      case \"algid:sign:RSA:message-PKCS1v15:SHA512\":\n        return .message_pkcs1v15_SHA512\n      default:\n        return nil\n    }\n  }\n\n  /// Converts an algorithm string key from our test fixture into an RSA.RSAEncryptionVariant enum case\n  private func encryptionAlgoToVariant(_ algoString: String) -> RSA.RSAEncryptionVariant? {\n    switch algoString {\n      case \"algid:encrypt:RSA:raw\":\n        return .raw\n      case \"algid:encrypt:RSA:PKCS1\":\n        return .pksc1v15\n      default:\n        return nil\n    }\n  }\n}\n\nextension RSATests {\n  static func allTests() -> [(String, (RSATests) -> () throws -> Void)] {\n    let tests = [\n      (\"testSmallRSA\", testSmallRSA),\n      (\"testRSA1\", testRSA1),\n      (\"testRSA2\", testRSA2),\n      (\"testGenerateKeyPair\", testGenerateKeyPair),\n      (\"testEncryptDecryptRoundTripRandomIntegers\", testEncryptDecryptRoundTripRandomIntegers),\n      (\"testRSAPKCS1_v15EncryptionManual\", testRSAPKCS1_v15EncryptionManual),\n      (\"testRSAPKCS1_v15SignatureManual\", testRSAPKCS1_v15SignatureManual),\n      (\"testRSAPKCS1_v15SignaturesLength\", testRSAPKCS1_v15SignaturesLength),\n      (\"testRSAKeys\", testRSAKeys)\n    ]\n\n    return tests\n  }\n}\n\n// - MARK: RSA Test Fixtures\nextension RSATests {\n\n  /// RSA Test Fixtures\n  ///\n  /// - Note: These fixtures were generated using the `testCreateTestFixture` function in `RSASecKeyTests` file.\n  /// - Note: All values generated are done so via Apple's `Security` framework (we assume they got it right).\n  struct TestFixtures {\n\n    struct Fixture {\n      let keySize: Int\n      let publicDER: String\n      let privateDER: String\n      let messages: [String: (encryptedMessage: [String: String], signedMessage: [String: String])]\n    }\n\n    // An example of a 1024 bit RSA Key that's actually only 1023 bits\n    static let RSA_1023 = Fixture(\n      keySize: 1023,\n      publicDER: \"\"\"\n      MIGIAoGAWLOVh+J+wTEgOLuM+vWMeBZJTH9M5j9QgwmiC2BaVNeoUyvyw0hm/b9mXPvIP209Ml0F7mm1c4iWZX+7WF/YpML3S682IqY3sNbxg3rZRn36FvEnltiL+ZpUStXPe12p397KkdinrHbdVohNt0gXQQjEN6m26xv99nitPU1XcjECAwEAAQ==\n      \"\"\",\n      privateDER: \"\"\"\n      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\n      \"\"\",\n      messages: [\n        \"\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=\",\n            \"algid:encrypt:RSA:PKCS1\": \"GrwJv13cGvyLbX02dNMEuRYPPGiP7xxNi4kqPs/OHRHkHhA+4WmIZ+aYfOMlFdoNELJdNAr5lBrr6pwiEV8WOyp0Fnqql78qKIj8YvqDiK6ATUUxuZmWBQ9LzxavIulWeZg+/VqJSMKE3FEmpKkXWCkAi3SMo5l0fgE3CTe9luY=\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"C+S8K4B+W3eM/et63v3nwRsh3ATZJ31bDbl8qhnJ9pdF6So85GzeHPQY64yzRfp4oo+JT4W0WZAhNOi6u9NiBbhdXUPzyj/89rTSYmMEi7tiIhlaoDQV8X+a8gVTJqfM44xAaT82DYLP77TBUjDJEG9WIWKLTBx1EytkvtamRpM=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"Pd0odftcQWd47zlDNmfQHZMdxZPpC9gmivXOfNxOxQ31TXU7g5lglVzUMrykz4YViffJtT6v4MC5J3RRk9a9INJHCpM8hHPx8IgtQiNVN2wHOMB16kFKNuy3d9DO4v1Qklg3MCntzGZUB057UNCwLuvKXc7P5ZwCXPt47Q+P3wc=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"J7/kWa5xUBIKdxLSmsOINlrDTlXLr043xbcH62P8mDNHIff0CHDvZOQHU/r0+lAdtlzB5l9jLOLR+hkyQ8reBL6t2jWyfKPUAVKyUJNT7zZfEfFaGtBi3IK4nS1GQKj7JPJ1d0SCWUCTX4SkLn6pESzR65YI3QIJK/GG/nxmHkk=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"FdkW7WKOlEIBkGSZfzBi9gsS0jFy++MDeZXwe4pWgR6S4J54a33Ws3uwQwnOW+D592IEq1QG4h+4pSmuusNk5tQ7w2qCHbbW7sTZgzWVgpF1HfZ8c0xAkd2oWzw2S8/31iDDromo3OLsaa6C+69bhbqsuNwgkvyKuSxyqziZWA8=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"K5PyLy399mIrI3avLx8T2FwIOKYjy/crsN3VH4GZaFprP4q3xdw9a2ldlngnkfThKTphyS3CCfpACO8V7pZB2Haicre04tgd6uqYwMMBKWTHi4VVIzgwS+SN5L/sC3d4Gwoh6Y9xtUyAbB0Do/s30hbFE8bGC9KV5JbnUairRB4=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"H4sU7sS/hFlrklqN86CWg6FHlF9l/Ll61SpS7wF1Te6Kj78tj1MZd7QMlVKEWGM7RLI1/bkqcTcNzoLGqh1zLI1sg+nUzEqJnx6nCyFT8Qy/V55FqC3wLVpICe99SewDnMsAQiWTwVpiIiwY0vqnS4r+FlCi5Rx/midH0HrzJ3Y=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"JEKtxjsHSejtvffWGafUqy3SjH2EVC5rmSSpz5v3IfPjIlVJxiiCRr7gDwaFNgfNiS4ZaVWGpw7hMeduP0RbsrLezS3hKtaRPlpIo89ET6QpDEjYnlDAeyVZQjgO9EOvkCCJ10FotsMRYJWoipePnkqHDlV1bf1wVh599iOMNqs=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"IvGyNwD8S9eSJ6TyxYv7Y/g2qOvpbcNem68LI1R6IlqBlTFz7xGpdGriLQOUC4AJL/O6NB1AtME4wJVQ3fKCDlSsASy6EGPtIdwXwdijSb5NkiR2AlxcWCBMFuNHlEpM9OrhhaEows4Y1W1k5l0ws4vbYY4/BrwceIeGSLKDux4=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"SavoMjikFHGb/7UOFVI6+FCr2igcsM4esTqvBxeFhHumFGc7Y28fJXIZ1gvw5oqYdj2jCL5okjBUVVnkUkY2TvokN7GHAt0KFdv6F83DdLCwMwaGURgfiAxfPw9kDGoDkqhi9bUdC4FTtOLaK6gVrQzIlqUugGBTBFKySwqdqF8=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"URo+XyJE9cFziAeXJliysj0eO629grgTUYXRgrEOA3B6uIOyh0CFZPi/pKpJFhjGJrSAARDzfbH5AbftEo/C3OSOYOVYsgT3ictJBlYk6NsplouCd/CnkdECi3NBe7MIrsp9ekZzkfULyNje5Y8tt1d0PfAgHNV0VHASxqVLJtw=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"DslGHod+WHWpUFKLrVU6mdJZh7KPE8E7IMPaBMEs6hPYHdp4Yqmv/2jiPBcnqgIfwTX8A5NVtUJ0EQnjVhFDIqYQXP5AplzaD33dP8IEa8ZhIOrBjfqTZs29ApLrSaPxiT3TRP9Z0FMLXCzU8E5QJuQSomLkpaaHIqyMOzyqWTY=\"\n          ]\n        ),\n        \"👋\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"HXPOd8MFU57jSnCPj+/mAvzfzjOEgZltWxp3Aek/hhfH31t3wgaB8JQ/A502umjrFlnBupMwQaQr9iJOWYKTFClfDx1T+BFUJfnH28I1etk8DeD3lEiPTMuV/caR3bT0cxDA2TKeMpp4BSOX7iiC9Vd3WaOMH3xbH5UYFUbEdHg=\",\n            \"algid:encrypt:RSA:PKCS1\": \"Pi3h0pakf0/QanjJ0mM+AExhqPYnGFX6Z/fji7z8cX1gD8eIUyk26u4opDjyVPb82JOY+ulRBAUlBawcd1M2aiY3O8Bhzpn2awEy9Ps6HWUa9Yp4Un3hLEmySyajb8QdUko0OWzG28cEoInGiOgoU7ko3excvcbHG7O0aJG3FDg=\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"TbQzWXDIIX3vir2A8YPSxBLJsIqc1EfydyhTcwSOvHPtKbkIS10bCbtrN3tcK8W/7Ii1VluZbQmf8rQjUXgVAF9s7LNoDmtrHp3kOBUwSBT5ebbr/OIskwVdt2IHoNyYtOFlx8V86LJc6HSLYAfQplEBQfVd83D8EjK6DHJJRWE=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"KJNf91GcrEFS6DZrRhqs2WlVJrJl2Rxmuf7OaPT+ymTDyUGMvGsfM3MGlousZAk0Z4HvaoJCKAj/cc2UecKTM0tf0q4RaO12/qSDM242Max5MotBVVY/LihV0Vv5FGLX4AvHkDCC9W9nC/jDSGMfGSzLqbCI/J4ljxcFrJ6zWeI=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"Bfn8f0RrkdJynMUp8dHWzpAqGPxuI5dKySwoXOmXHtGcqypvv6mnBwzURwIXq6dRA5wL8/GcQ6GAUkPLyQ7mbpnjKZEf0/nHfYkgNkihV2Ay/VtQmvpwwnrtlDWmd6s/a3eLACYZqiNOmNQan2jPTNCbQZZ1idP6ilv2GedO4Qw=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"SZN1dw+SCGZUI5Ue6x2rK6giO9JdTJozEkHXu2DsE1d51iVOHD5eo1PXAgmFRpkfV9DTzEckFViVP3G0BE5H3ZPsem+HyB6+nPuAVArqL7T0JBUzHgZ4T+vThfvMJzExcDISLK7gwc9NOTwIKjePWBoeTv9u+CPHVkxFm2uF+lM=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"RghR0cKvs4hWc4XS++IPdAC8K7fri54d8fxeOoWXMPejVh2AZy9dOxKJm7+NBMJxymVODrxa8JbzKmJ4h6agMtCwH2B0f/NJO67FJFbn+RGsxG7MfvVO4z2Ejy+IOQJEOkIRTKxvwtRlUiJBgiQfdmUClPzd7j6Og8fGMumWFSI=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"RUgGeY9N6zWP9AfU3gLz8oiZaoyH5fvKCULX6/HuqDvSa2Y06hayCo7JLoCLDuLVxMvg44DobR7z6j1Ur7v85Wqv5kPTAAIiGNKEnt90Hpqn9f2RzrTToH6fnQC7ZJ9+e5N72p57fqIjZHlEnFk7o3XuEqpivOKZiSCEwo4KDS8=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"E9V2lyhaDyGWFnCKROi3kcPr8QG2AfCYSSa9tyj8mRFUmjnNyghpUW5gPDCy6nACaUnPOxvB0trJUD+irvvYD+7jr+VDnxCeHwe2ZE/ize0vvJFvtLSIAGGUA2aXTU5CohNvNnJs1wYSIWYVrWkaU0yyA8H73kKzsAcAY1+KSnM=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"JMui6+GXCll9KJ+G0n3XMv5Sdz0PUQY6hDMlrygCdtFiNgPWfOTko/Q88RVHFJXCw7NHxyae6G+IPzvve2AQOEP7TdrivACM3C7sqchTWKEnGV1DbZ9r0f2EZjQ7VPM90mnmxG2uDPyrXTKUyVvTTH/SlYW+Zt5NO5TNf6KH2GY=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"VIP9zszWW0M9IvkCeMaNrgd37kfDI/fKOfSCeK40XvcTYyFuNlSdYhaLzxxK9UHcpD5nQR3UPUMym15FQZb6XvDb3ru5f4/BmeCmMdn3J79izPIZAH5JvyY7o6AjqnW/1SjbIn/0sCVuw815hublKifT6A/kxT21y1KxgUtKAhM=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"KE1l25Ld+OvGwxDcww7PUPXWhHszt55YZfSA2jG0x5MCwkQvxkVvUIb3b/fxXH73FJ6stKO7WR47ihnZXzjOv7si/AnxwS/j4r2yHC5bTPz01NqMHbNZ0eAIzyiAl3Lo41njLn/QdopFORE88S+G5OUgCaA0MfmRyncOrC+Qy6E=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"NP9G1fQikdVJNqxxsLetyAEEIgiZ0AkOWSulSW3Azrz3koW7YLoDcucP/dj7oBtRNmpQ2YD5J7JLY4Ty0BdxVt5nekBVTgrp9kuChqDKAJALnU1CtpWQIDRzeX7uoEytnjdo2No35v0EaFdy7h6i7c2ipMMB04eSz67X2MsD7Ro=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"B3ZgVLml8rkRPyYFbIjZ2ZL4+4/qkGzoHrlOCofM569XLzkoImKSYJ4viCFCRJxMBBg/hxBRLM3sSvOlCXAXdICHegyeJ6glS6bD3lzd5LWXIeGTywLd66tR263D5gFjR1Z8HIPBeZdSlDdLDHTFVa3uclyhIy6zHq/OxN/LMPw=\"\n          ]\n        ),\n        \"RSA Keys\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"Dwu3Aq+tmYoXh2k9RzP30jU0Q9BgzLHVsJfiuGIi34BG5wqBr5Zow8FS+6IGuTdeS5jXBi5EAY7VbmqfW2/L5oMNQ+C+SYqgaVDBXe9a6xT5f7irgkpm0wa/logz3ybEiH7eqs3VfZgwV688PYUr++aHqrti72gd/nmLWLaHvIw=\",\n            \"algid:encrypt:RSA:PKCS1\": \"HY9udxFzq4HnQsThVd+WvJjveDONZ7IYZCBAD7IFDT5o1fTNrGFKtFXfk2P76ha1tz5P2mKHVkDjaPDd1M6x+RvmX9QMMfrYb3sbu5J+/K1+vZ8bSwYgO1ou/IW0T0KhZ7lkuCjZ2GIm+F5YNjlE0CXox5a+DhINF5RJeqD79W8=\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"ItiEkbOcx9MPot85FYOFGyxLA/dyb4Dpf4sv/rFBeCaxSJKIN5JSMMQ5DKy2KKVlQY+Xp99TgInXPu05KalKck3LWjLggdR0b0t0XvEfep8rLzlHkFoaQaVK4y/JDdwVYUoZQ2GYUGCBB1TS0UCfXt1H6HIjy/R/7zVcPpNEanA=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"LSy4h1tf7CtIZt3YusIwYMgciuRdmsMXZfi3TMwS07xMJWiGH3MAqLjSpoxJxn43hnzqXmIfvUOc6ps1hwoBF2zJKVP6VQUiup01T3uQiH6gjg1kkIzrsAmUhwGHMRkgpjvQgb4PcqUXFV6j5B00rUlMZq5IrJxeFIwdsNep7TE=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"I1+a/1zhnmBWOVkoHeRzKb5a/J6xJN3NhnZLduUStMgS/Nm0SV7kEgalYJbVGMIh/kXDQ8BY5lXuWrfOjjisgmSOo5NxRfOBcXxwpmRKstGi7/lDAs1LryCBWajv2hyPSEAky3nih4+8xEhUrjAoWd4shSd7FonUAU027d/AaHI=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"T8JXiB0JlDUC3K8f7NF/h4t9lpc+QPFUUf2AW1nk/bMb1dbquLe2O8AD8Ylfu39g+ebA3W4w/2hn+tkQuVQGMFkZbhrKUUdx/FVVZJveIYigTHjSavM4zJfkdCyiu45SOaY+x7D1WeJHsTbYLSc29qfVZaac9LYCHan4oShnIBY=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"F1rCz2wqbs2JCBEAr4J6xyX5d/xeXaGbL8G00dpn5Zz7i0a7n7avBdTHTdnvCtxaRa2bQtxSsQ1KsOZT3BrVJCKrtcVYIf6t4OKP9tpjh2BwT/AA5Urvw2DDDqMtlwZdBEJxGYLumbnHxUWrKfBzSHMTK2vbwJ19IY769eLfvCA=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"LPRFTu1T5BxGUp3gLbsR70sANSnY67f6vhGvRIU23KE7dUVlHWkm0rTeZNif+LvNWL1suxBHI6fJPLkHfLRd/CJlBOIOzOvvifu4kEX3VIySybp4/fEdBXlJnpVzTdVzHh2hifkWme+derDBJRcXGVO6IcHpJl0xhXxDaTUfMes=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"FQToDphnuXKEDLtEJU0CSf7DgCivkzJLbNnmxI+jVajklROaM+h/+oQcDPDohDbjZ6fsici/rByLrkjgCAcHYTJ1cRzsGG/QIbXGLwjebl5nBD3NiC50Yu800idYmX3BhMEaYhB7Ce6xukJ82/DmCIq2fdyV/usvUJFU7pnRziA=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"UQ73vHah5CXieEVXBmg1SdcVOfO+nj8VyLH8m0b30JCFry9MztxJot5BZZHNGzMbvDHoNRA8ekMgj6bRwrHpr/VwuypJ4IbM8n5C3rWdJSoTfBBPWZeywJkgeo0LzTVTlxjBsCHJQiIBsfIwinQMGARfV/yJMo0Xfk4C32avkP4=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"KU2uKP0Y21I6xQZrIOmSvZZJE/YlU1sNis/y0szbqbF6T9gFSlnrT7RIuzfm26uWMH+d9jCuq6wRRMoNolEhLJqUPzq2xuR5OwSm++U6o+d9OW1AqWjkwBqVYeZKa6WmmXKAo4Y+sLPR2iH7oqUTU1Jfzkn/3u16nTYK7WkLJUQ=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"F8Sdbd9MXz/nigx+honEk/anKLyuafO0H2+fNmkG9Rb3V9cyh/Iqyo4kN7YGXWYHpzH/JSHiUNOFOlVxsA8vQNqFt+V08z4XSaHsFMmN9gjJBDyMTwMibSxqzJPwqV6cWjzVYj/78RdOt22z7Gst5Vrc0sJIob7Lvz9Q5UteAcs=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"B44iwunbuMkEubxni5MM+T40O9/QoY16ykiWIUW5efwpa9WGbEWBVTb10Se4J0qVh0w6J+FG+xt2qaB7DDr2IInbrB5SIKpIngZtNqqE0n0AaD675N9d4nTonf5wWVXvooKOWJf4zaX4qtAvZYKoZs9JiBVbmPXNLvs013/+QVw=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"PndOMnWTZ60cGTDbIwgfHtzl+6Nmhu2Ec7KPvRtPnV0UhI2Yoxa7dFLz6NQUMUkf0p1cDFEWYwAhdQrIzUROoTr3p9dCEoxf2eOFV4S3aEdFGDy2nh0WpyQ68PFizAgSTJpT6ePF8u/1d2npPpl2P0fcsdU3MlOwaUVyxkF3ngk=\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys!\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"ALMTIQ68Jm/8xrjuQE/b0USTShPr1sCX51EVRyheG5gKr8HqZ3BUWADdpB3M5D33A0QCkKqp5NMs3qNvUaGspHTAUnV6BvWuX15kk45P/ibw22n64SP8Y2CU/tGCc6Rf9B5DJ7OsL5n7pZKAbF2sKlPx8VEyFbwXyUPT4cao6bY=\",\n            \"algid:encrypt:RSA:PKCS1\": \"Tav12GnF3OKhnAkZgSa1Nso24C/+qwXlXuA8BcXybdWAyr9D7B5ACn/qfYyoDOvUQSnDF8xCPrUTsxaZ8HaKb0u+620QA57ueQdQLSK0MEFmwdOIQaPGKm3KwyIXx6APkeij+RA4yNjmzIgQgKQoQsmoBOa01mMr5teFnVO7c1s=\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"EIu3l9qt9AyHoTSE5oHM4wICOrY5QrGJkLsbwewA0SfwRFEhmwgBD2tbQ0tK6o8Fe5omkPwoh8fOFCPInTD4r9D3bU3mFSFnaEGkDZAQnVL+0WpKUnMJggDBoBY7Fz7PwqTKVFGPw2ixfK4IoHB6t0qfz3Q0eTO5xzRRtj9XZ98=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"IRFLtTvPhnF/tC7gYCKrhmC0xz9gYRXsBnJtg7yRjv8mRYCDM+xugVDW2GBSRdQRssQBTcXg6mYV6oSR+nlqU4vkf37BVbHSrIfSGWFOZCqkGioMaswjtIEUR10ia9s5YDH5fVk3vsVXJw9s730jAYW8B1T8PIvMAj1Xkzr775U=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"DQtXIwKJHPnR7vG+y10hrnAt/C/g5lMoo7pX6Fqeick9mfGU4tCY4/COUdSUOOZYLacA2IhYAbgfNW1P5GRB3zELc3mveHwIVlovyY1FOhEwzbp+S6SRWP9dmBjGlswpmDvvQ7RUrykQabiPYnuqYdR1jhDbdWx4r25vF+fGhn4=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"VeWhPR0yNYwr9ARUgNEdB7nWtYE1ItUTPupPT/1GEkGD4JNTi0wZxcuIN/Day2QhbFxZ/jDR1L6ToX+mcfT2pcpxAIfJsJQmmj5ISvbrp4zr0Q/vnIwv75BqL2geMx34raQOD5If7HNEYJrHBmQFwq4aKih+e5ADdV0Re9hC7Ds=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"C6cOQd0Z5F20L+ZV+r6WdElB05WRBSqh+lFgR9yDt/kAR/5FRNaJ9ZG00+0NiVZRQ4fj4SV+SBrmPzBfk5TYJN8BQW1QPc1GFj798/aem7qYQySAv1Dd2v1CRhAg/nW+UbK3YfE/68P5MsaSX52dhJfV1+DHVufZytdmHlOgcao=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"URJmACamzelP7FmEIZ4nkymu/jF67VBByot5sscDVUGCQdwDntegCqBPrXJFb0bbT+55dmRCo9E402mMRTLEF4y+Gbf+yFpKiPxkHx8jGbs2CwrFUhlKCSOALV9gGz/QkgEm0vWyLNu7a0TL/fEipkHKURE4dcR0AZhj+1UCiYE=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"B0hA+iRuN8sVDLYPn2365eCuk5qv/TbfXhqwk4HKHWHDHDu4/f+lSX9AS3//ZfWiJQX1Kz8y6QJbSmafr1LgOxDDLS9VpI4uuLYPcW8HLf54euzHADF5Kh69VAUeEq4f+8yF2su9mut5x9561dRa8iG+5+rIIAJ48RLjAzzV2Lk=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"F1B6DPF65vdORuS1mTBRNUW7FkF0pA3iMaU/VTWRomKRG9ztomelprDptADWLbZY6DRMQXSHfZM2wXBLPZGSlF8K3HdDB2xEe5VzZtLyzmY3K118W7jXU2JQ7TUG78aCPFDi76/IOSQV7jwLmMy4/akYILnDVxStIydMzw7uZlA=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"E0SQoSKJj1AMlyz9oy5uETbNhnfVqIogvtugXOmD+KouX8KsHZpJBUj9+MSJb2vWuDjF5qGsSaDGHHkOIEZROCxHyStYIOCtofPMIftov/yXJXTFhNcouYgQk9DD8yzeFII0+rf73or7Q4C4SzlPXF3Ds9kut+7Ozw28o1iwT+A=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"Fe9Hbg5FhjN9subc+TRovHrq5DHncrZRkSswqy6rVNgoBKPuxQsbEP+QgHZqg3zgTA6mo6R+icMvDYcUQY8X5F0pcx/KqSTCU2n0Ec3VrxtngxXoe96ra04aEfwToIWybFslC8Bhr07fg24PlZEwFNCGm4cVEaQNQD+GeKEiiJs=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"S7GstJ9uVW5I1NIgMeF2n6JA+PpGLXFJmLTAqjpnyAK+et+YIRoRA/bYTftnXxMU0wsUansUXxXOs5nBrGf+rdtLLTgzIrt4uHsUB05Cl3sTBVt7p9tK8N2fxpw/4F6Syn9zvxfjBJzKdMYrZw3BtsRHzXO7SfqfayRA8oQfk3I=\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys are really cool! They support encrypting / decrypting messages, signing and verifying signed messages, and importing and exporting encrypted keys for use between sessions 🔐\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"\",\n            \"algid:encrypt:RSA:PKCS1\": \"\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"G5neBQbE/ctrRD7Yr2DIWDSxd39WJkKnym6dEkyFq6pQRsipNdGTCmwnjXXRXcWM6XUJG4htvaEnz+5W8rZzZ3fiMuZgRxlA5FpbRoEwvnArYovxgQFiazgRi0CGu1nUpbfgwkuSTBxERWUc+l4jImcWeqY0YdFEXDcADqp1gmI=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"JlmRNo9gevd5XxX8FsnZKSjHeZNxIkPHzKnSMBhFjm15Y6QBtcStIkAjg0wbmcxqX5NX9DAE29t9+4dluK6HXvi87TBBrsrXtMzm1EB247+9224eu2y6kghFuPW5lJFITIUdmxyKT/14zR29OIfEdCpnS9zjmZ2TdOXs7bZlJbg=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"Bn06v122hbYHG9Q8egUW7RGV4cDK7jf9EKJXe4ydpjhNs8pKLIhPhnS9ax9wG9IJWR+P8n7xwGxfFNdSmcrWIfSbbYat5/jaO5718voNC7+bq/N5g2mzzz4ugRAFXiDbFlA5pWBaAZTE+XwxH0pSg/5giC4RFi2qN28ihvWHyOY=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"NvxOxIy/szgB5p+CY02JqM6ZwJLvCTLYOpn4xkpBO/kxXG9NJX9AheD8T7mwEiMQw8dyQ200oZFkyUDFjBoHNZy8rXRf214INpryypjobte9oUCju70v3g6Z/AMkSetJqBi8hxVpm62op0Co2j91pxUYXvO/XVpvdB/6dY2akO8=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"K4vWQj11zTxyMsZG4XKYrMqdxYZ7XxRBNBREeYYlL5xGOnRdmW+m5ZPh0h+vRIa/8IEPoyd2fvCBOUtx1euNQfPD1YT1UzxEr5ua3cQdylCWa8ghfCaOeJuhhMUFAqhjHQfK1NBtEH0bAvvw1XcxLRbTwupdPJjAFGUfmMjfMZw=\"\n          ]\n        )\n      ]\n    )\n\n    static let RSA_1024 = Fixture(\n      keySize: 1024,\n      publicDER: \"\"\"\n      MIGJAoGBANafJnOmd7j9o05NFzmoOaPJ5tvKMOybyNQuTdElOI0UeUu9FFAKBJD1ClT1WMuyDzIEZMF3TJwohNnkY7q8tnuTHdO/f3Il3b/1bt4QGavVwnrLbalaJgFmnvaLqTs8dYu3nhcUZhWI+eKjTZxjUg1LrGJVbGZtbjTGPvKcvjOfAgMBAAE=\n      \"\"\",\n      privateDER: \"\"\"\n      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\n      \"\"\",\n      messages: [\n        \"\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=\",\n            \"algid:encrypt:RSA:PKCS1\": \"\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"yAeKf1vJjQ/1uVxOZB7sCPs5cbN5CTfXkhqFZeFJgahjBgmb+hs0GmIdRjmlgTWAI6rH1Ew56SkiJgkzL/7RbqWvUuqPsyPz97NeDbXXSI+NTy/7W0KaInF3YdR3GSNAIMHy8qFLiCeXNFY+6ixuwFeHCOQrTijlBqtZB2g3+e0=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"dsQr0HbJ5rl/fPLmVPLgyTqk58T0mU7C2gyrt7qni+AFsvdLNY0gIyLKC9hV22ChfFb9FHDSZ0TAnfJV4F+OklAYaGYhAtYNHcdohGN5NkA0P7MN88AoU3TWculwIFdtmSgewZZxED9aaddo9bbUreecaPvzfrJkdpC3qQY+3QQ=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"GMGv/t14qzu7Hl9JuCDCPwJIs9NGSI3ObVHucfT1VD6nvfl01oSmUx5Z8YFG4xh+eTfX1yFwuqo8h8Q56v0Mesy7h0ZBR4KbvITir5umbnxOdVx4CSUG4GBgfd5n+xzC8mhMkfFbzgZa+dDe85XQAfAIY0OBwRb1SMkRV529TWM=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"mbsLcVYBBPlvcpSxdOpgoxla4N1bvN9LYuFvsKiNV2vFZQkv9aFeGDTwesz0Wh6FTzObuu63veZfCAKS+WYkEXBmoAJ+ZqAmYhBDEtuFPUyP7X0xK6ZRL8x1CB5qEN93k1eYRe6c4lNwTK1wxMIr7ocfBlIwUjANK2ZLlvInDMQ=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"RxSKRd/lot+Ba889hCuTwjBUt81jiGmAf+0MFttzum/fBcyhy419n++mzPzVG1CIZtcBS5sXdd1gqJNlve+E/GG0f1/vuLWuursM7+IqWntukWk+v6zmmZq2S+skuKsYZJfDTkOpzfYyyARqWWL9fweut3nwPRSjOvl5q+kgZwI=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"h1n6982vnm9JwiLFOsLLlBmnEw6RmlR8l+XjQPUyUaTwBaXf6jpAORfNWarWcTR1ZG4DQVvfN2lFyP9mkMwczXkV7kKl3kDMxqZ6DrFL7GLmDKh/xRvglNhK/DxfOV+6PmMhzHLa01Mz424B0IX1uE+nN+XknGwPAQ+qIKKOJqc=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"A30eJ8+4ldu7KRjdWy6hvaXaP3HqaR7vq+/k+wm38PbjAI3YkXZQniOm+q6JVkYSfy7EqpnMvU5xiC5gkYSser579mE90ZwJd2nNO34DzEZYm/rAZaEYB/EeyIDH0l8mrAy5BTG93HSa8EbX1hvpJ6X/LfalwJWI5/eoxFczrYg=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"JQ48KbGEzM57dvsBF4QLJ9hP+U9fJPZTSonnls55viRTuWToupY93vGfcZPRL0LoS97Twfxt+Ax13k8Inu9kJJyjPinYE3qgdifUTlTUtZJmSfKUD8L+/B+fVbeJ33znSxepBOu3zevOSVIuDjXlIRrhs52oGtK6/7N7D12pXsQ=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"ZlSnyMd7IuUE3+9GrnxhCZvUC6xaWimK8TCRh941xq+Ae6Ofv3bNc8p9IZBn+mM68Q9TX7PMjniHTK7CIoXvLWQx4e+nOPZXB+m9NX63yKxmXtC/yMRo2F+FG/ywYU6J0TLuOov58ULqoIIroUDd+aZZqPnIC0qI8i6/E/DiExw=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"yFltWqqP+amkWRgsc0IMvDYC8uLiM6E1UydMdwtnuMidWZxBSBu9M96YcGRKTog1jcWNcTQb0Ly8uyDHLQO/sCBSR2H1vGKd4wl1n6xlBYKQZOI0b1VQ8c1JKHUpSkquVDTOHPhdpzTMD9P1F3AcGEF82BCSwxdNDv4Asag2JnI=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"Zv6PL+K65f4MCWdq6uVpfiUh8U02aqoq8uUPSFJiwE+a9SEGRa6FC+Vk7dthMVi8r55JCvXLbMAzd97kw7OXlS6cs42hi2tzoUtewflbdTQyWj5M9ruD/fQtdi6bSXXHbbZEnSwkSfhuGT5DT7ysKc/GAnrIkP8Z+Spzp+CUXew=\"\n          ]\n        ),\n        \"👋\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"JpNi0ZtVYGFOqzMm0jQm5xLct3JDlizrFOoaOlbBOsLogq3NvkwTS6eiqI39ldbFomTkQeQ5DUXGGQacajzgdi/jPpEs/17poRI5v8xwYytDzsLrF/vjRfdPSbTTsO7WEsFHGcUUrUKt+1jtM0vLBc8aCkkElkIs8TdmddG6jrI=\",\n            \"algid:encrypt:RSA:PKCS1\": \"ALOEqjLmjgezAhWo1EsKY0c4rczVDeANjrLp3KAMBiXMkbgV2B3nXttY4qtb/B5nYa2iK1G6XJ+72Yi/9lSJoIaOUZ2JfmhxNGnagXzW9d+NAnt2VIxlUMdInve4gH0P+bKUXtJ4Y8yIx5S0cDgDEaNJA8pGYnFFu/2+ZVfg12w=\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"N8EyiZfzRGF2Jh9hFCaeo1y8wGH8L7YB8hscLL1vMwU12hMYH4+uJ6po+hwHDjsZj/nELO+faTX5i0iZIaAWhjAxvW8XEKr3aY5+lySYnt/NlTVwlooMi4pCiKW/VgN0jecf7iumUATC2z2VFkZ4CoL3i8aJx2KtPCHcSGJRxWs=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"AWWAt/oKiEUA/NkHDb2fw2EN+NOYNXlxa6lh7oUfREJTOLHBLCORBFo5f/BjTcDdJDYJBw2Uw4mWBWphBoLgmD06DsjmXpn8WxMIBKkT10qJNJAooPxDf3YG8e3PBirEh90N/zRdIhPNsbWfHVMrU8DHzTBwk2cOYgcPu2Id56A=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"Baf6LsSUSMFs0FdIQXPe2rRRch9FGsOtZ9WSfzq9g5NMjCAkObQGCtlMMVRw5L8qEoz3UvKJ1OJ02TTkpk27VTuS74RL2GzyeF9GfvQSlVmHW8gDOUB+0+kPiU2ZT/cwG9l4MTWkvU593cc7J9LXZho/fWhHffP9TGdnCtIZXRw=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"nL1mwFUbINKqYdKejLf/f3JhTfr4FPouVHDOXfN6CyKkQQg8DOE1ACERQEGIDmYyetSNKEEgqWSwN+u46Wr7SXHacLcCsEtQrNrisdwZmv7BCsMGzjXti91JHBLqZHTY66v4Ht16w0VxmFcBmEW+2AlaK5jTh/YS3npiSQ9NX1E=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"Jb2v8DU0T+4Qp+PF4V4T404asAiR9s1XrBDehLXTrZas5TjRY5hgkc77A/a+lSxhRhCDA9Tc+Nw0ACMJW2PAYtDuNzEjxv7WkOhTJ+OLu/eWFIo6/WFRnPRu9a0uZzHEP8T9EPrhasoh3R5wQPtxlB2uBn5bUHhYEn+qN1Y0sRM=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"mxy9mxRXZeDHZa2TLMtHMt3WWhEyCHBhzPDILFr4AJ9X1RooP8WLocn/E2S2LQwYLYpW30ZOaXZY49Zd4dp+1mll9DppXcJkDWymXqdRj/T29SaJTDAIcGDfP+wnLjoOSlXGXs5NvTIJkgxeL44lSPoAvJV4vhNpeJGyp9GU1Ek=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"iR7KaI3RtGeNN1sSRmVxcCGb2ElZMh1dq+pmjg8igTicGpDQ//toLeyGQTdydJzsPFdYBG3SY9AIdaTOiZK6btPP8cL+tq4aRQVMy3aP53puahdqgi+ODvK+O8WQxSLwg+pDACMUCkIQJQA1nWoQ1JIIVq3ExRFsP9H7i2770QM=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"fuBRRx3U3JViImQMfKv1dDNoKJPtXqw6TN/44d7g6kWqwyoXe6XFjpy0P4tP28YAYJzCa3mLMfXTP42+B0tYXZA8bsWifXK2BsWATMiLRCikkyftg371eh5M/+Fw4oMPf+YdbeZmLgOUkdBR3avOjWBC7AfjgOKdBqkT6kVURpc=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"0qI2qFArOlA6uRmNF3uguPdmXhIBqhxZWzdUeXAwBseQLBPdl7rbsrh/AgwXFsbpvp3F4K1l1y8tON1TCUXAcYrP0NnCYKYk3hUuzykqWhhAX0g76+X63mPg4S34YQZfdW8EjhqoE7oubD3OslrwPdBR8JlwAau9f6CwbK7YkbI=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"noHkDUs5ZO14CLy95DEkOYQG32YmaruzMIZgBYgwv3vi2LmYmvCuOt1DoSFRb+nV/uIUrjqgAZFav2LBpwSuoHsB4sCSPWWIQicaln/EJx1+LUXpF+gG0KZVOkJNbvUTi3QqcXuW01TZZmw8MydKN/QTlBWlYhM+sm+1w0gYwyQ=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"Su85Fjt06dIRdIEpufLFEBDVumsQ8EuWyLlH/qEnHyYFfQP/Q5TylxgBCc2a+nvuX74EsvUyT65zIYrHn48zKKdLz49CClGqJlMRIjZbvyrAT3+ksK6dD+tjy2fEgtRDDcwLICowmF/UuT4K42GcYGLXNkZju8Yulh4EJJL/mi4=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"hSgRsvhQeZJzf9ggO3YAokfrY8VsL0q4OcZN6msqKXZE6u0Q1BMACc3P/BM3SOSOEYrYLr+uedpntEvXPtiBis4R5VvamMQF1tzs3QMPCCcbnwMPtuJoT44pz44NYdHfAyI1KFgZeEwcOevJW/DrUFkQG8syR6ew8mE2sEJl9ws=\"\n          ]\n        ),\n        \"RSA Keys\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"A3vPcAHp9sIZyBSoSJ9e+5gF1I1owZtPn/T7qYlvkEu7jCELW/e4IlLrHh8oYZtaw/+NJ4O03CoAM5ve6iXzJlCWvoaEBeAVhnJZNEwArmKk1Ap5R0ZKty8RiE/V+3hhKqSnz4yxgvkQpjZN+xNKWSUba6D5n7GkrVykdzHY0sQ=\",\n            \"algid:encrypt:RSA:PKCS1\": \"ottU4RoCisIoZ1zSjM0Wy3Xk9HIzFBiFzEcNPUqcEgd0FY7KYDnnquXmANqj/a2cAgVFqZLWrYgehvOm3fpW0qdNHFDAKMQEyCu0qp2ovYbkAmAYYs0klBsNRIQS6QICIJ3sXgCi05O/0Eh48k/+fa0VDqrBkAlBhLQvxvZF0j4=\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"WenkBunlIy7kQ9BxuS/fG36eHLME16vGTuuF8ZMiO3RXnJgjS0dnMlDSBAcGYxWqDq1cZU+BmYUjz7Kzk/WwS9+DimrFYGyQjYfDLylHVZ3HN1fJd7SMgmG0LbonqqKBLm6YSls2HC2Y2kApDnfomc/owevOEswGaKYybI1ItK0=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"APEjD2A4ULLM8pf4QkifrhmW3WmrwWtfbybmCSdPlu9NQsWt8i4MbzSqF752iDhafRQHZJ3HRh1COFnmBGmt/OHbJ14AMRgiL0MAPF5nwDfZGhkqBt/DsD1K8i7vuSZCS4sLLn5SvcvdSYdwyz+cJTRkis5wKTdwbENF+pKKSgQ=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"x7WcrpJivdUX0MeQn5btGtWzqvg7vKhh0aqr0AhXTm/6R8jUsvy57nKrWYT3oZhRaZYQiM4iSOrhRvgXzmd/3gFQZtMCK7p1CAh6Mebv/WKwaQXCZauL0V4nKea1X1rxsU5hqlio9kfKEk/z8wYUCyDyAckPpUHSMGXiVFV+Z7o=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"iIUH2m4d6RThcOVrP+CXItTL6ZZYd3L2DamMCkLDnwCRruP9c9wsidK5FTI1+fLofftuBe1OV7GjMyiSMBV/ourcF/QrzbOINLKmF1M9STnlnCAdUKZS2W6erc9xyxYillvFivy22MnjN2vWeaRndM2fcJwklaiEeZZsOWFlANs=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"WhESRms3ivNwlXOzrIc2PhdyTywdbJ8QB7O75jxr3lcydi3UaYMyig5nif/InPCmyhlaU6k/BuXt6kGuqjmYMcCECIKrnlTcLE2ob/RYcOcmbNvyvT08t/8M0P/Ee//EsxehfhW9ZLzLUeuDodHUwYncXTzaxnyeoi5yMDp4404=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"obD02BmCEEKFxEoxFOuUgGkNQlUEAUYNQb0/p3/yYgLJBgpCt6QRt7jTEOrifsqSj7dbxb4N1UQzGjAnfVDong9WhB6qHaiV3LLczbnTb1CLDWnSIDRTgH1OmrUqJHuTcxG6c7lCtrfIUvFoB2u584mk0l5n7Qm0wzSFjmC0fxA=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"hUPfDfsRD3R0YzK+bXmvdas/iJkA2oPY7k0ohUZestI+wi76bOFpnJME/U75LyrHeU+2PXMZuzOne+HOy5xfwG1qXoCAa45uCUkO9/1hcJJ9p7iO7zPMDbcD8q8SHQnAWw9oqOWKWNppJSyZBr1ElvIy9ZZ91XEiWRwzAUPvWco=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"db/I881O2pZ2ZilPLrbFvBvRNVT5rMgDJ+gIkFLXJJX8o1YxKsEGcCOGMN2yOsF3cIsepJaPK8/7O+IVtsZIlkFO+7PFLU+QN8A9xQh/RAR8jVSxZEmlP/qPPJ+W+hv8HUA4WZ0Azb5VLchkO+z9UFNLxeD4qsm9a7wcLH/pzFU=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"IvnbMwj56jret+mw/IS/LMkw4PySyx0pcTmzxLIdob6o1tq9oi0IVWgprZ2AI3QbjPN4Q8wLuDRr/Vx1GAZ5Ut4O3UhxNQAmbgpheL/0180Otl1GE3lhru0Z2kOv9Brdf4Ro7Bxq6bPuZHnlHI21WTOlHis1dKPo7LGnBm/YW34=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"pw7oXUjREq688eClmI/SyiHwYpq7jwbN/3j+zVlF2xqtHkEbz+goCR0v9t5h3zjnYPPh5KtIRbNxm4a+LN/XG5i6hcGrslck1lukqolwhixt3e8spEzek2QgTqfcbdE8W22A3iv8zd6ofeTaY7BMZ0BfKlUVCYQfLFbRO+hDzkA=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"eOLJQCMSJbpwdRJxw3wFQdPD+Zrg/5T+PcDScLmtdOsGwXod01oEhdsADvpEotm1PiGazaTea8V6o3Fi1C9JF3roykzFp5T8oo7vBZ1RtajKc7RTUpvK2RcbhvgTz28jV6R9MJVJSaqF/XlZTrVbXgCGZ1pppArb2Gq42NhlyYA=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"QExyIGSV2qN4+TJikbVzOlnKbz88NQTmp4/oE+kJzS6XNhWAYwEz1I5av782lesQnnofuUixEigX7MKbtB2//Mzl4TMxojNfYheo3F1e8fm8qfpOtH2/RYyrxJx6yTkRj5/tlcSwjZHs2shgmeh4vc974kq2LkDvzDprw2f5e7o=\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys!\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"iN/hoQzpwUzgEEVTgQX9CB8pjv77pRvcHlh3GwLhTdHJZ5DNFOsigroxJxT75ms9Y+s6q/ogRdv1F/yEsetQ+51NdO+IaWs8cN4kPAOlTYZqwc6xdsqvxvKfDhu7E8tLuofkQDIIUeoXnDDOV1zBCzCs7/TdJ7aVZCh++QQoWlE=\",\n            \"algid:encrypt:RSA:PKCS1\": \"sTfXJoFBif4MGfcg3AjzPxFfM00B+gj4un9XmNw9AeVQbsUgx9/GayhkvNa1tgKW+u47jQcY16ZhyceTxBF2Aoqh4D4gVoqPcenEIxsnAYQeek7c/cp0hDk3SPNZ/+eSxeJuAV5/DgIttT35+TKmzcwNdSndCgm6dY+A976NQ78=\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"IWL54w92rMgBR8HGWEv73JYBuGUkSmnA8TCN4HKFRZUpA5U2BeDSp8Ip89C7oIYACQ60INGXaUWeUi+NSXurgKJEWfUGesfzzfhyTOoHxOopdNyNEdRLsl5HjV4HMPcfuGuwOQ2BNbMWd0owTTKiKQRBZ6ktQ2JMRSQcw0uU9G0=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"EBB/AcC+I4SGvkDQDPRYgRY/P8bWdcAOaoCE+0lLXDH8omLd1sQOiRbRwedWpoM2QDnqEwbNcSbHXnRgDw3UIB5P/DURizip4oRKPm//vsGZLCQAzPYTvjaM7GqJ5/mvTXOl63XRa2deYRWneA0kM76Dr9wlyvhiAfbnGmwF/pQ=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"OwaWORrWAby4M5p01gDLHCkgX+uMFbVKLaSqq7g3yc460SoNUOS12uLXLr4+c8j3H8IZAolASn/ntgDM6q9LaDEUT3QJA4ARDLNLPbCtzkM7y5ErEo5/b6Q25O+mzFIWoyh6O473s96teTaZ7FMwCOpcH1hO19BiX3Uay+JbFrw=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"hgde5P3kvsn5+OcPgMf6mZEOOMAtOTxl0pDonCRXVXMrBIjZkOkSyeonO7va+cmblHA4wa7Pak4dbm28vVMH2qKuVD0OQHY/3bvxef0plSrW+U2rfH+HJLhj1u0ix/rwG0D7WiLq0tyHmNZq5fCL9V568Bff6QiZobgb2PgiQ6w=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"h/BWo23Un5vGlwRHZg10E/P0hVrO25jd1tSftyaWW4j4bPafA3gnFvCRGNqN/Hs3R09uEJZrqHnnDf5/B/MHfgFx7x4gmJ+KmHmzVQt/+ZGs3Gv7y1IZXsE0PmhIcN0znjODu3LTHR3NrY8mxml/ZIbTw/rUcD2O7GjyjJsceX0=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"B3CEn6LZlIqrvGTPOVEqGuB2Exn+9iGMIn+e2r2MvuhkJot9hoT6UBne3jWDhZT35TxssTelD+z5hyWemqGulaiBwccgKSfIVlqL0kGhyF45DQ/f3wRHa7gqPdGRIOHPMj1LzmqDeoCXc0Lhrn8vmQPC4IG+oYJFDUSpBs3S8T4=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"NaceD2P26yV5uN31I+hKl7dlIh+JmgpAL08EWxFkIfTkfZN0kr4753AOsN+fjz1SQngGy4sxXJJIEBwrpK3YMRIIVPWAlO0fX/ArZzaSLkwDqR8Rau2NTvpUDj5hzZD72EaJscMMvt4Y1LY0VubZ9jYmFjzLoOVxs5k6YgtHZII=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"G2O/fR7XumApE3hQcZifpeQeCs4pmAXceu9bKN2FKEGj7q7KWShSUnLyRqVO7N9ZDFn65uq6zyEwR69hpg9eKsCQlZ50tnl9eYuDgmAshQvu8HyIatD5vPSwRRN1bjKr8nSQ1UVurgkNkcLw5VljhOW33slzD/f3tfUCfbXGp5o=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"SESOLgXnybYNZtoQj5onqdNQbN9ZqTh/i4FrFdAkVgRK6yt6x4Lg6kSMIH5/oMBFLs7XbTmnkKMkOrmXPCGT9jJvaD7axtZCeXuBx2GFhMfaGd3IfH/4ZSo+4r65BmcmnhYnlqB6/ZFY4Zyczqh5eVDe1moPm44uN/evUWQV41A=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"F8y4UQPGMioJIUrxAjYIV9OYMBJlKb5e8EQXHmPT5JauX3ejkkqyjyQr7Q6H0ZkBnnG0VSrqHx2m/3MdGzXDWFcgnLRnrv+i0trppUPSMYnt1LcW5uBjsg4vm4BLW+Jdp4uzIK1JdInfeWmBOZwa7QwrhK2qWHHG7eeYgdnH8c4=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"Xc2GvDotWv1ld5uVNGHCL7sHxv/VTdcxOGpG7xbYNyrFm7rnZ/cC/+RngcJpXUZEVl+kuafBt3peXP8GmVT2iWyFqhCRoIaHQjordWQb+kfwCuaMoOddsizm5Pj2Krk4XLJ6vkIAYKRmLVrhRPvAObDewMLP5A5MhdpHQUGAzHU=\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys are really cool! They support encrypting / decrypting messages, signing and verifying signed messages, and importing and exporting encrypted keys for use between sessions 🔐\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"\",\n            \"algid:encrypt:RSA:PKCS1\": \"\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"sQ0YsWQGbYJXwbx+0BlturgU8TJEyYlTbnJo0D5gcVnov8XG0ptDVM2wCXqhVM646nH0HiH1eOOjXZa25uRD8P1WwkT4AFsZxmMOm8TOn+h5H/pas7V+kG6qz5JAaQwrgaFnejCtcawDgSInN+aRdnNsHp+aK04Z112mHaNR5OM=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"kXESCymon7IJ3YGpBiMwVW6J+l875YMPtW7me4aGvZrrRvRHjAPQDcqMMKPM6JKOb8cBkUM2FhC4uda9J8X0QZku/PupFjBy42A171HU6W9K4e5MWDh6w5FDTg2kyO1VhcLgtqGjPxx2q57+UokggHdXNgETDboEKLhiTkLwVZI=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"yhxz2RERdhE/GB8hAr+Ttca6YVKBOPV7AjsQSGRaMTjDXsw4DZDYqjHAJM5xI34yPmXzfafZ+jd5vzkRBkMRHhzlqlCyZ3EbMbykIBmCGu/xJI1Ppapoh7LlCUnC5Q23hUg+WSfNcpaaIPyqmwuuM9vk0UrkH9GWLbjQFg/PalM=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"cShFP8ZmbN+VACN/yGRzlFPEVLcPuoGO/CIRvHBQrg1h1kEhyp4JJmFENtKpPWQEWNInrU4zeONa9TXxGnq4NcDf5bTvwcCAbxf8vRl4swlWp7HGYmkgNbEAbR4/TFUOvZ9LN/PrFP2xWr5BSCkyTw8R9jRTHeZFa97nGq72GA4=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"nKKmZx9ESVArtJeZXLS0bPVyLeW01hN3i9jXZkv+DLDPUkn6wKA15U9bGV0LEzRhfGQ9yYj2DnVpVBaviStx/JxYL+r2H4qKJwyzaqE0rB3pZiqkxMrzCleNNrx8mxRfdoVyXpFXQLd1jLOnDz7FDFn0m3ChCJSzEN3ujQ+ysos=\"\n          ]\n        )\n      ]\n    )\n\n    /// Non standard key length\n    static let RSA_1056 = Fixture(\n      keySize: 1056,\n      publicDER: \"\"\"\n      MIGNAoGFAKWx6RJnFWkMlZnnGQcFm3qe1pcIEdKY74OW/9K7VGF/dVw+CKfPqGHC4L60a30vTqnhpOP6TA+vW0EZ8Jfybe9ARPmbbHknW2beLGHo/vXj/+/Ln/3o35JfExEwIhtS6Go1gAnGBmjBCbIpJ/zgDcoVyFB0qUz/qSGyCLwG7vTXYSuaGQIDAQAB\n      \"\"\",\n      privateDER: \"\"\"\n      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\n      \"\"\",\n      messages: [\n        \"\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\",\n            \"algid:encrypt:RSA:PKCS1\": \"\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"Ul+IsDd/9H1e6nB07lNFyAXz9WRm3+15s/PVwAMrWHUz/GGEu0FCfA2hXoet2nrYXMVxWCUu1jg2bijuL9KAj90A7EKzEK+dMK2GvMRWUJjvLqAPX3rxBwoYV5OV1ocwh/bVY0Qsp3+BvL+ehkTmYvLmuYoJCRrKL8y12pFbwEraIxKs\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"ZuSggaLg1NXJjJlEuMsyZKHSTXOQYLYRwem1g8MftBQuSDTDrSpGalAqAqtFOdhBGUew92XXAzSbrm1qUvTvDy+BjdgdAOaDFD8KIg4FofKz6gAnKNP+eX2PJgZ3mpP+3K4YyRCt7RAHVfCbFcyfh/Fazrv44jSvevOgxXA1LLAbvfvn\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"jQlax0NxM5VunnO5Gv+De5TrhCBHDSSrc86R2BNpCuWQRMXhxX4A/AAszsMHDNUvrImz0/aAvB/iONh8mAbc0DlZ2xRFx2biVVYt2Jk4bmaoAJUDHveLeu1rHKzSw+aClW+LcQU6eW9SQZVa6RKxVtEoag4utHGdD1gySAm7z9CLgvBN\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"farZtjPK/cCeKhiYbyJFQmMR0F2aVLv+hHOyoHD5yQDMDzYaVU89hNaD8kvvugLsvPgaj7AjQ94cvrFGe8WdIgZniKSzMlY9kBzDIkKYLD4rGZ5AH25/YcsIma/qGW205EGb0BmCSBA3C+DiBn6O1EgXbrYG+FbIFsCEriHQniu8+ayp\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"BzXjYK7NwQEp0EJaq6keOLBRQjTG5R0JW+2zDhzj8aDhlXDNwhrjLLm/52RiSzTx5SLRG6IXC/KEUPNeG1DcXFIX4hszXdYdZ7gMQJ6TRmefkQDln9qeP9o76BGT6ZQVEoaRqPcLJe8ndRRVFIeKtr8Ebx9FrmWdS21vd7pU1j8bxLM+\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"fLQXVzoJp2kPk7i7kXVw1FUGgM2qoCR0aPoQq6J54zUmS2ebpDkVveQNWUG+YDJfRlle/EwOZvx1JUeoijgtKzKonJE8fmKuvc0Mb/tTzr+qlX722GyPQZrop5XeKY2LjtOm9i/2EaL777FsSdeGuYLi9cRZ6I1a5vev2d9mOPT1KPFZ\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"QLHLGgW2uvKyW5EwfLErD3rnSLRusZzCnE6Zz+m9b6q029FzY/9kpHnhbWNE9NSOqSV74KUXJL26lS718dnCPl6QaNbiLSoYPNzDpf+u35xtMmO0mUXvQXyL/I1eBiuXy5V4RnrVJKsGZ1PxnjHwaLf0JYxZ15FmCJDLGVeFcqZeRPct\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"FQWd4tPg3zTk8dsq83UFgNcBQuWEjSALDp7v/kWPZBhCCs+pRpxhFwc52V4MfrfZfAAf8biPCY7yRA4EeBhaTogoUobBGJkK1NNxSDmv0Oosf3quqNVPxDBA4uIYXY8G4+MIT/9Pyd4Ii648abZoMW6mH6QL1wHY+x3lb0f3+k3GcHjj\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"Prc9aRCeqTNWSu3KAP92yTlTf7TjbAc3ZBCJxvlLmmcELxl6OHdEBHK2NsFvOybW3QlONdoZOcwnMugFppIyFHr6fKQ1afUpJ+GfxC33LWtgohx2W/gp0LDUxoDNSkJOboMk334RyqDsJMMgq3cUf2vVCMgyzTCEIRSkIk1ImaxPDwYy\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"T3qAgzZwHv2ks37o/RYxEhEREjga4UI81j8uqGJrrwhs9xlO+ZTAfhojMLtYDt55nt3FcUNW50z5ZwGlkLoUFY36WG9bvQobFAKccpzIwrWpJZcC64/XejAdn4kyHXPJ0WcXXE4Pw2MyIW2BXOi2rPQmYaxWtz89PhsBt72a0VmmFEFn\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"B+koY5fGvU1OdFkzqygjBJizY1j6sP40BZ8A+N+rsx/T5EK9yluQCrmdo288E8bhqlkSe27ptPqYEThB0+fhuRhmAhbKSZZtZ4jedgG4ZWNP3r94/pJ9M9Vg3y5N26karpV0FYaaIurCWCUP4D0RULMsOXimOwVIruLPyV8WJs1wZUHV\"\n          ]\n        ),\n        \"👋\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"I/Bj1wmy3I4KJfYpmArvWFf6pFJUsWXqkWKnx5GDGuLByG+raNmP/GP/YCAvYLqxyeZtRVg8uDe4+VR0taIGV/KVb2G8HbOFMBGS4888IAxWY8ovRFFpRTropAxS+ed+0K5+RG1h40cHVw7E31lfsiKIA/hExpTTnIsjMNnN3oa+u/YR\",\n            \"algid:encrypt:RSA:PKCS1\": \"OgMMS3psCcBCvaitf6dnrglx7w2rQSWAlgRJhzGNWXMdAt/YqVQ6x7RuI8d6y/pumsrLCkhVL28s1hp8lbZfkIp6c8bbMjpy7gMM3d72b8GOTiJU+OJxerMa1jGmO9tOX726V4vsjEu/Cq0ydqbzGMKde5QNoBCQLQrRkluPjRNvdcyy\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"Ba1OBm4L+q1rTme3HQzWP80FxiKhZ9GKC73hfNhZ37vm1MZ40yULXI4jV1iRX4Oheh/tXvyFg0NJT6OXsSDQeV5vvbu52QCvEu1O6AxGx2THXkNRCzd9enOIsmqZrpI93+iXteyG0oUDdlO6zMG4lAYOE0YfGJheXFqy36+CSmPNFscj\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"ZxzNTDc/mUPChfyT5/ZQDmwTMj7MAvAexQiWUhxwJFJ892EOCWQTdDsi7zIYCSvRaZUlrLEHsjPWUr+zJd4fsCFWwLKTDBJjL6b4AAeCsgf+pwgAinTpwUTwlo68XYON6WGlx0QrPUiK2USpvenIkK3m1khNwNoFAJOn/YVlsIXvdwgL\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"TtD+8Izo4ezCAvEh/yddOMD9mvUSWgSmHiCCdtu+tMAVeofrADVcQqNjDjGPJw/dED9qVDTZGBTyJ9K+IuDmG8JPDBzjWVBi+s6Z4d/7gfqQFw2Iuvsx4CVzFK4IropGWo+6WnWZaTeLSKmGxAt6tV4vQ2C+DnoqYt3W4PW1F+mE883m\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"T39ye0Qjf5vTraEoVXJn04lR2M3e2TfDBMiXSfXAaiYwKfWr1wShVwDGnqYTDgWQujagSlAnKJhb/GsPDUl/IZpSCG971yeh5qIDnsqSbQrSm+DaXimKQKKPBgbCgC7kxKUsR5zmabzu1c4pOkKT2OQvHjokz5Sxox6CXak5Z19Ih8Qx\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"BljerZ9FCn+0Bo57yvKsDHuVPd8sLGOdRN4R85l69FJ6if+V+uGQI6rWHpURs3wRRNY0hGkcU2snfog7obIcrh6SsGeT0JQNEjDZINDJ6/5rjFrIJGxMhsFYpqQdAF3GHx7RJFdrf9O8j5cJ6umVpFJ3AwQxEbWTGWTtfAgyHZpv5CH7\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"OQoLeMUtktY+LjVxgSGSoU70uM2kJCz4PaMRIdNquNk6KvuCz6x7tikuOzno3WF4UAz0mOnl4b/exdI3X2j1oZCwwfCcaHq/5tL6mCxaLXZ6zlyvdkADt+lHp8MF3xz/lp7ahbn5g3gkAD+Y7dLqZSRgvRaaN4lXMQR176BAXs/wp1JR\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"LnocrE7uaCx7n+zRivY2y4vzWnzUHlr01krZXM8ONfbJ5+ZJx3m+uCD8GmUzIRabKz+E+c28wurEicXKhKE8qETGRIpqIa9sTbtO+76QA4Nb3W4STJclNt4RKK7BvuNxtoQsrdCqCuZYLx6OYyuAB3orjw5vXHOyfCMui/UGiyehmfj1\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"LxqCh4V7k8iBBpluqHtBx5MqQhNYK4wsOpiMiaqLFASfK7US/oH7yEoJvTmLw+d25++4DQIYm2VP9DWsg2nOPl38TwNPXvCrK4eIw5wh+bqFgKastgLcwyETOWYD3p+dOe9XkFGQjONsVazm4FEhE3N0mvm8Ypfn8uZ7ZQm9tA6uH9++\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"d4LnV/nlcvnbjCkhxQCWksR+moMP1knLdurLTICDsUK8HamiYUcs35H/ygVBKZXQWcaHjb3q9suJ2xCPYH2++Z0uzvvH/YOnl5JW4v85cGopK5IfiLPo3jfYIUnMqJl14JCOhZz+LFptVFKJcsj+Q3mr/fV2h1L2SVCl0E01C4kh0Rsk\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"QTeXkVdRLYZxW1V0fQ3UW9iJdtjXEMkUPVhG3UH1+CPeOixnjDgVEZS4+kqoNkywlZqOgFS4QO4MsHwT8FsyCkG5tcUj3VTd4yOptJ59ti+Gy+G5s85kwmB8vgCOFABihe1pNswgIlYK0Sk6jVqeKzARWyid5btr50T4XWeKk8OF1rQy\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"D2flaFYfEgCkkue4uFe5E1LtS7OMdrfaA6C9rnVXjB1gp25GzP7PAEanN7wCmePlmcVA3bAW/+EjT2KRuxJVsRkHl3jiKX0Y4icJnwvbnDEVxcVbuLF17WI0mmP40+/hwOZDD1wqpNjHdBbO2Jb4QloEf3BknE3ICz9HG+ZqG2qNLLXc\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"Eku3C+NT3K/6ED/uhHyux2fc0CaYkY2mKZj2g1tBpRZ9WT3IW6CW2g6/LLtlklKj7bXmZCrwL1JZWJxXWu9SZO60WBM8Ppr6SoXKOcBu8hYqLnxdHPvfaix+ivoj/NK2BjbARkihEBwFwXZCjGNiskeKLg8h5yj/aY5qTNKyUJ7LyIJM\"\n          ]\n        ),\n        \"RSA Keys\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"DG4EcbiXQclDJ0FCX/nbFIDPV+QXO7HD/ESi0G467On/xqWDBbrz22S5YTvukygeA3j79x4Aj5x5r6PhF216wAW2S3MIA+kAFbzFX9ywSKko7EWmX9oSjhLx6lgTWqjqGK2/zKANsbFNEtc2iMe4Ma5v1f+6CHUfO+zSoWWusIAoEiRL\",\n            \"algid:encrypt:RSA:PKCS1\": \"dE3WKAme2QuETyEgwK1R1aK5we5ztjMuYjaNY03Zj9I7FmUtVaaMuhIkkmHg1bQm87xWYuc2ovcmfYUWBj3ox2gIy8p/jOHu54TdGEMjQoqi9OCR/ORkKIjJRhu9fploB8/U+8Oslb6p3tukLviT7XQsn3+wy9nj1iTVoRBISxBAa4AC\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"E5bpDIZqS92FTfuX6f/EpFBg2n24nOH1MLAHhyXtlJokjIDRhZWMtsyQg6zwXaoJ/fwzWlhjrpCWRtd1ewjIvzujfHrt6IZxvu6wMWl9c705YKBoOGyOW5xfVDc0gFyhmwtFPZ57tGSEYFTQxMS3mhTSmkPC02IHHKUMaxmKsKQBk0va\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"ot1lTy8Vnuy2WERztw0fjtq9VD5JS7lYKHi+MZ6155KWThsxuZIIUDgQL3bTQ8I5xxhGOHHDJ0qLOYuSEQxlsaiZBGmelCKG4HDH8qFvvedTbf28fHl7In4GIVEhRv+YhSysHrIfdtZEPnxxOIFNuTK0QxcT4TKd24ZMaoUK0UOqJxym\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"YayK3BLOkcjWyXufRj0m2Bzi1FXRATdqhcNF1gna5jwRbbSE1QY4MWq4MLeLin5aRtCZohfk7MzZt8T/sIxUTwGKJoe2yb87CTIZEM0DSG7qtPS7qe1DFucVEMPwIUhKgLoI14RfpPkgNTow2CjcW/dl/0/gQmeAadF6px1vwd/1w3J8\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"YkV14UcPKH540y+Mj7Vkp6MJnBzK1sCnTyA99vKH0RqaYgqpFXKisZmojoeXPOzfXkd89z4N7bW4JdwUk+rQdYm2RTpvnXoi7QR0JqqkN+vQ3TP9QlQLMCa2MwsuclcFie+zOVhDc2DX+TX80YdClwarwOdmMAF2e0QnMf3A5yQEcACt\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"CaSMBIMr3GcrGTmlcag3nP3aSUnW2qoNIJC8L4DQXdBZvAwKKflNnsqnoRjFDFMCV7G83bOG77MuZTLLVelsbqjweEi0VNJ0IBvleeohFxTU9NVHoKIwjPZks78mY3CWlYtrtBpEqN1UHPirkCciAdFlZvIPWvxwxGz0yD/IbLoANknd\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"Hp9/oI/m2ONhl68WYKNVCBJbfgzr3TFdZpjYOBMfWmHY0+qluQRdtxM+QVMFH+ujEp98yvgGC4/V12wfyGJZCLLymMKxhsbUF1cbFHjkEOzUSAey3rZeK85znQuUKOgpvCcnZ52MdynLX2OW9lffYHCO/Q9J1ob7U8KM8Ly8Tv4gJcZB\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"QEEGtSus2wpRBtY/A4Z8TtPcxchcAHlI7ekPV7y0t+JICBvFXEsbKD3C8sE0n5p8bVqcCiPmPmUB4J5m6Hw4fAtt4GPngU6YnRCiF4nehYIN2V+vAEDY8kp8SVIlkF0TbFmZNC5mTL1T6pmaWKoAmiuCJQCyGfitiNrYkHqcLOky4Rx1\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"gn53c4z/u6DWdMpT2ieR9Osk6NSfVkizCq5FvEUexH3CDol6mjAMotaU8im07PoLqU+CeI8Cd4PrD0JU5N2jTV8mBAIy/mpR+eE/vbsB56EGS6hBepMdUMgG3Xd/Zjd54rzw4+tEYKqT2YOxWHI5FLeTh4vXOMnBAs5YSKtv9mepZEV6\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"n7m4+xtV/i7+2Xy/s+Lrn+FaVM8b2kEYlrMQ0aOOYCMncBuE3LAF03+xygE+3FsvanLbUOSHgfDx2drRHPJUbJ9DXyi16QN5E7whcoq7gpkzYDn8MuwID3pTtpoNX+4DAAyWY+5RAay+Lyn7OZ2zO7xul/uKC/x1o9mRb2J4VkeBz616\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"WM0nFMDu5HsCuRwNu90O6Y8AAr+6DzE5sHfEimgoRuncnJudG2Up7XO2PF6KqU+x2ieKWSJFdX0zlDKSqloADHuqwrOfY6gb0JycGwJQygwDFher5P2vIU1vXZLLkLLtqStN0iQO/GuFFx21J6U2g63G82TU+JUozs9dHIxBs7clQwmp\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"AkBqQ4+6ljxcuYbeEcTI3PbpeghLHZYFxr/OGoiQJq74xyaDfsUsVQ0dQ24774zzI2VlHcIEBvx9qiFNknthArq31UblCevEZTqFzIAHBzLbwQQwvw6LdWOyCqHBDP5Ltua/H7q4A8BqKdF0bW6hN4DXrQdGPQDkwIaj1IpmaQJT0yju\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"Gx+M8TOc6smAFLDpm3CjZ57hiH3eiEWlqyhIaYFSRWtsjvO0l5J+sa0Oy1A7zQM7yQsfoFZ25oGUJs/cx8oXUI54KiepX65Z6iQCy7pBZXgy8TWCrRZO/xY5l5Pj8ipRHyMkgTup5wWXpfxmwuQNMW9RUNVeyx1NIl/JgJdEpaE8KAaV\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys!\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"f7+Czhp0Y3kg6XPfjFjGoueJ2xorPtO7OPspMPTBmg2AsVriozvz14FHXkjxo+kRnM6ZKz+iN/d/JoSHERY3AWQ9Z3uVTSVx535PxZYOmKgCvzmXylEhpl4NK5fQKV+jaGNCI6Cl4T4W41HRZUETBAiTSWhwpTU/MOr5Xe1XSl0Mp0rE\",\n            \"algid:encrypt:RSA:PKCS1\": \"Fl/Ex3uU/lr3v6iD345HW7wodz7v4msF1nu/LLDH0vNADhHfc+vd4dxT3s7U/qSNQEIuwBeFG12KEpKWhJWfEzXYPK5zRvSIhIbeaAlIpsJb8O9Qa/kEs2Rc5LO9MVMETCnj5yDDlmeGqinV0lVC7E/mycVTug1Jr0ELfb0Df6lhMfql\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"m3psMTDc6xYFEbBuE6J7AWqEYGQIy3FwDvb/JNcSSuUiPR9w39nJRdlWeAUrS1qvxnb/ilMY5zoHNdK2j4DPt54KCthByJkZ7Xy9QsQvSgoVXJL9JusH6UAYJRIVQIpaPwrJnWwCpR6ttzGaPW2hBIO/6Df70xDCPSRJB9I1XbWF1VbL\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"VyWICNXgSpWspn3GoClUw7lKyuS41t42R3msGUHsguneCsy8BHqX8ELgyGee/C1LQvNEGPn4NhvDRbopX712NzdAww8Xo/6vm7uNo8NIcKBZbP7gMrxU5S3gF04c7AT5vtmVCPfjOzw7f+WUjTcInYVDWk3tHbA17gMlSyDNXx0U6Xdx\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"eUEnBMwJeSLWdoJwTfvDwmpJTtnAZ7w248cndGIrFyF8950ZF0JUZz6scm4qCqsF78DEiOFveGQTNKqiuPIXw4FOWI/LqZq2vPRLp8uG5dVeeaUI91+cYzGRBIdcTdDebSMOPbMoNguC65y9bkow0broG2B64S0kkrNp4XB42rOx1NFt\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"gmKXCAqltCqh4N1BXOLsGPTgZRc3oCdPOFnExGdaUcBwA2fIWtT2pNEIYswQyWwUgBjOz09PU9hSGkHaWHzDq3gdSUfA/99rxlfDnIEA5JUHQ4FwCXEXVNXVFdPIUtJ5ODmz4uaIM9IK4WCACXTp3nNB0B5u1Vk+b6uJnvCUy0XSAktG\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"CkQP2tyiSj2reiwv9dDFoBEgTnXrEcUDpgstbKz8y07WWc0jnnAtbA561vmCTcnN+loKisDuBzB8sj2sH8bQrUAr/Z4SGopEtxzilDKWqcg7wRT8O32tNkzctWvSZHcRTY4orkjpTNRG1We63fVWzGtQskbQFgqYjRc9pAWVhBfuUTrX\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"b2I38N81BQ84NCpus6qGgY6lF5WI6Z6nX92hKl1nA6Vx1zceivvOYLhT6WV9aAO0uXwRMqxXbheHBQhSgQemo9cWLtqQ4YhZwDK8Iz3tMhtWkyJPqQlci9HLQkOcQ7DlAVm7xe6+a8Eo3Ny9TDRMFk2/KPCrVpdT6Ca7LXc0tl5v3RI4\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"jwXobxBq6bzyzALQLkR8CZ2zZv47CD0MnbuBqji+JBh3w/B0GjovRhFA5O8L+yQxqO9GmeGSZMvetjsqmkrN4TJyj4+bLw3OmhCu9zf/A3Bayk3kr0GizhTiUxm0pMVuILpOCa8SKh0urbnR93F9F1wSQmDEMmdLEFTjje9GduBkAvgD\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"k3Nuv0ggnUtLf3dLY8lNkig6JI28g5Ya/t6pJDmCJHfdAcdkITfX6pQjJ0/nbTucWH5v8uAjpBSxdCx0tJYv/UPqfAhCbmImstOegPIsfZQGaeB/JAHRDQ0dxsoyF6oEvpYClvQJfGzhulRfrMz3xYmajzoP/ZLB+9M6tmM5I502btya\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"TyskblKb4z9x81suow250RIoPvX5ZMsDGo0T9mzsaBmUTMnCFfx0GkOiuMEsgkv2pDdWgWknJGAyefdF0ctIF4+WTHnQy9kd4T53sO9lXUFJprvMvvjPJid29xDb1a2U3RtmQawcF8pzCtOUm2FxaEcj/koDsV0qscgW35JdFvkzkTDm\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"MR2T4A/3GgWLJYHDh9wEPbu//ZqDhqNQVxTu3EzbxF+HO2wYctTLb19AZehe7KT/NCNH5lcM7jeCY1MCxyl2Cy77OJh9J7voayw5qh+ugBBJt2CCcqomfUHEqEosR6vdywqdRkn00Y24krCsUUQaQoc7VqGYSElJqwUOgTPXsDRHe0Pu\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"f+EkoL3OoZHjoVh3gMx2y3x5LH8D5dwD9YoYWXwUiOjDjGWM4LFYI+ZKOy+omQtEcngWQEWKv19XROQMu3S3/T0JBfM9jPvM2HsXIA5EGSa9aR1sn/E8I1s8ItKuPPNA0MxG0NtfCYTWxUM/jgy2fuwaA0lhE2IW0WpbLnanW0MQFL1l\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys are really cool! They support encrypting / decrypting messages, signing and verifying signed messages, and importing and exporting encrypted keys for use between sessions 🔐\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"\",\n            \"algid:encrypt:RSA:PKCS1\": \"\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"ZU2t9DVxdH3xyeayRkYOvij+PaAn+xZMoL1PTM/yf0pBdJqkEvPzg1JaSwMQP0sgCS4zfGtOQg2vRdDsl48uYASUUn5e0k1mqfNi8OFEFCIAGBreInHwNS8GwX7WjdRvhBgdkf8/SQUoo3RitIlRUSi1tuX2dxSeV27e2dfy/UDqt3yZ\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"TdOQeZdywNUJSlQUyO3gt2CZhk7exdYxW8ibHKTxAckSYrYpGSDLnzsgmLpqmu1KQgz8bbtWjv0aPEmf7s1HkHnBcwmG9yIMZ/0JlKDVNj4L/T7fvflMHjjjmSx9hwibVME7+2pEpH2M5T6CTZHHAHviyGWjnnv9AuP7/yxpG+NjY1YK\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"hc9zFYIijd4MdYEEULX+6aZ58VxrVcCCFLK5IKoDQp6doD7kS8Bp2VwqTdG4hdFrRP+TgS2882RGMc3loZfy/LAsG6cpY3JgtzPF/aHqO9EKxPjSAwLyWhqD+0ZsZIpwYf/tIuNIEJHO5zVr3C/NSIPLcrMXYjtmBsYJWb+3MdthLP2u\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"nZcy0p9J5Vo58lRfvXMg/7lLRCyQZlyStkPehWqdX+rJMOY5OyLw/IPpmZ/KAiHFvKgqIZpQt7KVHeNxDmyB5yquPshyyvrwP9ter3HdFVXgK52rZqmQMpIPM1tWhnmX/EUt/6yXQYVGerGXF1txHrZUS29VPsv7G1S7TaP/7KDmTC9V\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"JhFgheCKfpA1xcubGHRqUtC6Mjc7PyzWtmfrcc8ud1AHPYiCpMnlrGvpY5p7pDKaWmlK8S7Rznl2r4QFtmEWt1de0vN62VH5Nwi3kSi6q3ufvjpGqKcH1p12o3dMM4qbS8bbnm2bIP5DmSOKAIP9Acd1ixlgomioCBsS0mm6U6sbZlCf\"\n          ]\n        )\n      ]\n    )\n\n    static let RSA_2048 = Fixture(\n      keySize: 2048,\n      publicDER: \"\"\"\n      MIIBCgKCAQEA3HI7SZJ1iiQ0b/6ow546Se0IuxJOyAqK854X/uspeiIVUzhDlC0cvUEQJjmo+ZfitKoH94eV0RulbbCjNUV0x/1OKonKJ8anHQ5tgwfXu89EO/zAry7odLHYTvgBoJXcM7sofzPdFuwUYXj/G1CKO3EVvF4sTvjFvfq3huDdrlrRGuGip9mWTvcH7VMFOPbIhLWWgwMyBp9AHTisQCA0YtRdnSRv70dAcy97ys/vy4Hcf2yV5HlryFt4ewR7YD57CSUofxsH2lZt+1uvQ4OfyjKvwN7HgrGUGL7xIVxddeAK8BeZzVAyp0sroRwNYlvGGRijYyJUut+xnB16lnSafwIDAQAB\n      \"\"\",\n      privateDER: \"\"\"\n      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\n      \"\"\",\n      messages: [\n        \"\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==\",\n            \"algid:encrypt:RSA:PKCS1\": \"\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"t0M+coAeAwM1hzg98tozm3v4+EAXx0n8urSdltNcuD/T5+oO1g9MULmoGAajRcmHxtUBLtcfmzt7UcKlyPp0Tnd6lqaNT3CllbWAROXc9pD/AQgICxHEZJmQdD6rHsEWCsmveWnmX5Ztj8w7XB93eEfFqfkDSTv9cMvSdS9f4tHnqBsupv47YQe0rQkd46NJUKaJ4wWWW5ug+Hbp7u5bPrQp707SIBejOYYxMIynbEMGWDn/UdEqcLPgGeozWm2KJ+77KLljvfwEHZvopuyx6kHHxa+kZHzrUOxjdKRr+Y1YGyyZrzT/G2z/CgYva/qeQkLdwprZcsNC7jCKndDVVA==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"YS5QXgKmNGmOlzeDI2C4TO/Tu5uPnE/5m5EidIUS/IRcwmwQ03rFHle61SFSGJC9unwwGpMGEl9lNpVyBZm+4HzIyJM3GtyY7D2GNlcXFCKRlU8VDxjf0+LaDkv7unTRHNVtiozSs7lZuLYYq18cpvI8lgqvKqmLVSpujSwIkRm9kxDrJoGCR536/uxlA0+rOvVwgvcFEPCxekuR/Jqtqg9fZsH/l3BHkzzOOrtG8mjpupUpg0X4Q0lHJD7+oKvO+ApoKD8oiOufkXhyQZrYvqXB18QBN0DesPHgGQoH3vmMtjSZTWOsBkjafNC/Zfei8XEvhvr+7lY2iWlO/fMC4w==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"hzmuMNK65BJaApJIE3NepVyXOzK0U2kfjtytpzQiPnCKeXY0XM6MXb84qsfphRedNVLzvspDCN1nwkgiOJKHYtwshCA195c25XRgeNcg9WI1NS3i9ej/r4XviRa9d059XKAneZigzQp/Pb+Q29bM7zTeYh9dG367XeFlYvxh0Bf00xXnY5vuSolTLI1yQMqYvVhnnn1nUPzeGIHlzaZ8xYSGaF4OPxx3IN4oKmxqYrvFQbh9FNf43Y6CnnyK+WkflaVdbhX+Ge+JxaQbrZKu/DisqzSSRpZisPk+9FEbqzOoW1wjZw6IrIp9OquFlIK36oVKp4+bL1h6SCIuurqqGg==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"x2/m9kmMiHIa47adCIchcXRVQEYiXlT8AZr0yZkadhKm1A8SWWya28MkfR1qSNFvPtTqJYzhKOjrEXX5aWLdjTN7KSra8IyMeF8CNihjVXpvHChan8U5PCouuv3bL3Ss0xe9f6mkeDlgZrCztNoK3OliQZslKcz5wkUxZU/h/PuETnW+8VFxPWv7zCudYnn3X5t+V357XmZXFjLqnFvnh284KC0uBVOFeEhOh7YkLdDAQcn0LIse30B6FLdBBPldhqbIYjCIucIzT7Mb6a2+x6EQPXxNOc96x2eqFXHXXtNCcNwknNd6gKgZ0gV9NoeEDoWZqUqwy0RpbNBxqKHn3g==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"rj41lPJ95R0pdTRr+e9m9/lFdktP1QZJ6taUY44ridX7YcgEPZn6ftnJIHgl66XSjImwZGzgFVB/y8Ekt1A+fFbImQzkn1zLUl29J0cg1qM2STqxutCV3JMDxjWgXes/yGKg8o1ZpSMjEeQ/4J0VMpbGPKeFVQL1N+MFGKqDk/odhV6rCi295zThTxWRc70mF6jcGEf/m/y9yWcDFTA5TVqR5n/W3xJaZCTnken2M69wuY7LdjI9Y9TZRa0PrVpMgq2ppH89pwFg80CVqNQwBLW15Lo9b0MMlZrwJY1d6pfhSFlZALRwRCMRLL/vROZ5qNf1lxCuomK8uqbnGdyOJA==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"Df98neyN24goN+prLICyWpfMAh6uIxDLmw84u3E/SE3zJAlg0WIK12ZdeLVJ7ca5mcQEINUKD+vgSRNyW+wf2hgONCOghshCv1LfSaUxmcHBWCca8HAK9isC7i7pJoe6yn/BzN1vJNXDpkCjgyeVck7fVK1uqxqxVl6wbp6UxUmcYnLFC9VgsmMVw66F4d3L3IS+rLW1iJEuVg+TPBaABdtGkAhWbVdoU+7q8uZK5E4W7HOC9Cg7y/0SBEA83jEnGsMctGd3X9XwfXSQzpkcm3x7hQErZ0gAGORYok/3JDDVzbmsOpDTlaRpanJl6j3YGTF9pnyNiee3vJp3A4L92g==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"WOYji4b2Qk/TaBodcBNUfAC2ZHuB9ziP8cjsSHT0QlOVEIyQ/EHvzVEEViTcdoliVrgQE95nAdfN9e/9YFPBnVHN/UO/yD54IFSqc1rr/0xABjdATAng3sMLh3oiNQ4tfxVNOLHlXzVD3DlROZIru+V5D6eRlFFMrye+PYXMbYZNnaZ4mktcEJvpJgTI/mZl09FBLSP+yz3sZqxvVDEMZ8CAvIztzbc6pWozDNRtDfi0yWnuSPcnCF1eJHCr6DTDmsOXV+i9EUrsXABX8zs2qcCfBp/+3Q7WwLRWr5Ql90q6qp6h5dtUGJlFe8kPt/rxP7AUnI7vSRIDcqDnFNtm3w==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"of41mKNY5Elnz/Vmhx0t8vPi64slKBYQAOMTVOXEDa315i3pTAcqj2EomfjQKA/xET3kUqHrXRSdpn5/8k+w5l3sLetNHHkw7E6DjYALCmrJS9RiFZjlMlYtIleeRZ9bevs5OAZikzn/VIr0wj94nPwbZB46nfLJIHgH71lR+SuzgM11HNLq2XqP3PkUZ+leWxpAxZBAD+UVEiMH07AxbzGEAiLdYvqScukU9FPELGfnaLEytoLS6ANsVPOdBZ8uLcH8z+eO92cFIJhm1Tw4ap0a14TReI2EKVPnQmAj3eKhWD6zMDfuntKMfgcC9YmL73vBUopv3SBXGpmjc32r7A==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"F3OeO7Dz9jes3ny8+lFGHEVnPgVORtjtdi6/VEU+tENT8rRzvSLmobrYHwWTQoxfnN40vx8YSGcLesZ4evsmkCIoXKGK7pdKFdTsyBZ27wgzv6DTNaQ83arGmkawo8tY6NuV7FFuwg3T7r3pK3uZFVp6rMhU+IMBnaHauqFqkRMV/E40hF9dXkkUiyd+RORbOoQfUnm+Aj+fJhm3I1X0oiGhGmEbvbWNlSL+gFii3jen8IY4zMdWRH0b2yjPH76dYfQp5ziD+riGVmtMDCYaeItxzespyLMoy76O6W3ln/GIJS7F+Ur58/W2KGaYFBBiO29XQig0nNCpduv1cFWreA==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"DhZLYXU9TlyzK3Z/9VeBXlOsAU/M1s3p3HFMYEq2d3ATDbruODfgfH5+pCcWOmtx/10t8oVCWvK99lzva01C44zp8GfizDnvLaeeGDYdIafHMWFgv5daHfyhhC6j9fUYjTGxINHR17FKr9FNKS69KQZa8U89HgSuChXTqeKXE5rhTdwLo4LvJzywQQzFxB+BnUAW5lYhh6RwFxQ5bwWkB0Tw4wb2x35yXuPRRNZ7ZEqg7a+FVY+3MLJlpYGsUncJo61O/OUiL4+DaK6N0pLrhE1vlITu6xQQacJzsnVfHKKbwmcsCW/tEkKrkDEQRB+evEkfySnj7tKvrRCp8138aA==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"Wwn8yGygpyV3vmdNVrO7DalkBKCjmrf4qvJqpBeSkpsfyEM8/WzSkPPBq3opw/owwqBCZ5eMoJ/jLDmtSFx3x/UuPFSma8ApNeVdYPokhmIFKkjJpKssT2xDsEIRykxx4cS+I26V8/S7ckMrh0wbzVgf84898i77qTVdRvabX4bbc0i+7Zo48dtexGTMDB+Q+RNrp1eWe/ftF28TXl8+smv8OkKpItUTX80XU9Jz9oPtpCbLyvg2nQlcSnumjtN0ViybAo27gjqYUngTUbvvt/K470mBQjMgCE2UPIPd8imJrvzfzi42hi4vkqnr8B75ju31zvds4xClioSw0pqUkQ==\"\n          ]\n        ),\n        \"👋\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"mGwY+MlCOee7LwmbzBf8mN30wGoqOORpMngparguNXQ/ZTC2NEvE569YsXBurltZuewBtDUu92j64qJQL5RZj1jf8unc7bmZV/t9wi8Pp7WNivGUELCTbIl59FinzUX9RNnVDzrbeWUCV+el8Dgi5QVO2Imi0IuogFGsuaKOhqRFWjEGShlog/rO2lzW52qOJqD+MLlkah+SGwmeDAtZn9msPRPsDg6vUwdL0WXpBegdb1weJxYrDhQZds2jOWsNMoneeYLsJ91Mvej6g1fwGIuuFqyR+Abwko4FDJr2GkpazuL5i1cKzeDxk7XNl7d5rtV8wuvr9n9SikLJWIA/jw==\",\n            \"algid:encrypt:RSA:PKCS1\": \"vdsfQjDQEgDDknqlU5H2a1QSjFVqwBcI7TiN6yEuQfqv9IWsPkh/7stCQupoSsDj2Z05i4DjeN+Wz5AqXHh00FT10P3QCckidxWQjTCQYEyPjVwQz2fZgNhMeKnDnXKSdYw0I9CRzIG6nPcg9SGWBdvDM6T76kHLhvxndKOBcEWOgaJgYRV2J53CSFHqz5WdCAOAybtHS134YtyFxa32EcUI51hjfLdKePO3Zc6Itb7bYIsrjrNpbbjUXgzQaGP5D1cFU1j+m3IONsBKUXyq5UEmajiwNlGYcPaHbanack5rMaXgTTLSrxj42F4ixKwxU6zVYl78id5qZSZtLJSJAw==\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"CaOHcMXljUkF0T6+xqNBOMrzTqq9+7WpWkN1QkhOzN9Pn5+2m2y8NYFsdBOjeuWz4TmI8z0n+yDnl7psbTbn4KpXb0tm0HJTW0gcJS3bv2Cqw6+SQ3RTV6JzRBFvQAsZbwnUa0iikwLYlMHWKMFBT3NTIiOouPQN1RNBKm5wqGNFkUTnR/ILFE3hUVW2UdsySSAqvs7SLkWRYEi+WzZsmKv5h4ml5hMEX42I3cqmzkf8bsMQ+qT2sKjmt1bC+F0qbIyjsujDXAWuPnXNIT1AnDT7x+xPQ9dChdynHRqtUan+l8JDgk60oOghQkv1H1hv771yplvJP9J54NaABUBJ7A==\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"fyIf96DhRzHOC7r3JF7heecK5ajv20Atm4MhvT7Ga+ndRbtKLxOTVM5Uek28rfXvxJ8faFfiTTse0Bl+ewsy2WovjulJSzHftWACJiCC+40aUOYgtRNH58OUC4qn2m4UwtRHm2NEMKNdnGRvwzXa57WiSulwzy/QXn4qrVAHnAQl1xHCSEcDUi0fEY+pnGNJQczA7JuL2qN3k5a+66t2KWRKFvnApP7NLVjVL4oHwyRqsLGa7y6Kk087Q+GwrzHNvF0hz7bzhjxjXqpdnexkKeN9u1itMAmIH/RxDnagMgw25o66ZF2L29fJn6zn0a6ZVZEqryKaMlbZ2vMja/ka8Q==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"c2cnpPTRoCJcTEV9BXt5n569Pv6EhA5hiXoRxyJfprriRlTb74nWERz42DawK0n5zAwxGH+UTKDFU74iCT90ZFb7Q/uNR76hPuX6rj0g/H7JltW+V0ITHztNl9V6qeQpT1Dv3BEG7fIscpDXwl/BuyGVvb/xqw3ggMGxWCOlu3kRpWxDP3GsyLbpriw1rWxOuB7+CNXghfN0c1ajiJms/DEr4x7zn1hXybvfBElDQp6D9C21paIF+i9gGIhdajvbz6r9uGOOpEJVf20kG9EAjgpRTUhHAvbNd8G59Di0CS8H6GZRDj7Yth7pS0Nqxeb7p5uu32nOkewlZg+eGJ6hjg==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"B1BqaavjnFBJWwVYWoK36yB6w/k4+VYfG+yjgcyiK8t9fNZY/LJNkvtd1eAZFbUltunuoDafqq0lpava4aWtjwXogzFcQddFTZvZ3UR5+mX4EmTJrLeqnRQf2NH5p0eWqLLMCSxlMlpk4MIxdOY0R6RMW2sfjRaYSr4WVpJPQjw2QlBoNOePs4w0wrRodR65hyFxu7fjoRtXV+Ju+ZdcTZAEEBjT0CohP/unf8czdwbNywvT+bm6DSbjzLeQ0HRKlK3nSM38HplKeob7+jGi8l6oAopAgf7VYdN66tk7mfrgNTzy/dIlCbZFyJ8MnLY8WME4+JSdNInQsqPJaKS6nw==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"m/QSRdR5dPinzrJodgs3+CitudyEu+dMO4ehlORc0+GovBA8vQMcfAy3hGmLcR6fJUh+TnaJjS3Mc5cCcPGPuL3Uam/k7ZkOogO5c8p+J0bj93A+3u+0rk+GjONGfkkR2kgKtFa3anJFMR+XPWHghhGHKqNHwL2X7JvW3hRDSCOhC9gALJ5s/LDkkojxt2lr5I51UL3JQLceKlTs/zey96SK8vGcCASUTzsWhXE5RbTkUqWF/+lnbuRpd96VrsTVsiUNBdYufnPSxQAhG8whZqgxGmOEBdY6ff/Ly3W5K18vF+NfAnLJuvmsLD6xFKTqptiaWpgFEX8KiT2j3b2hWQ==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"T8BHMHkPeA3cyH1/97XReTybYgHYDXxQ443epTi4j6xDXP50R6aNMuqruTu86SaTSSftEtRUp+jvVNFG/b8YZ+wChZxRagoypgiL58MS/WWh0TuIL6guMeu6+U8JlZ7l4XJATrZ1PkIQ5ZmBfAxb7ZfFdS0j9Uz+rlkQXZhWr+0j1IMb8GYdilspf+s7NBdxtG3jppXNmxv6UldKTz/gHy9xLfUyLxLNUms/KxBot8ckLCDK4/iUuZROm3AhHhtl6nkd5V/oRVFT2R36eLvsI/hyuJMH+jRo7j3SxdVdUX3dY7aMaiTgScp/ZvdPnMg6jeVFei98uV140sielQ9aXw==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"L9Vfilde/EPKT0TLqC1HUQdM314IWsNFDEFQsX87NQsNckkoyvc5pmdGwiN8bnEhcEKtv1dRLguZ1QKNt+DPB/gSjyUFrTttbCdkimc0cMHZ299IWpMQ48ouq615RLQU8clXdF8DdxP2RrLDRwR1cQikICVYyWhvVPQWjegemUyyDGDru0arNwOv8SOVgTs9JDKSnyCistbMV2UAUOBiTcL7438XRAnxGnOxsWLzqAdhM7LiGARvYZph3gCF1Esf0DxSuAbZRvcPClAsWqUyoGq3b8eIgGrgXoRHpc5GL3qFtRTK3Qyp/rvGNS4x463J6rqHwiEcy5YUE2ZbG5bkBw==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"fI1C2MQN/NXyAkBUpqkv7LdNAnbOp4npAmQXwSxk41yKNwCHTS/kIWGcOp5YQO4oW+J8pKpVULa1N/z5Qyu6cu7rJA80Bl1hrXKwSrKPGJUUPlpsqQjtKpMEIDrjJiEUuicVDxWXIeCSH+M1RJFnq34xe4qKde2CzJQXMHORUb8WPxboqLjRGXkVm7biZWiay8eDT5ye96FOBWwZ/OgvJ0TP5IrhUhvufZ1bHZbpIRYJucGBbBN2jCyvZa76StqnEYxYdde0DgJQp+S39xD54OJoooV5f6KzBq7MFdRaf6ITBi4DW9Dzo6ArannaESM28zLHkMbAS0LMjpunvKEdug==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"qEkbcbuxvqAfofKwNZ5V3mxFQvkX5kSAezgMERDilvkY8+dX2NK3v1hzGEdKsSyUpGgtTcLLhXSeWpMHeXZpJp3gUpuLFoeO55eaQZM+08WOf7274wMRI8HfXezutt1MCE68FV4lXHXgnybvYP3D3Uo9RtKvtbI/IxmxNqqptMlWNLZpgyz81MRRKyqlNpjPBCAYfnC3VNa3bw4/tfmxToYBBD7u60QCRKCSivf+CJLtuW4w6l/NnoWIzxK7Uq5yHpr+AbZ6aMMMqoqFvgXm74GtiASgcIesv5VlliHFLsUEehvwxwAfiw7am6WMjV/fYEuptK9xigVD2YZiMCv2Cg==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"fhvyoCHHpxdI1sqryomWcGh5li2RChQYrFo1aIprtCIKunX0okvEhx5UajK1zqmMW91sT+5lvES18cpIyCuLsnnqbwF9Mke1eW3Lg/stCMSYMCsXoZETyXzpVhQsEMCj3KXXGrnQ9ZfWp257V1BiBlQBfJjVUoehx4NdMhvt2SRFQZ4+WH7ZY1isZTiCjTiSgVnEx8vHXIJp2bTqargmOXPPsCaGOXqTjbrKJt244C6SOPp2pwQ96WBToRPEujWiGmXBweyBku/RPcoSWeu4Gpn0tHcEbtd23FRhF9nNIAKlKd49Yr59FGohWnNqyKXLvYFNu4O/cwc+SXXQMcrimA==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"H0xtEUUQBdCIHpdZ25Iu6V/zuecYvpHxYQ02PC4PFI3cgW7t4TGaD40yWy2I4KQS2b8sLBsIYe65tpp4saUiwPtQxyKcqg7YhYYWOmdn9+OF1W98BID0B/4MhWZMeYDH1Xq1PR4eEPLJZe8qZYPkZyPIIpQkLoTxwoC8zfwceosStdqxZ/QjNTu7hJLnFXKCtkc4vtmVXCFY/OTaG5ZFk7Y/zk6CfvXcGky5/SnXqNOjvD39EHmYbWAX8bHxucntqpY1ZPAr+NReFUJUvF9UA78h29oc3uXYsGoSotJ3z5rQoXzHsKeDM8KLY531l7cXePFuC6Fg0oFG91isXHn3hA==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"ddTr+cPSiJV0nMcjP3VlhXyUMIA4tgW9LHhYEZzvDFBVINKrL/eL9ht3UmfgcHg/HMEilJOlRsHpCF7VIHwOejvb7ekSnySWuTX+5KiRgY9z1NmibYwEF/alJLyIHzPoOSDHMcsBUadTh/9CTY8rQXmxsKaENFdd8XfBNWw0sSLackcgH1+pgg+2fx3xTbYwuFrcfJzIkKQpCDV9CMaNsh7BngHJ1qVADZESrxRqwuJ56L+aMMTag9SdPGjdHambJX/yZbjEtE5JcDGu21IUvrcF/0hnmnzRsmwiO/PK3m8Ek1surYr8Ohzssh50FLtASOEz6gXQQpMYO6z3He/dAA==\"\n          ]\n        ),\n        \"RSA Keys\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"bbxatm6qJob0II7nkk9XxOJjtJ46vNx+sraHGOo6i0oUbi5+iZT1kyVRnm/RLir654RVkTFT04194uSN0iDnbfPJDhrwh9m1uHaH0XMAxWStRhCMYJSIuk5YGSupjuNvzcbngTK5O8uEWWiVNJi/UmYUEtIn73FN9h8NbvJkjN90o+Qyb4Dnp8cutZDNoz3NvVufvt28Y+w7FR+i186lZ6S2efzoeHK/h7DHPrs2IQg1UxUP9CM53IeUvG23CXZdC8M2N8gNIcwRk9b5RNY4QK/AX+qr1lc1D+VfhiTYiICzedKfoyNZFmYkiJZiFQ6hK/QsmNkUAzgr6Qe0T4oI8w==\",\n            \"algid:encrypt:RSA:PKCS1\": \"RNk3JqS/irwF7LuAO4xNqAzPxzAksnzNsT5QioIGrMzThAhcvhArjHgJZMC4bBVrL66y1fYnNhogRNgvOWc5CUz+kfTQz7EbzgnEAgeDRSrB+MEHes2CTdGYoHNXLv4bSpY7y/bMZVX2ouhIvESYASdyJb+BaWRs5heOum1E5Je5hz34P7PlKiiLzoGRP0b3du7dbk3xWjId+g4kG5TRIa23tuirovz5nITWiAzNTef8TwcJuwYF6QRUn4Tyhx308VvqV3kKHTEU237TL7NUTY2shlv5F/hnA9u1KfvkTc9vfp7HZjTF/ufxNOZ/PTF8DO9OTbjGMNkGnag8bldPGA==\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"IwhvsO1TLzCORZi0n5Kebw2AOZybVYZHOC1wO8YiL2dYBHOcBIBTnmaeaHMn29cyfPB2POsoR7NYSZnpFK7Z4ikojQKOJANr/RoOPjJMHbF1QvuS0vzSbR11wC/qKAqqolfKzvVsML1Gacy++loAPiDN9ZknHDbTywU+1yeDM/8SwZlkO+kfwKgxjZEsffkbx2FMn95SJVNVqxGZKgXJexu4il8qvNzSyp94hkXzMyCSLS+DOxrLu1cwxesow/+clpw5kaBfmPFRr2dMN+ZJgHaK2ShaE30YpGVojWqUHKx5I9xogX9t9/ybEICziP3iA/tKybPA5AOnxbuGPvUZjw==\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"IqXz73PgySx0TcBvqT7fnc1Db/v+mAza7pKXEaqb8GVvZXc+X1B7iQ0o9WJ1KQ4m/zq8iAmDsy9B64eOV48mytrEbvV+Z/8M14oGd/GbbjIsWxGF2ksS0deC1j6uBFdFiuYptBSecMOmh8VBDFEvkMSvHvUVbssn29T+wZIkx1XR3wMGYnyZ8kBqShFPGWoSP/BElv7ZKIWqBox5qVMFQJ5WdKTAtp8296gg0CSwmRVayFJQk6hYSd6yj9ON2X3QGgaIYXTgMrkl3A5jTTtydBawWKZkdgWcGX468Kc+XOJG2lNN41Vv80ylXtbYr4wHxx0q5MDp9EB2TfLmGxcbtQ==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"J/1XWvnJjeKEojtDBX0nwFJNVh0ONp2GNta9HaaNBmzOxLDg1B6Ejz94NBwKQDWsZobRDU9YRJa7uv0QTucWvRW+30dKRk8B3FFLzofW8wjJ6aYPN4WH8pCHcVpFEgLXj+i0Ic+3ZwLXmxRdFUkR5xm6yw5H97HgRH42fu+Nx49z28ax7x6RTwpN8nTUxpJd0b1uQsxmMUcYut9l2+B5xuOqy68HdyRRed7O9BK3tKaXOiJ41tYN2VQPmpBrg8mgPEK3jXTw0PRZDXknt7tOR+RetkLoTw/vyJg68hO/BI/R2W8IkdiYJcSvJuflKIpixthAQSxXtC1bPwfzsnoHzw==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"l2twE1EC+epUT1n2Q5Vh9BN7OicgBhJIojm5mN++L7RM9ffpj+y64s36WF36ga2LwDhr9cI36BKyaSAVffuEhOyQP41pmJD5/Kzkabgnn0mbHY3hxCbGbGVNt756rZVEn5cKE5flduJN6F7NemTa2QLitxZjpcbnK040LF6rETddCeLEy/VyLkhHsPMPrwNV7kMObtyMZZSy0iuSXvJa1EyfPS8MWAtPaHA7jMKCcrBYNgNyu83S/EcjZMI32CkIXR/9RleREF+sjs3Dqw4f5CdlKE6uOsABnxs4c4f1Fw0FyvWUUXABth19hjvSBK90dL1rPGJemTReqDy838SQ/A==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"jvwFWBg7TITy16V2c42CWW87vPhatuCCskeYmkrMimB7pg+QX279cNYaHdjiFepdiOc965KrzzyJtWjq9yQByPkPA/ht28Wu3DVtGOyKFAMb3e9/nyCSbyyOdmww8Jl4fSBm1PxsRZCnXFXPSgEOZxQsIgmvNPq940mnnQx9Gmm/MPNlX1esgz8l0blfsKv6iqCRypTUcalFshfaoyyuy5BXzvtShJq/aTiT/UrmHFpCs7B58SfI8M2X2WInz2OW4Dwu/0solFb0UBRxeZzJFkGn80fejrDGjM8uSFYs83s7q4qDkfsG6mguoRH/QmVkk5EqUy7atiO9cbc8ua0g+g==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"q/nfxJuf9aT6+fidZfw73k4h0h3Uy0aE1nnhKTQx8eFKbM4pAek38Xb96vCXWKroBbNkjETL1Wnhoe6pN+mnZIVzrL78V7jvztvt/kUJR2wpDjbtlJ6DqseesI8NtxQrKV8KHL3jze24wts9pgtXJZXuP701hQDybCwErEhg3FTBFlGHRc6ZPHQTAs58uc7AvX3x5+FVTpktZm3e0EcTC2o0zhbYymrn8qqU9+IdQEW/MWMDGvG/Nws/AtqTkCJroZ1tuNN8ZHq1hvZLkJfzyK0M6B4BCJvclBAmlthir2H0zb1mvzMJURBZwXvigiQlPmtiYJ+eZ2LU8dC79EFyyQ==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"kWyisxyJcUa9GpXukWKWv7HY3oGbkOt5NrfiiaSVJAIK5qYVF1IWnTsd375mCOqmuUL2jyrYJRLatKzMPhdrmNdoWvOcyt4Dcr5rMtHviREAAfCc+saR7eRmW7YNl0q3LTZapnqrJ+TdM/dKN5G9YK5t8jtb+rvB5iQkHPxrUd1mjbqUoYZggMSHJ+Hw04cSsd1Eohy9ZLclyVqc885aLpkftN6pqX/pNtMTpBexE5TTtyyr44C9rwxpc8ldRNVSYHoKd/BWqouVPO54MMZNiA7yNnXC+Koyu+8AatWzbl1R5vlCWiC7FJYW6T80DFFLproAsWh7dNw2buBH5qozVA==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"QxbPM8B4mgNeO3lCTvPZ27WQwf0oIY0qjmj8l8CAK9g5VkMqjKWuW18sEgwIcaBfQOsZTJhF88sDJ2bM0DKRsmyQzbN2ogct9ADiIUYTp0osazb1uufsy7pQC+Nm2Ui/uGvb8lyYKQ2Nsd9TfBRx8hKlO9uTvcaN9jAk5ZF1etUzfN4p3DbQletPXJVKQgWOWkXD8U4F9BTHVK7IFqZ2bLkeCGppJfG+I8iYqz9D0r4SoojXsd3QvNBu8DeWR/6rrCyic53ct1K+fnrRb4oQZvREG/76oaqRALAyOKxDBQLvzuGyoSVxWfcBRMTub+dNVnvGFPADj7WF5LAgWqtGLg==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"23yJJ0u0uFGL7uj4NrQundvvktuFgbmi9A8s8dFmSeZB9hzp6FSQYd/CKFYWYX477UCM9IJx02knhQbkYyGmQf/Ei/QIPkdLxrKmfobpgzUez0HFrVEUe3I4jLuffdg2vAqk14WATfTbJXIX/3QTUDgVDnsCfFZEWAE2OG4GMFocTr56GesBSZp6V2WwQ2tWbsrGiv49ADKAb0vCWvTGBZiiG3j34d3tHKubkICJ3bcOWWerwXrwO+8PRSe34lDc4CbUngq0JeIDlb3fVEUuvUe1Lq51G/bj9YS+nIwFzaE1YJUxF8iCmVeFPo8pgMIOCqfYkQ8tWVC5t4R4jCdz1Q==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"FmBav3noN6KHfADGmCo+PRNXKzLkRGTmH8iLwEAXxGLqhX31fbN1Hnl2+TgjJLaTWmDmHY16jrpPwtZHETva71cXmDGKKfsMXEtSyz5XS+DSZKHQsokS1/JNyOzIPdJvFORHoWzyc128MODvjBMWU23nTLmgw3cogYAm5/hc+527yg4Ydftr77zSXoXBbO3r1oyTv3qL7FwOui+RpfH+sQ6Y9aGM1EUWqIXkKTfu1SfrAXIiu1J6vdoTLy8XTQrPcIQFa15/KMCUEte9Jh7XHzdWwNncqWqiqHoSt375hrDopMej94/rbqrOtHXo0D+sbyJCpSDPRckMkGDFGkQ5QQ==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"2hWqGdpkFGynqvRJqRu5LPUjb2/X0ZRIcfz7nww5n9N8hbqhXs1SVbz3DNaPKYVHJCGsKs+TNvgHIBWPbveTuR1w4mxHTpx3DUufngLZuwNBfm6gizjwC9QxzHin3n5lLJ1TCEZWJIv+vb+c/lcqXStjUHHWr6WQPtJ9z+3i+O2biW/Y6kNt4TeVXZ8X61RVSb4F3BurYVt9KCuULcMVOsOVbHgukUrBszm6TeUm0DmhEBr7kaZZeSTOSqFmdUhupB+J5zqIxBGlQGaCxXRMUr8YVktewiwmf4QU9oOU8/aok5hq0RsdNtqXcBOXHUtmOcBdzN4fZhuWN0K7uubcIg==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"kJ+yZMsLHDOlNCxQVd3iFgkzX5CewVhhSUpBziZW8CmYEncLaDF1bWpOPGt3ItMtsgHD+rpODAMnmtm3ESFYjJPOho77nLavNPDTmpDZwpVe+guO0GAErAjz8NnNcExLTcSM2kLFBx0eY8N5iLqBosUvJP5R/3vClWN7swE9b/tNyvMIEz0BMOUrA6y1YfHZdqrehs3O0P3jnOlO+Cah2QDx3DkVVjXxy7pZSHzkVJ0X270q9fGcXGfYO4wLRe4asZ7R5d+hMBCLPewjEi0lZdhyYk++jFBXRpKkxTXLKWEl+j3mwKYP0RO20CIG7M+jYqaijMwsGkpQhoX7Bigk4A==\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys!\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"AP0oc4v21hwhV2XRWA3bNYMZiADeggp/eOaLgeHnMq5iskk2V+VqT3tiA+ezRlH8Tu1IivAxD3xC8nPmqzK8knWa3MeDu9u6VgxxKgl6vzkqrKQ97Rly1+qcNSdMkwLFylS1sa3uhHLq38MrvSdk/eA1ieI32eOzvKcRxGjgKPx5FMgtKZ9pmDVlAjRSxk8JSfzX+HcdhjoDClzaq+pzUaSRnrMMuGncrEsZFn1A1ZbjYLXXKDPpyz94kQsmlpltq+FcB5Pqru2oNhGdrdKHuM921cW7oPJBwGtuOeqWx3JBmZ35NTJiWdWd0BEUAHnuxPZT7+eG5cg0NkugRImxbg==\",\n            \"algid:encrypt:RSA:PKCS1\": \"LSPSLZbiMdve6f5y8JNoKCt+oXwmZBUN6hniDS6XwIDnVJ5uHxtFKuCOzJsnpuXmR02HesVWmOT2i9AT7DTgGX2FWcE9J6Li+Uf08YFjgUDVJ6DkvfZvD/Nm+AVULmu3DxjlNP+tjBOrKukGJP+NzLourAjfEls+H4hLVyaKCPCvsqZ14K+RCGHj60YE5Hx4vWXIpI2d0x7FR6C56RFaQp1xD4LCxGy/aRSBE02xEQVd5AmyJ77xmT9p+F12x9SNOf5VHdYNRT+8O59SMDV+zqWJJq5p/fjZKBsQKoEAoh1tJq9XlNqO/+EJNAF0okqHozXiaICI82E/lu8OOS7sgg==\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"w+O0E1zVIWerFfUawKJYak7WEkN6yhFa1uhplc+fLhjemZSIyzzd2mYoAhOl0qUHCCn3j0caqr0mny4wvkeXOSsJ3jH1XyANaiW/OAwmWGhSqUtldnW1PbR2sVnomkTR7LoVC2t126/P6bL8CcWj7knq1SJKjeQX02opRNQpYcWhYQT3/JfxMP7+Q7U33NA6MFGoZHkHNrt84/1jWtJV5gjA2Tbc8sM6Jgc2NjZiX16G9U2g9Idz+D10iWyrC1VHVjmzOEHeUGsBc706AGkrfo4B3GrdW//03YBzRYSZAzjFs0Wm0szKGmvWPItthZBDnjC92DYlatAZRprCNnkZuw==\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"o/pbYAxH/4KEhBA1AtIGhm6/momDLNqQ+2PLTEP+9hx0VbS4lKpinEpoEdSM0RmAAN8IeycbsQjx1O2pSmDwyTY5PEBXJ65Q4rAYuI8Chn2RNu+2HRnBZbP8l4DAFKle3vka4wJ0zmLCk1MAuDgleKSL/mcFIHR6GNweOjGzq5rhf9pKDeBeoI6uljg/9N15Sl49gto/q5Hx0FtmuR9MlIfhdLW9nC9qR+8NXapgXrbPFLFttr1Lts3feynssnVAHNGsGFegt9/1BYhVgt1e9KBBpktibYBLbU82YkCMbgtSEK4WAkHmJWM9MHzHbzgpX7VafBRSF3CI7Q3Pbw9gjA==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"PTiz3mSJmMWmlUfvcrCITrEfZPcDWip50wLLNs+ju6w54/m+dONfjz4Bd3P1RpmixwXi1n67xKFjXCkcxcMbph62ywAFLrPG+p6kBVrEHKj6Aqmcv2uao5QquETYW5YJUTGAf0T3v5bjGvRW/sn+BqHpEYdYzS6M36awApgsOXyVkz7GL+8EEaP65b87YCZSOWDSTqpUcg77fOogBIWmZsdw0V2v5Dg/MazfKiqD+l1Zvic8z00BjxLi4O9SN4OJ1ObnMvRA1iKtaP4HHvyErRYhIC6iS/SjJErnCTdMpnPHbQRJVJriZ8CKtJTsMBcuwOKlQ2N6UGqj+MwSydzoaw==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"Kk+o0qh5GU7pOjL0NxaCxfqIlSQBhr7OjVzjLEbIOWz3Ue4yMzu4fO6Rp7V3CRIy5Xm6VSZHjdt0P443Cvmeuo28djXWPSimXMOZ2AFo4K/G9mM2T+8wXM+NYiRLSpgns8IPSoLmDUTDoCFm1JE6drLVgBwF0YdkQkGY6XPExeylIzrglQ0890fX8oULms2cD64D8nFijfIk9+L7UJwF3JUQ5jZ27rHOdoTLZymtwY2xxwURBZ+9SLO4gu0EGrZMoSLm0nc+9XSmMd63LekYj4zalUTrFZq6wIMPHMGdIG4fFLrznZijGbynsJwReYciX740u3vlhnx3nE6XjNulVg==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"Y1ICzwp8xr6JVIFvmmbeBIucD19tzDwuj6QaYfxo3AVQY6zIpAHT3WUcL1fQRrfYhxHzXqcmi6J/d2J5LCisL6Hd2q5HkXTO6+N6yrjOuSwvwgNta1X7jvCaYC1qvRqdfO/0xAYVTzwUXHYvNFp5Bvvob/nwsL9EPrxG66hFfXURXwg4N7IPF0Oa+bDG0/+Jl221xsyrkkamByWOwNgWd4rbcrWUpTy0HxwzA78iPivAmb1Pa+xIsqt2ARETluDzsNLvqdEk2u5gdQamQKb2nG/BSQdHcjQx8U8dk/we6xelaOfLFVdWlWSExo+aWtDKgFyactUiRqSwN51ua5m8tw==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"dHP6KJOoT7Ig7i9WVhpS4BhL1fzC8dCVY58dVAPqwBQVEu9d8dbTz0LBvewdD/xux3xY01tvKErEO43S9ZCWUCWWnYL7vOo6/PShBl8J6zu8yK2ngSMRERmY/feIpT/1V9g8vx/ATh/CYYwtE9pYyZR9N7OpJ592Zf3CrnGduSPO+fEtWY0KCJBOYUIb5jct8ZQ4YTqebk1aYX2DS3BFvpcY6K6gM2/VfAbAKFlDRU+oXbqFOZsSUy3SUdf6kdosEfX48D03fBPGrzh2ljj068hgMX3qg3MS1XvhD5tzs4FoxT0Xzvr8WzXrNoSdtGS/4LHlSoXserjimBWoW4HF2g==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"sB77+E7wJZGvc2/cLrGP2v7c1b+RSe/TCpyiYEfskg284ysKPwxPHGUl3Dr4zjrgk5kRN9byJ/4+zMinXW3a+Ri1GKyGaa24gp6RRdHSHbK0dar/jdhKl7BEK0i/IeBKppD8CLaVXhmC3rnf1xq7SO3hYcPGtpAJr8RRufzvbM8QCaNxRGyzDQofGs9MKmL33iA72ldGSund0DS6Ds73iGgTPJDL6IkiHTN3awshIMa4pw2ZVLgElGZs3nlXF3R7ok+y2N7e4XsACLedES2Hhc6AlxFMfLJqRz0r/4rt12IRFXg11sq7NZt03G9866r8AqaByR90u8ve+F4s9JB8BQ==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"J9yYPlaymi8DwpKp/4GOW+8k7BwS/+FqL3aUB5TwMCrWwCTw6KdSM/Iw0murykqWw3QW+ZsYeE65pmX2fw7EjZVDveZZrMAODMn+qas/mqkk2dXfzAmX8WYHZuGNa3nP+Zljd+FatrQbHI1C9pAJHW/lRsmhGS3KgPRFRdeJXbHQomJNJHKpyZCkFuY2MS4uCzUaGyIF481SV6W0msg0O22mos/cZ7RYD+Dra131yWOucvbOY0INHHj6iRvUn9H7i1jGMXxSACl/MKi34aLgSWKBWzj8A5jbZAtXD19BAURxIXT7X5sAiQYmOlx6Vy4Lxg/8gf8Pc2w4wl071CTCug==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"HJqncQ3D3IsfN1GhntgDmGIx58VOD5sY+kF/FT21NDmzZ2sZ1Rji+LTIIRVI3n6pOVVTO7tw+p5hZOKwvL5nzU3qIL20zqD8VnBcMGJrEI71t0QAEgF/fWu0K6clX52AoQ9vS9dw0oKVQeS4MIlbxy85cw2yAxTLBseAzcNWhXmnQcWAU8lhPv+nAcvKkAjkiZfrn3oHMaBMMBn6A2g/HzGlYfOv6L8wtmLR3h4hLy3gxxyR/GOyn6QCKzIf6aygi6/WEz6V4LHDJelsHLZlQeT49xzasebh6hSIF9+2/WiaR7SBMGJqIhqtHLmCuYIyO6vPnh3D8BYmFstHA7/TWw==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"RumM6BMqNnf2523vugTgajXZvaqvVTMfCAWWj2PxjytjHxihBb6D2hOcEKKEDDhlRr2g5mfrXFWe1GjANnad2Y814vDlUhFHFcXRezPWwIo8XSPSmmq9VfvcWQ3V3RCxmoFUI+twQJY36X68TgTMcvge0SRKQKfhHMTXDRwuyyWFLxmSuzjwAp8HcKPDUqZN3sChPc5DVDaC4+5TL0lBg/dPXHjS150An2hsUQgpdhd1LC+WMcjFnOsAwPZr9vGW9043RhaSkJwahyckhWUANIwfD2PRVAp7KjiQ9x6JQXZ708nCwRuaVx6uuJbdENOLIEtibtBYWtX+e8znH1Q4Gw==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"sOG110ohuLu+UnUTXoEtzAWAgoZBZPzaGX2Ercp+niA8QP7jf7Z/Aus6lVrvvwQTsXPiFbw+CSdyEUc7s2miWcNuMjN+kDSEKPSLVJHv+E1XoIZycVAS80Uiswj7t2id4gzwXvvW6jiJqbN7B+pRXsnUjndqnwzoDcmB9Hte8fIdwvQKNpCbfXXXRuDWMme8x+aqv6QYdnTV3LU6+cgk8ks/M7vtzNVzaT6swK8ppcxcskaHEJmN5MoSM4nE7ay/g7QJ3v3A4hSWPnqQ92bcTbySR4khizidoCLYiLXt5oVOOn19fZz4TD9WeWOQ7HKUSWCZtb9AN0KsLsxFFh7nuQ==\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys are really cool! They support encrypting / decrypting messages, signing and verifying signed messages, and importing and exporting encrypted keys for use between sessions 🔐\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"hGRauMzAod3Nd0EEtNZZ+xRo3PQI31KaK8xhDSu40NWaHp0DexelsuNmT7jQKL4ZycAKNcsdTPptxl5ej07YE5/kcBybwF64XNU2Q1mDYPPHjoEX/9Z6vihEtH82oInwg/j/7nnkW3P/CNPhV8d/LYyN2maGR/7Vjj5O859DLK20dlM1IzJ9yJXyP/5/00ziBl9MSkW56uslOhNRlLojkYtb1obt1VRhyM0U3G94shQo0kqMrz/8g7O9Tr1edpY/Hx1RLO96I5V8L2cbdHyw49vwCGqaXemb2xvdZspJGwUmAUhGboCMnWiNNytUB/HchWesdNurMw+55mvWGXa/tQ==\",\n            \"algid:encrypt:RSA:PKCS1\": \"X+pNC+F/PtjzHu1coJlKSs3TGf4N4bZEpj5MT2jZxqGg8pngbFMAlQ5T5+TR29foIhx1yNX1F7rzJrLrUNYlti7MJbkQA+Qskcgn8UfkA6WXmXX5WrKAn3VeKvqYquuP4NH14Nffz6tHV7edwGLBaxbNDNFZdi81BudMyRzcp+NI4ZLJ3XJuPVWvZxiCCcBi2sW7sxlPjJuvLRmXilxJRV5DU/2t7/lmQcZQBd3FWWuBnPfknJcMdyvI0hS9TAmRYd0vjef5VJ470+1odOAhjFl77YgFiWQagL7TEmxVFKdvTFK90raXgRwUlGdUVFD3YxlpFIWeaXAtx1lLRd4srw==\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"JpndIhMqiJCi4V9KoWii4Sl7HRLU6XrVyPQO68YmFLXGsRkXg9eR5tAhjZUiAK3spWzqVvoQInK0aGQ2Qgkv9OG1H4buprg0XwHNEdA5MDwiLMJ1131ZG2WtNu/HTA5H5SPCfhhBOh5gBDKZ8Gup+80LrMKnZkyLg5HAHr1SY5aoNhFJDvT3rXDnbRX3Db1WkW05WeCBjKdstqfEnUGpJu1PneyfGapml1jS9QO4wqiO1TGradEbK7WpajToCROfSYd+zH4P/CtkjY6GL3DjeYHd8fPv9q7TAL2TteHaVpARkoyyYHqn5ZNqpOZVI9Bm84lp18V+81qfAAbOyZYITA==\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"K5oEqdjid3PDag4Be5aIMZRPn5SPCtdVz014aNaNP6vm+BoKzy4HkhJ62uB2jj08Rc3g3dGQOCciZs8CpWcFRY2IsAtKbNYE6lMm9usAndPTzcxO56T7Mok/uNVfp1Y40TrF2TTG3Fn9j+qE+DuEqpc4mQI+8iLX54JN9b4LxPZEKO4NFNLMSuv3qvMT0aEx6J/bnpMg2Iwx9b4WgDTQwyGWuhs3hcrgJTrfMBa1wkP1Ld8dCF+rWn4jFcOBPooZj/9N4/0wThjvEULC5NxHrGTewHjWbvv7DdBgopwEVN0wcdor6Wvo6IQ4DIgkNHN7cgG6VSlLD0m+X8ghFGOMVQ==\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"MOilqXGEWJvTNTslUWQ4CVCBqZC/mPdc0UFI3NLA/E44zcjmY82u/k4ftpZR83L+HjxsxtMfKw7USm4MZUENh54up7tHp/8qU9QwRpL315UNEtJaB333kzxfAfa4Ypv927cM7NDbAdBjsbSzP1gQpflZ+tVTd8C7ZJs65lfFFS8ArjqzSnkPMnHxScvxc1OpbwH/3ro3L6Y0E8OUnZ6Uhlz90R2TwenMsXQF8h/IJd5z+o9NASEDzqeUzgXvU3GlwdsYIWdQAA79cPTO/5YtauJ1CPCtzeRDdeII8tgUJ0vzkNyZuyYLzVgqh3zmp2mz4u7rXCZEBnVhlHvQhSyzWA==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"Ynzdvt+Z/i3Rn0snGaG2TN1hdppg6h9h54GwHj3ChcUWyiE4UbXK2bsUZf76AIZrT9MLuzmjTGNPea7qYegrxhdQ6AcF1Q+QrYcQzEDhyf9nAcdzc+I87soOMirDsy8w21JE+9UnryaIzWhGDdAlFHexvDemKPjgIIwbCYJbgxQuHaUIKaDiFL8T4OhPchC9x77pFVB7xYxe8+cXkhvV0Z8m3tdtgvQqUhtWlKodJJotrDRm7tqfnYTVJA+psUV3aHeXN2wJLZD8gPEa5jX7FBFFHQ4nx+qXZtoh1YI5eLm2kFrvZjs6YlWi/yM5/EAmI6gbT/WY8cQdGrKvn52fHg==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"E1A3YD5LPZjpJef0Nt33gKAo3N90USLFNXbGbTUDzn9hX3g0/iJBnJGlOmagCdC5VR0EY6jzdeRvEJu7fT9jVNwOVXLd+j1r5cXpiG/YCtNKNB0TizIMrS29bBb1AlzLmjFll0yL+o54EDct8WQYnnK8p3iBRQDlnLsEIemljzuYH2z9C3s17Ir14NFugIHlaThjJtPWoPt1L3xMDzVlMN50CHovRKVLK2OuQFByX4i3PfAeBKCHY2vFfx1B/DGyZZmy6VxLRjIpmVyatsp2kUK4vACpYnIpH3A4X6SY0xBJ2+Ylz6TGgO8DGmHLRM/XTlClbPix7FJxQc9QQgtmuQ==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"meCIcSgdL22FnKp5+zT+bjAFPjLH1fRBUfxTdgoU2Q1nLkQWN3aSLZ/881cjlHtvFRJA6PRRgrqruCc7NjYcBAQgQHqM5R83cV2urmi+zX8P6zctETMMtvABKIuAVuWqvcPRRBiYxxINBQOQh3e5WrwEVA1uA6vcfMfHJyC1WDITb1SCwcyCjkGd6Y11RDwMS4HtHy6+Yh84hN0Mp3wsbWXtJfC0+kHeNKs/thLxizoxZlnkqDwTAPEUoCKKbqfp0lx2n1svI/+nXbOlF+F+zdu3kKM77OrUMCx1KfZAtu6oUR6LzY3/zLHQB/t+npg2nfvsvgEHH3F+3QELMO+tZA==\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"U7MHoSi3DD6HiV3CwWgsRPakHdOU9J4UAcU2V5SQ04yr0LvKSy3MZ052G8aO4o8C8cfLTvrjOY2WPnoFpcx0wx0sEyDIQvu9iMzwcmlEwZ3Z69vvX80tbUeB97wXgeYV/Sk9DWUWX5g4k1yv1WiPatIyp17A+9Zvx5oXPSOcOkmsmxiDGh6a9u4fMTsc0u0FQGi+OPeaJ88gP0My0xeO21tQTExvcBcxZn6jFixS3c818uBBvLEoNToSNVdD4otnPOuu9Qx4oPv5vZ0LRw62IpA+LjbKz0YVYB2T2uI2DmGM9TWO0Jj0zyVtNk/l62fD5r/O5f/v1aRnT0agFa5e1Q==\"\n          ]\n        )\n      ]\n    )\n\n    static let RSA_3072 = Fixture(\n      keySize: 3072,\n      publicDER: \"\"\"\n      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\n      \"\"\",\n      privateDER: \"\"\"\n      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\n      \"\"\",\n      messages: [\n        \"\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\",\n            \"algid:encrypt:RSA:PKCS1\": \"\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"SbbZ7sLt7h1caCfLKTcI79N1OgivGCOYpwBzrNa5mi2DNqBuSMQ5qwpHmtz2PgygvEyyw7LIR4ZbA8qH/ZBbQbNzJpl6W+Ur2U75w2kCpW+v1+gyKMH71GWvnewkyQ9KE7q3EdbzEsAWpYNKCM2idBlOcTRWWQ21aoGEdwqmv4djRgE89N5strIVR+YQKMto+pfRx5PhmcHhUqpVMFZnTDg4IL2/ZHw/IZexzb9KjSAVvL2TTdlqZCs7AAI6gndrLnsdVunc0aiq1gqApRKC4tI4HVlNG7PeZRMRN0qsfRHvjhNQgXohs6SzXAvsXjOYZG3w+6Z4bDBE75ICXV6x6GpFq9T9GCFivipAXY/eoentkFWat8Hj3pThYsdZ2tp5Qedkq2tUnJj71bFAoukif51y9tM1h841WtxpHn6q16+kwKl+Q1HETCaAx0HDaMsLPvvsSDw3rca3wv5Ha8B3kTuFPdIibtKWaNcEQdPSx95EZWpmJrJWmYYDjCbQOVJu\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"sLYZAtuSKWJAHe1CIOWbB8Qc28LWHq+i2o3egLhcUsZk5myFn8iHlQPpQ6uRN/cv9iDXr+5hAWn423JfjWjTariVEchrVCV+3P8Iv8R3UutGN0L5gbXX3VNgdgTbBJG9DozFyc2lkW+MIPxmprbVKHmFpXkMTWs3SCWlOuzYoRazR9LGrApqLxk7fm5UAn9Z26jACIx3HsiVYQpwZ4g7TiHcGlc++CvFR2chKbDpFVhpzQDuGf4/DeKh9MUFlvUa6YpAacpJKJObq7PoXw9JWpWVRoDshV9h/lV5rrS1nGAxv7bzeg97bFr5aegEQwrIJ810n4VXSX9/ESabQuaOwRMaVdsE0dYrS3Lw4BsvfP8xVzT3Rn0R6hJA1mZTqecas4IsCVALmyOYNgv1GKemBDby+XJQklHrCoqPwIQMDWbaDaVvSlRCUoOIXfD8paIzQwBb3mBqpFXhhqsfRlaWOS0Xyzl5Px/kRByzEDn4kKXOT61+ZmBGTIGpHvD175lX\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        ),\n        \"👋\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"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\",\n            \"algid:encrypt:RSA:PKCS1\": \"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\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"kHQEKVu4wSL/KU9px0pkuuRD84120O6+COZbrvYnRfrlbZiT9sMaVEUJHbYupEmAdH3eLdI+tXy5iJ1D71Lv8k032oJVyVIdjMin5wQhXhuQ2tRaa+E6V7eUV9+cnFpiTZN4PLloe9Tc+xLqFZUTeWrMU77G8sI6XQwsrKKf6FNiqJBClkluESLIs9yzBnO+onTjGnNOKX1QPT470eYLY66b+FrAuh2ny9axa6ob//7G4otiwRbEDgNpjjpWFAkuGPUc8eOIViLZVL/tigweXywDlDhey7uM6i66pvERl5Orpcu8nWhX34ZqHB6OLRv1XUudCU+JKmYSnrqybd752EcJ6/K0cL/jbY2do+jALFSNxBt9QYt1vgU9wMNiuDlNmWtYL7GqdcSiIibrwSPrrwA3yNPw4aHrgHKDr5wLO5kzOIpA5vXSP1v/AnGHWXHe8uxcTCD0nlAg4lNcy/rj5h5bLSqjilR6KyJ+JLT2evxiTjYw4eEZsYvocTBieTIV\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"jHqxfKpOIX/yKLQ3hrMN+ADPdLpkq0BOarl9Od6+8qjnj5oXvVGLJKGQflGSZIEsW/RDuT/ObOnq+mVbdDwI+k2aN733IztgoIE1SRcCfqOj1SAdUL1y4BTempaAQQRyhTs0bPhwNxnOVv50Iz9UaR20LTru6E3xYUQweSGtrADG8C3aR22DK/UKOkFjYLbu5k13zu2rjlVUeGeAh0i6INQSxig70iqcDAwxqxhr7bF/jzx9Kn9k/6L00ynefG66sLLMmU/rOFYe1qpNUnmpWWvZx8XW+qmm6QoONhQ/uyV2hjAcaQmiormjlyy9et3jctN8Je1E8EHAp7VDIagNjn+SD/60CQ489x4ACaNvHRlz9LhM3sg+N3Z2/fPc6CRhT25OV86a33EDdHEXH5kq8zEzL6r7N4s9eiuH9ZMv+5z6Ylmd7bvaPoasW96pYekTG1NWTZOI4vUW36G2lQmm1Qiiqft0NTD8BM4rLMJP6cBvoM2fuQ19vW0biFNUJ+qZ\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        ),\n        \"RSA Keys\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"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\",\n            \"algid:encrypt:RSA:PKCS1\": \"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\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"Rh/KvcbbFVG1rn/VohpSyc0QmmMmKYyrNQ9gCGWHJPS7rYKP8y0gCU+JlwsFznrz4XIzn1HuFTErqU8jIxccjTBD/t7//T8v+wQAxpnxVaLja0Od0d+txzFY6VpZkMJV0bs8wUThrLNUOdMfdlb0mZ8uceWYHCzTE5DO4rB5s08XAFWurBjDqn3uauwi0M+R7yNnXnm40bmZlWK/STmKyiYuKR43Jb6fnUykkqX8O2+85URKZkVAL9TzhUUQf5DJQv7gltVihASUiLH/cJrtpi4+oQ9+/Pesim5sTXbgkDl2/syIL+SlR8JNV5HLrpJYoIEhotP1U2ZUaFkiFGMQnR6yOQiVEgral/pjne/BgKWEa1bvfudWKLMcyvkCjw0WNC5qUMiULsdgUXbYh1ZwEUcB66HRWXBPHnYNbzoczdH+75jeCmqYew0EHV1dStD1tN1HdexnHTkoiM3v9x1qFcZnilI/RPTPETbFjf20z8703Za6hVgfrX4S3H8UObOh\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"buQOIoJ0Bxro3D4UxrGId+iviipNKznLg09Nyv2vXJoDBC66IXBYI5nJ9g8Hfa7sC+Ou0ZYAmvupkLij66Q0umA5+kP0sRp0xLRJloUsqzqD8Xvqxm/na+XOPDpdygy8LXC5aXE1Qt5MGXXgkVvRMFhOYI6UFj19OpFmidKFX4+MznwgUiVz/k6f+7GQ3xY5jO9WqVSdD6Q3ISY3uM4xDDsUKaYojNTp+Z/3f3TgnqodxeBbA92cWkmmYqTzIZcKMpTSNM+fWYMDoIZvHx+r5jZ2uoXc0YKxr39bBW2SEe6WQF6pQDXLMUzn9hyb0EoOR75FWLYIV4DD+/zw5fYvEE88Fww73LYcXUQuqyMwXheOzJ5hQg5Q7W6OfcObT41zyqCaJujIGLX5Mnme/2kFa22HkvxZTb8dGJRUEoZ0ycIOkl14N9hdUdGhLeO9BrMsDdohL+LbR394JYYbSl2INE5Gl+hqr1j8gnr2fah+UEZ7Sy6uinRt7cX78bsLhe6K\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys!\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"djrMGfalEl01C9fedRjSvlwhRLkcMbgS/uRXdGlnwnBmnlQGCNUx+bBzBKHxkm0lNW5/YWzI5n9xXn3uwGWunwid5/gRvED4aA8khW3Uuxx99v6zfR7h6+oIT1FDNX0zVJNVBA0tC4gFl29uqqCVh8LUHlR8/TkYtl3nGH/niX2JmW2trwmfpfx6cc7AxxAgPaipA9tJiKhQP09Oo6w3iIuoM5691gidhtFi3IVXOrJrS6xG0N8ow8vnycQ24cOPgX8QOC0YjjKg0P3TznNcsqOoSA/3iU4/zapkjXTl6WIUrHGfRktDhnLD4eILCfiwZeDKeZxVol+JCC2Qlpd8qtNJqzS04dt3O0ltmk0aeBeITYHzBP60hzdoQyMUnngXmn1Xu89ASCx+LAji+aTaXGuxq0dpFqSRI5f/W6iJ9Q470xDN1BQdcyFNVRpBx9xq3FCanCaZu4hnTWxU61tqgNUVYnGwNxTWOj2PbYY/p4Tg626W6MANWuzZ8IDMwAnu\",\n            \"algid:encrypt:RSA:PKCS1\": \"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\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys are really cool! They support encrypting / decrypting messages, signing and verifying signed messages, and importing and exporting encrypted keys for use between sessions 🔐\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"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\",\n            \"algid:encrypt:RSA:PKCS1\": \"gob1OHvXp4NbhFCz/YjCGVk3Q9EDkjouMNHU/cIA9dggiWOUUVfFBdUrVmw+xT83kcwoLghHSQhB9G9SOvP5dzPHGa9436ydRUU8ccyfR4xsu/ML1utXMGtkx++ptOAGLjo0lvDWnKEy4PgTgro73R/dQFBbNOoALMFc8QTp0jdmsRRRsAzt1gP0coPHYuEHjce7LHrtRNjjoicdjw///wp96mJyv3jTN2Ey8i+6Ujdd+JUoS4kwzabA3Mh2SI3AvMvnWXXyTFtZFdqwJcEGLA6ImYPtMnTuWTa43tJ3A/qsDF/9Oclnj0ajvsAH1O65UbhQurzEEA/PWJHI80xjwsA5BwFtxi6JzA/A8BcIiKKetv8KhZJUF3Fqusdx+oaz8mcqOoIIn5hq7HEqIaaKiRvA2decAQeZ2jlfoaiTpbaU4i73pl8hF9ryqEpr6U4tvf6S3FaUh0PRZqhAUNeDYQJB5hn1RnJ0pF0sulI4Vu4BM27orRvUGyL9D6gtPVdG\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"fSb9Bk+9FhQ1AO5PX1IaDpJ9jjQhZa3MVOr3xC5sm1vV+nUZCpultdJBFweFKGjhQfdac5WkxMraXJD74weZv8PVuDTR0TINbc2Th+b8MGmcvJDT9r1M7l74ObTQtEAjAVygZwnio2TL/jb35OAYIOtv9Pmb8LxdwtgCvcl7Nov51bEx1v1HRIw4vp0MyxgIy1wuEQPc41O81WuUYWyv1KuIFSU1UkGJ2RQcO2b+5i9kYeFlqrFRs9iQsrM8AuDSKoqUYmwRtCdVBOVU8eKKSeL2ZIVVU2xfeCBzlwW6ptMvRUPeFu6PCMEZG/EN3BLVLbRoLOClejCUupD9Afjp7r8a2KFG3qFk8srptMZ+4UzzMoG4kp0zzoIjc4gcZ1BKCh7KCrP0IWFoWgXp0sjPjnP0D+nnpOG5+ptXrdyFzZolN6R0gfpQ40Aq8GZwt4TJYWbab2YiTGggpxuoYfIkikzUOGxR5qPjV71TLoDIyI4ojdBTCXF+SN6bb4PTvasP\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        )\n      ]\n    )\n\n    static let RSA_4096 = Fixture(\n      keySize: 4096,\n      publicDER: \"\"\"\n      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\n      \"\"\",\n      privateDER: \"\"\"\n      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\n      \"\"\",\n      messages: [\n        \"\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=\",\n            \"algid:encrypt:RSA:PKCS1\": \"\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"io1hfWK5emPka90cbjukVgqd9BtIQzfCOX6+bCyQz/xQY4soEhq8ScbpLqY2SdLMHXGSyShpP8Itbb5fDjboCG9o6vMiipwndJtcR7s7owonFu2U8JJGjpcHIc1icOc+kJ+mWW0OjJj8wzx0mWv1ZJ8hHQ6AcNmzBlRjJdvvWRwZ0vJRh7sUEoOH8xXL0jmEi7JdbNcE9OvEN9ZueCVbkwN8WzezQAzzlWOYRG2zTB3JbjEUAODDK6QWMEYFm7L955dDA34vuzpLm6swZTLOlwHSvHG99G/m6twOou7kT4qxm/N1p5uyN+1AQovVGTCZc7d46q4dU09N6JkRZ2oZRIkHhKXa9f72sKyKQT4DF+Kuzg/bkfVf8Q6q3a8qFAEBcQ9rqCb/1Hgw+M/B/XfFgPC74a0lgz9BdUNkZcQZyxCJrrUUAnbC+0+RlBXdwZw436hng3utiZgh3Y25QN9buidxfkOSGagPPwfDm+Q4PUi1vC4LnDuSY/RRZc4kqMXWDRKOyfxY5bZcup2ay3I6b/3KSI0RBXCWWk+du8w49WkAf8FTqazHilAcf/GM1lWanRr0rxEx3BoWRnX63dZJkQnIWrO0IvVPGHM6Kb73jM0pImgTPIg33J23/zO0jEx19vMjcE3AB0xLM2o9Yz+Yp9EguWjLoPp8IDe9jGSBYqo=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"vjT2h52Ib4dOMBIaXsFxgfWCD14BA7XuaasMsvAeVXtpGFWbdIc7juHcSG22nzRUvSFpJyEFwzkSIoBfyVf6smJ14k2Ns+iOMAM5g/gHzAE5lpCoX+1vxQhutxFr0/VYKy9Y51u5Qp0DBnBHQn08f6zJWeULbvN7CW6PiEfCi9HFXGlPWI1jS4YbM/N7C1JqGA2kLS9JCHjdGKoMXrsvKaqurBhiQGa9mD7zs6g8EumSZcnXldVy+BRClFzidCsCZihZu3RDleEhW0jZDCmj7tvhJcleUL2FfqatI2QghgdOkJEzv3oaUqbRwI6f8klb6Lz/US8ucSl77t9xBhwOROA9W9gB732mpADUQrv9KO1BXJwJ64YKouRA4JwAGGRd4rfuvsxR6JXVvd7SdccW/tsLxQurpsmFUBrO1jIt85kImnYpSCdlzXNduLinx9psYVK+b369CP5CYnWYveMhSQRV3A5XoiyvEuW6iKYHicYnteKoN01OVscvR5iQVBpmYaZzO4QrEAAHTT40BH4Ai8pFmt/1lOYpHSzMfajIGcxw/f5pmip2KvhjJ/U7mr5uc7R46JjAFRz7DJZvvp3sQS0QhZ0TlF4TpqUVboM7jludKc6K4oUbB9vlpgPOTJKBDU3m/cwD3vluIQXJB5RyO5UtlijyHYUjSzNcScyeq8g=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        ),\n        \"👋\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"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\",\n            \"algid:encrypt:RSA:PKCS1\": \"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\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"eC1NYUeo3mCJcKJqcuQRl8i66Ykdy6NGQAgJNgsftcaX/BY5+W1em1LDNVFagmy7Y3Um6LjkCRbqdggAWH0iE0DS7NJLFX7EfEf+r7n0bi5DjPsjA2dktof6os86jke1/kfKkwBJVQ/FbzBjvVxrq5cCft0wwGQvTagD1wwF59+IYQFUDJv7nC17xwpk2ctPXoM2RfWlWPwmhQKxFrBPVrE6vng3Nr9SwYceS+CCeaIdWdg7it5Md6ARrUaHOqubsN5xMszH4pysPwrTX+ndY2PLqorhOB3+m8mSzXWVC2VGYv96aGuNO1ihUY0/vhvsOn1btMr/O8Uk+gLduh8WbNdtYXik7dFrXhcOtmpOWhFKg+MVwDgcvWje9tbESB/H7u+wyB/0qaxA9ZrY0cjurut1VP9GIJHG0BmooHWfQtrqBlsLFhGhklSHuomjq3KjmFEEtVWC+xfEyrnGFS+YVZvO6CqAGd5wHLlAjWru23tPv22EXjA9I5h6LjQjmRB81KpAvXsKb+3GB8YA9v0jIERWzgXJ5Ip/+a65rOpmSLwfmRLPjw9G10PjAZEBrhIAjTUZhQFu0Ito+MfVxpiwPF/k5WCuhNqntePK0fwqywvQmzsRoO3ZNbhaY9vehytB0CyqVzigXfdYHRvAwC4RJ2q+VWevPYiB6utFWzcR/a8=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"gmXFm7eKWN7eIt1IvCKBwQR1rhQCZH9KHqBwHOBfVijT4pM6l7ccgucimxX0RtH/51pQblviLhFFCTMAz+Wle5aPtda2zC1U9y6mO3ytsQcJ35u//dggkO/UILESfHDkadIeQM3usxaLK5GqBgxKCg5S2ivk/m8Qi4YSOgSV44g3cAOkdnwsfiKR3CFj2gO6l3aW2tIhDHSgds4v6hqhs0qLU6xLZWUQX8RDCkVapTEZjB0df877HFiIINUMaWRpo1y+nIwaNJ+X6es1gTMsBnlogCJ69aKFhkT/ryiA0VTlyfpP/ndJXbzEvbt3U4fSBrp+jR7A6/t/OJxm5sCrGyYfeW/UmSa1xh6vUY6XCCEgrdmVyqQ8hbaC3BPKt3tDM5CFRF8SljJcLptOS/sJZMGEx+tispZ9S8KqGAqUWV2CVYT+cqHUXSH/4E8zeAuvnT9pePEZaE29P7nLYOBZul6wW2wNv+H9J8fMXlJKeM3cPYFF6X334GRvhQbomoHUm8hWMsVEvrGE6IH6HVxU6nYu3EphmLuuigBqusMa+g2LpYPGNZEE0sz8MJRi0ygAKFrMTlkGqZLGC//oOqcSIb3trTGSB30+XPEXdq0gxtY/FLmGQTpSU1McIVU5ZoCn68nzSwR9L2w2IgcDE6tfLXLj8u+4z18AwzP7buKpeFE=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"GOk+2sarqkyWvSNVN4Thu2yfOmfWiHr9Mb9xPoYzgGutdqaAaD5fvHLezw0QW2QVVKO9mHZ8yShtOouioKsMWEjKXzxw+plLfWyAtvuwSapcm6ImWl5+iCi00Wt2UyBCMn+jJhzSSupFK/QZEV//pqmy9EkRBGAtXjlUOk0XqMnksUGQ5h4F6SyTIJ131Xt9cgzVN5h0/rIcoxniFQ88mq9FDiKaL9Yt9zJhengGEK60vl3Fpu5HL3PMxg48vdlOI1M4GWN96AJdc/BgE0rXlyGnEEE3Q5y6UetZ5l5dxTJKVtpQNTAUwVatLnshlBNJjYN7bldELEVdfVj3l09HIZYOVjAiCWjlPrH7JhfgVm2J1hYDEdj105yAotl4s2Fk9P8fYPfE3tZyOqKTaGxDtEINMdMPjzqcFPwKpazIoShSNFMyTu9xudonSwZk8HNi3XRhp7iX2cu1eoJ4enAkm+ORSwLwRFGR1E5CVLhTZ83gvultGEdef0fbzJyM9UGDk1sq4vlUPbNXz55sAGBoCPOOV8Wfw7h/tfzsJ6s9W2u64141s8fs5gVHqwqCGJ/L9HsSx6HSYSDFaLYu4sm0NS+6lcs/lzN3ffFV3dfTJOY1x4a2+gjPU03eKdv/YoZtzijEM04TjLPzf6eAr7/F0WmmzzdycBCEZl9eg4Cyowo=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"iZPHmN7uK8r2jVkUmBdqJsgPnLbAQd9HwNErF8hnHowHS/W4tCcFmYODh20hIIok00b9Z4BGOlfs6FPqYL+cBctASqHR8FA1wD/ZitY0pfo/4UEOkM0qFuqAJ6iKIyQq0LAzlZ14o0wmpw+36fFEW7xK9zXq4AL37MjKn/OmuFSR6Tz3Tn08jkU/pfONP/YGdC/pQe55PdVxL8c1hjViZQVNoJbZDSieHrwI/wycJFvihJAFsFsdY8sa02SNqTPsBtWTlByOD3C1+WX6IZoYxKQELEw30jMQJjs2KU5eG/f0e0iwN653cm8fGw3AjPtN1CXLGDEl/gdSwHfX23972R+TZi9QkvCqXg6N3xVhXZBSj7RzI+tR1y3MFJXSqUOHgu2Vge7SSey4HVCFymExCVChWDwy7cxm3frV5rSBrWpOTJrSDI27TaB0WcC+wGGrmFavzHO5HsXeJwjUMr8wAVj5p0jnm2i+qwduThmbgMgQCPK/nG+FqGKBLA+VtFDrk4zQ3WFhCUPHhb1GKBJiJqMRGXzs/IpQGSmpFKj1J1AFZ5PSAezrCh28lVDStvt5h9JfzXmMJcT9SWQIfLmK38v53D9G8UcaWD6F0XLiEqWHaC6RhVYcpi0IGIwea6jBEKwIOpauQqE7dgT3iHM7/N/nwrjW8hQfA6bNy/d2Z/k=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"Jv8LKcl80B0/1slYYDryZDHKq2rLYVdmJfef993gM9G1EqfjZgXxtmgY/gjhSk9ZK8PfqnXbd9r+xtHBfyqCTLg4ApypQa1ir0dHzvOZsyaj/fhILG/C1pFMnVaIyFmUgU2N3sgtFJz3tbROwiwfL7sLt9EcIFSIRYLAuYVI8Mq8kTRv4VJYgtZBQXh3dc7sbtNGdeNuvT7GasBe6yzNwC5mDwhBaAb4B5POpzruyf9ICV1C3RrVJuG9Jujod7MWIh/dQir13OPgG+zFCpwLg/MFLK2pI2m3kzXsUxh4QqJ48F9LXHDy3i0R0uWYGNdl4wdIrM1cgYugksFSgmaBn394C/nL6dPtMRhAxUTUJehcw3oFeeTWWUx80G2BypgcbootMFnOEZeJO68qp/r8J8ffw2T3npuLRl6V2sbXCErBvq9tYdkR2z3DapGRVhE1q7g73OhJMveOkLwsrjR5Fr2sjB2+utO8L55RAnSLqOPKxX9mT+Mjevjwk9uGbxI8YTQ6we9pEwQUJ/l7IWakIJiVfrg3Zq9WAP8aLnku9gmhciSawNZpe6LGqdzBwwW3g6lscUceHpQ+yStLQOzpmrYDZRrjr0Z1TaRfgmHEJajLCK2/FKR1YpN0GxIkj8LU4tjT+1BDM0DqNhDXe7BNHpG5UeR5xifMJU2+r1avf44=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        ),\n        \"RSA Keys\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"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\",\n            \"algid:encrypt:RSA:PKCS1\": \"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\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"jDhhAD3SKdB9foLpSM/Y/+njoYIHzCs2ImlXRcHTlQZXV9dGejae/lcOzr147M3q6Kr95g5RLo7sBLOlw2MQS+toSAvPM0GrDZRJ5ZB3fEdHs0GcmYZEIfu+7h6TmU/Msbl3twloh70To/h7CykRjDxIolJx0sBCIzmn1pGDxuNJtaWf0FEnj/EvM0b9pixdN7b4fOxG6D7XTuq3ZEqWpxqC7pCZZzu9piuCKCaRUK/0nU4M6YGwPnI3Ndljkt0alIkfitmwBzjKwYo65rNfq02d8NFVZ5eRZhEUtfpTcqaV5Y0jSEM47MnL3kUYIVHjhYecLU126J7YlTdPTcOJ7gM8cMsrEUQAVCif+kfaeeOsR/cSej4yyQjQIvVP2kho1zJxlWX30sYoZipzoJcFdth5IEBRO2AS3ZCJWiEagDjClOPWSquX3XOa6QKjH/4aVVfdM5WlzdEIkNxeI8i04mpgtQnOOR2NXOy3HW8arz/+L2riVbf7GjWQ09lvg5h+mqXCIkUu7j0I9SsHahTk6bZQcxZJtblidFXOLQP5BKst7F9FGfAZmaFZXTRKNYyHf0mxpe3HNEEYGDepUJ686/FUfS/W7Qv4cEtFR/Blr2K7rwOeqZYX9Y77rSCN6XOM+KZn1oCk3XoIuGJ/tVaUs7qtHrAurRdo30e7oCI8TDM=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"x7s2nhZgMkvI9/dauNvKO3BAkRivzmuc20t+rvjBTRiIzk6hx6CiDbNcaMtji2ZB26okDYeREaHz9QY+/5BiFO1Ub88pWMmP3lKCtnPwgiapOJgOHA7HIWZ3L8v240prf+HgoIvZYiMsuUNmCtExgG7+O2FsmsMXPZnTbugCgU6ieVRwXySWpWE9mcPvI+Kf64toyWIkEKPNT6x+ry4ucD7Qk5fbdlX9PBHzQljymUMqMVtXn76+TTew4GP9vf/JjxHs8M+2ugHMFSMamE0cBlghBd0lnpMLpY6DELX+zto5T2ypdywAXvSMPFqSj6lors2rJUvf2/iGnGlE97Bz6s2n+yWVer5mThUWbCsvzF2xZU3akVJ/tAhMvXnEO26QDFv6ERYytNoDCizBvsx2xn8FU2npmufXwSCcM/Htxrgn5uP5yfMjVt0R8VNbl2T3J9JxmqtlO9o34x0v46tyhGJsS5iRZqv57WKAuu6oHYTt7tedjyN+FZnvrURA78Uijg63VL1SoFVde2nXxaKDAjMg8/pvbgI35cCqiREHLGpR+M0aOtxUTZD/OtfZZHRc0Km+gOjJ1YJm8A5R1VpApVK85qEiSFtROsLpSsoncMBslJ46DQJTeup4/sJB6rtAVDMMYUIKc6dr8xZaI4pZ4Gsd4aaBB5ntKCI+fqdAqPA=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"UQkToUyUbNQELROez0WEf3cWJti+7sAhEWE488y6JQ2w2F9CImcWVTyezAzt+mUs+VpFEEDBswqO0Wvgsr4FnpHbAIqLGoTjajbYmRRqDey5vqTbG7bVgJeoNI7a8nyXoLfSH2be58fK8JB+HPPdMFHh/8ZK0rRwW73y1zoyXqNQpbWrEaTSwg88+AJ8PScc3jqVd6192LAM9c8IrFrfSsmWHJ7PcGHoxs5Q1UpBsFZLoBkcvTPacAU0jb1V3yG9eyDaU8Zy9T/cMrz0WsM27herQb9wAecJG3rVK4RZ6bwOd1uiSt2xcTg3v4FbYhEGNH8LDvPi1HEJKGFSnbz4Nd79I+WLXqE24gOUKqwpKBw1NPLPxKN125la6al1ToSZGBBZiyRbtGuMwBOgnPBlAsU+LnvLRCRilaAlN6TuNl8lixv/no1j4jf32FD5f+xfj7wlxLqaWkqQKx0UXkhEiTZ7lw5LaZwCQa06w9jV4F4Jewcn42TrLjQpik64eAyBNQHMBhEnGTMYCqWUYaPV+rYxEiViezqvJCeo307AFnHXgXXbnkQriaGANLpyMGP7GyvOk+VtfMEXQZ5OChb+0cp4Wn4u+scpvhmKvD2t7gZiiQhNBELeiMENc5E6LwpR13eoJjDQ4MHWjPQc/bAZfqH6WHAXyPMyVCjTYVKE+aA=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys!\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"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\",\n            \"algid:encrypt:RSA:PKCS1\": \"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\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"WvGFjDp+NjT7f/3zGVkhzlZg67ggmCdClokkNm4l7SjSyJUnxACUX06dn8DdbUjfAYYdp1sgU9F35GkuaviXipnF4p+nPvaSYNSQIApZ9qvYANiPjd4BJjD4/upaK8iBJZLm3s7jo5C0MSjRRIkFkD9gbDqDqz6B0DqJpnHCZ8A4gVxuwS7Taw6+3xwolHp5u1Sl8uxfiyYBqsYNbD5FVAborL0bK31l7jnoUUy0xAhA/7Pi0IVWVxkhZSIccyKwGQ27sSwslLwP7GffRiHX1dgL5m2+fJ/KtCAVuN61PWoJTWU0pUoyFqtRPWLtxmIBqp3/nLwU5h7LSJfKH1gdJBQ/EHr0yTNj1hUsghvVGNSvWHmCIQuSnQj+2m/mgC1CRx/TF2Y1zsWof0cMkLdKIqvW1druJmLJjOA3afyXcbHjrNQbSzV2kZGp5yclRQi/2GrnkcYWuhpEmvppCmO0XyJJ7zEkNLaLxVPThcXfv4IGdHJVV8ZQ0K3ytNkKvdIesO50/mkcQ1KlrjlRbehM4ehAJAzQxqlyfAFRTTRyPjP4Y3ds+jiYR7OW3tVZJf92sJcpp+By2txBtLjZFAW5EDLQAF4uysRU56tYP1qZZ6hE9iAEOw8nxHuQziGJtNeeP6pLk8l8MGmshezNNhCXbxfhyON8yk7mxPqiY6NEpr4=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"hPCBYxTh+6YInYogLRih2l1ngMC2HFpzJ50et/i6MX+4GpqezEnpW6EqS6qBuqG9GVv+047OeO6a6m96oDUKG7DBU6sndZOoYVDuGR6XZ2rW9sqUyFOqblRlqR7Y1p2MomS7jLlCD13LtDR/h7imnqrBX8LLRvSkZslDVaw08j8UJ7MYUPHvrtR5327djmIfgS2frDrmpJmfKJcA1V3RFnDftC7ZU2E7M2F0nFN+b2zKw9aSLqhzRbO4FtgKn4Hu5QEcT5whz7jLMSCZoFP91q32lSopJIZf39PtznxxGimttI1LW+lzH42qUfRLUnLp0PUlqgyXGxdLtajyIvmpFupb0vm9p1336QohwYyvI2NSdHn/wXJ8HIRZbStrUAwenF3hEwD+dT5eYXv54phkpMg25RszFV1lGCw53SE0PpCl1Qj+TY6kRCqRNyvqxJA3ywdWnFY2Dm/QtXVRNtRf1pkhnCL1X9fI5Bj3X3YV+TQCuKQavKX8rMk+XGxAmjAyKZS109CSaNsaXe2rSQQ4SMowzbw8EcUnN9VbG9/JgmDUOu6KCwJtu4q9gzra1kuxyrlCDrO6cn5ELfLau/cKGIbMbxjklqkFg/1/SlWbEGxGohqPBnRRWQWs88sUXEgTfMdCyflnfjJ+Ofauorx+t/lTZfyrGN2N0kZgrdhv8EE=\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"I4SK+LMQBpEU/XlK9pLSpFFLafx0q+pQGIMfpZPEAnUXL3FSCxZobbHasYSzyKvwqfmGXc4H7wxdeOSp1ADgVcN6e2YyPo22jShCIzS2mjMDVq/PmZp7tzpKGPhFa/+42uGaJYVMQX1V0YDGTljtpie/2xDWU4I8BfGdTyT2U1PtspyR+ldW1DxR7KzHUGzYvm141oLutXr80bMT3Pk9iMqYigcEu/o+lrUqam4n/HHZ0/PM6HZptkgyhaM3r5/4DqcuIpiThqxDzEt1Lbn80boz2S9xJ9u6eJ2jENq3DN/iD2BtRkKyh5NyLs/nC26afedV/dj7R7Fkuxq0HZ7+/CIM8L28++chluwjY2iQzFJUXJ8Wss5eU/ZHs60mWZmRh3180J6Wj8buH/T/7fE3J9ViGkPzbcENyiev7LU6uh2do5aKtxr3cjrx5zdOFR23E7q0ci5mY6OoGrWHCyZ9d4LAg+938HO05LtkbxZJUZD2DT5lAkbde6asGNmn47XHyYjTJ30Zxd9r1rRpcSNPtCyRiP6zLe/pQztmE+d78evB9vUGfmw26HXBKN621407AKdfGvNte9YLvJ8P/SvlJy1YQ1plWjzTkX/B3U5e9GkR/NSJP2wQ/OiXq/ns9eO1pXjesrPEB+eES2MTQX3UBuc0lnh1FJqB1FrCKJlCq28=\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        ),\n        \"CryptoSwift RSA Keys are really cool! They support encrypting / decrypting messages, signing and verifying signed messages, and importing and exporting encrypted keys for use between sessions 🔐\": (\n          encryptedMessage: [\n            \"algid:encrypt:RSA:raw\": \"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\",\n            \"algid:encrypt:RSA:PKCS1\": \"LbjTnod9jalsiGR80n4slViv3auqAlqXL7+Te+ZnuQAWoInfjZjM4Wx4j2ITaW2swYJFAnB7N1EGVUdeMw0NHncTXXUoTQ/wuNhQefvFF6z9uFq4NJP2tXxhWc1H6/W4urXmlmKzbTAf0CKDbdiNjpnpXijg1hlkvFj/LOMn19TROpQfQyBVoBGIMDKndthZioMD0+8MUlThKLlH7f7BRpx2JQfn2KJ6f+YZfg9j9BHGWK0So8oaqTgwwPhPruzIMEJa5cFak3slss5gIGAFZZ5IjjnuL7OXH7uV+ntFo0Rv4kd56w6rrs6rE7o6iVNtYhP4Rzk5qUD2J0WTeXwj7tYEpGiNxNm5AQ4Bql0fxzVaV+zCtkJdyFzucLIl4/FOeuCIKAReA9Z1GvGVSbWoMxzrQVM4uOmmIcKCFLKMHsyW6kdtZXnvEl1BCJmkOdxTekmao02SZqWZh4yZV9fhq1lcy82OYSAD8Ou0dFf368HFFZmpv9rJZqOKKV05dWBFr7iCdrp3aXTwvs3G/uYsCP3Lng6mIIXIe+gzHR4+QzWHJsMZHlLVzGoYL2KLDC0SIjV+j9X31QalENIyTefmTrLxt3JwFhUNO2vF0w/8ZQuXDFEQswEB0zfharyJL1WFUOZ6uI/BEataICJ0Gv20lcPktAZx8Tsy2G4op0LTs20=\"\n          ],\n          signedMessage: [\n            \"algid:sign:RSA:raw\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15\": \"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\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA1\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA224\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA256\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA384\": \"\",\n            \"algid:sign:RSA:digest-PKCS1v15:SHA512\": \"\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA1\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA224\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA256\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA384\": \"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\",\n            \"algid:sign:RSA:message-PKCS1v15:SHA512\": \"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\"\n          ]\n        )\n      ]\n    )\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/RabbitTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass RabbitTests: XCTestCase {\n  func testInitialization() {\n    var key = Array<UInt8>(repeating: 0, count: Rabbit.keySize - 1)\n    var iv: Array<UInt8>?\n    XCTAssertThrowsError(try Rabbit(key: key, iv: iv))\n\n    key = Array<UInt8>(repeating: 0, count: Rabbit.keySize + 1)\n    XCTAssertThrowsError(try Rabbit(key: key, iv: iv))\n\n    key = Array<UInt8>(repeating: 0, count: Rabbit.keySize)\n    XCTAssertNotNil(try Rabbit(key: key, iv: iv))\n\n    iv = Array<UInt8>(repeating: 0, count: Rabbit.ivSize - 1)\n    XCTAssertThrowsError(try Rabbit(key: key, iv: iv))\n\n    iv = Array<UInt8>(repeating: 0, count: Rabbit.ivSize)\n    XCTAssertNotNil(try Rabbit(key: key, iv: iv))\n  }\n\n  func testRabbitWithoutIV() {\n    // Examples from Appendix A: Test Vectors in http://tools.ietf.org/rfc/rfc4503.txt\n    let cases: [(Array<UInt8>, Array<UInt8>)] = [ // First case\n      (\n        [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n        [\n          0xb1, 0x57, 0x54, 0xf0, 0x36, 0xa5, 0xd6, 0xec, 0xf5, 0x6b, 0x45, 0x26, 0x1c, 0x4a, 0xf7, 0x02,\n          0x88, 0xe8, 0xd8, 0x15, 0xc5, 0x9c, 0x0c, 0x39, 0x7b, 0x69, 0x6c, 0x47, 0x89, 0xc6, 0x8a, 0xa7,\n          0xf4, 0x16, 0xa1, 0xc3, 0x70, 0x0c, 0xd4, 0x51, 0xda, 0x68, 0xd1, 0x88, 0x16, 0x73, 0xd6, 0x96\n        ]\n      ),\n      // Second case\n      (\n        [0x91, 0x28, 0x13, 0x29, 0x2e, 0x3d, 0x36, 0xfe, 0x3b, 0xfc, 0x62, 0xf1, 0xdc, 0x51, 0xc3, 0xac],\n        [\n          0x3d, 0x2d, 0xf3, 0xc8, 0x3e, 0xf6, 0x27, 0xa1, 0xe9, 0x7f, 0xc3, 0x84, 0x87, 0xe2, 0x51, 0x9c,\n          0xf5, 0x76, 0xcd, 0x61, 0xf4, 0x40, 0x5b, 0x88, 0x96, 0xbf, 0x53, 0xaa, 0x85, 0x54, 0xfc, 0x19,\n          0xe5, 0x54, 0x74, 0x73, 0xfb, 0xdb, 0x43, 0x50, 0x8a, 0xe5, 0x3b, 0x20, 0x20, 0x4d, 0x4c, 0x5e\n        ]\n      ),\n      // Third case\n      (\n        [0x83, 0x95, 0x74, 0x15, 0x87, 0xe0, 0xc7, 0x33, 0xe9, 0xe9, 0xab, 0x01, 0xc0, 0x9b, 0x00, 0x43],\n        [\n          0x0c, 0xb1, 0x0d, 0xcd, 0xa0, 0x41, 0xcd, 0xac, 0x32, 0xeb, 0x5c, 0xfd, 0x02, 0xd0, 0x60, 0x9b,\n          0x95, 0xfc, 0x9f, 0xca, 0x0f, 0x17, 0x01, 0x5a, 0x7b, 0x70, 0x92, 0x11, 0x4c, 0xff, 0x3e, 0xad,\n          0x96, 0x49, 0xe5, 0xde, 0x8b, 0xfc, 0x7f, 0x3f, 0x92, 0x41, 0x47, 0xad, 0x3a, 0x94, 0x74, 0x28\n        ]\n      )\n    ]\n\n    let plainText = Array<UInt8>(repeating: 0, count: 48)\n    for (key, expectedCipher) in cases {\n      let rabbit = try! Rabbit(key: key)\n      let cipherText = try! rabbit.encrypt(plainText)\n      XCTAssertEqual(cipherText, expectedCipher)\n      XCTAssertEqual(try! rabbit.decrypt(cipherText), plainText)\n    }\n  }\n\n  func testRabbitWithIV() {\n    // Examples from Appendix A: Test Vectors in http://tools.ietf.org/rfc/rfc4503.txt\n    let key = Array<UInt8>(repeating: 0, count: Rabbit.keySize)\n    let cases: [(Array<UInt8>, Array<UInt8>)] = [\n      (\n        [0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00],\n        [\n          0xc6, 0xa7, 0x27, 0x5e, 0xf8, 0x54, 0x95, 0xd8, 0x7c, 0xcd, 0x5d, 0x37, 0x67, 0x05, 0xb7, 0xed,\n          0x5f, 0x29, 0xa6, 0xac, 0x04, 0xf5, 0xef, 0xd4, 0x7b, 0x8f, 0x29, 0x32, 0x70, 0xdc, 0x4a, 0x8d,\n          0x2a, 0xde, 0x82, 0x2b, 0x29, 0xde, 0x6c, 0x1e, 0xe5, 0x2b, 0xdb, 0x8a, 0x47, 0xbf, 0x8f, 0x66\n        ]\n      ),\n      (\n        [0xc3, 0x73, 0xf5, 0x75, 0xc1, 0x26, 0x7e, 0x59],\n        [\n          0x1f, 0xcd, 0x4e, 0xb9, 0x58, 0x00, 0x12, 0xe2, 0xe0, 0xdc, 0xcc, 0x92, 0x22, 0x01, 0x7d, 0x6d,\n          0xa7, 0x5f, 0x4e, 0x10, 0xd1, 0x21, 0x25, 0x01, 0x7b, 0x24, 0x99, 0xff, 0xed, 0x93, 0x6f, 0x2e,\n          0xeb, 0xc1, 0x12, 0xc3, 0x93, 0xe7, 0x38, 0x39, 0x23, 0x56, 0xbd, 0xd0, 0x12, 0x02, 0x9b, 0xa7\n        ]\n      ),\n      (\n        [0xa6, 0xeb, 0x56, 0x1a, 0xd2, 0xf4, 0x17, 0x27],\n        [\n          0x44, 0x5a, 0xd8, 0xc8, 0x05, 0x85, 0x8d, 0xbf, 0x70, 0xb6, 0xaf, 0x23, 0xa1, 0x51, 0x10, 0x4d,\n          0x96, 0xc8, 0xf2, 0x79, 0x47, 0xf4, 0x2c, 0x5b, 0xae, 0xae, 0x67, 0xc6, 0xac, 0xc3, 0x5b, 0x03,\n          0x9f, 0xcb, 0xfc, 0x89, 0x5f, 0xa7, 0x1c, 0x17, 0x31, 0x3d, 0xf0, 0x34, 0xf0, 0x15, 0x51, 0xcb\n        ]\n      )\n    ]\n\n    let plainText = Array<UInt8>(repeating: 0, count: 48)\n    for (iv, expectedCipher) in cases {\n      let rabbit = try! Rabbit(key: key, iv: iv)\n      let cipherText = try! rabbit.encrypt(plainText)\n      XCTAssertEqual(cipherText, expectedCipher)\n      XCTAssertEqual(try! rabbit.decrypt(cipherText), plainText)\n    }\n  }\n}\n\nextension RabbitTests {\n  static func allTests() -> [(String, (RabbitTests) -> () -> Void)] {\n    let tests = [\n      (\"testInitialization\", testInitialization),\n      (\"testRabbitWithoutIV\", testRabbitWithoutIV),\n      (\"testRabbitWithIV\", testRabbitWithIV)\n    ]\n\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/RabbitTestsPerf.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass RabbitTestsPerf: XCTestCase {\n  func testRabbitPerformance() {\n    let key: Array<UInt8> = Array<UInt8>(repeating: 0, count: Rabbit.keySize)\n    let iv: Array<UInt8> = Array<UInt8>(repeating: 0, count: Rabbit.ivSize)\n    let message = Array<UInt8>(repeating: 7, count: (1024 * 1024) * 1)\n    measure {\n      _ = try! Rabbit(key: key, iv: iv).encrypt(message)\n    }\n  }\n}\n\nextension RabbitTestsPerf {\n  static func allTests() -> [(String, (RabbitTestsPerf) -> () -> Void)] {\n    let tests = [\n      (\"testRabbitPerformance\", testRabbitPerformance)\n    ]\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/SHATestsPerf.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2017 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class SHATestsPerf: XCTestCase {\n\n  static let len = 100000\n    let a = [UInt8](unsafeUninitializedCapacity: SHATestsPerf.len) { buf, count in\n    for i in 0..<len {\n      buf[i] = UInt8.random(in: 0...UInt8.max)\n    }\n    count = len\n  }\n\n  func testSHA1Performance() {\n    self.measure {\n      _ = a.sha1()\n    }\n  }\n\n  func testSHA2224Performance() {\n    self.measure {\n      _ = a.sha2(.sha224)\n    }\n  }\n\n  func testSHA2256Performance() {\n    self.measure {\n      _ = a.sha2(.sha224)\n    }\n  }\n\n  func testSHA2384Performance() {\n    self.measure {\n      _ = a.sha2(.sha384)\n    }\n  }\n\n  func testSHA2512Performance() {\n    self.measure {\n      _ = a.sha2(.sha512)\n    }\n  }\n\n  func testSHA3224Performance() {\n    self.measure {\n      _ = a.sha3(.sha224)\n    }\n  }\n\n  func testSHA3256Performance() {\n    self.measure {\n      _ = a.sha3(.sha256)\n    }\n  }\n\n  func testSHA3384Performance() {\n    self.measure {\n      _ = a.sha3(.sha384)\n    }\n  }\n\n  func testSHA3512Performance() {\n    self.measure {\n      _ = a.sha3(.sha512)\n    }\n  }\n\n  func testSHA3keccak224Performance() {\n    self.measure {\n      _ = a.sha3(.keccak224)\n    }\n  }\n\n  func testSHA3keccak256Performance() {\n    self.measure {\n      _ = a.sha3(.keccak256)\n    }\n  }\n\n  func testSHA3keccak384Performance() {\n    self.measure {\n      _ = a.sha3(.keccak384)\n    }\n  }\n\n  func testSHA3keccak512Performance() {\n    self.measure {\n      _ = a.sha3(.keccak512)\n    }\n  }\n\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/ScryptTests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass Scrypt: XCTestCase {\n\n  func testScrypt_0() {\n    let password = Array(\"password\".data(using: .ascii)!)\n    let salt = Array(\"NaCl\".data(using: .ascii)!)\n    let deriver = try! CryptoSwift.Scrypt(password: password, salt: salt, dkLen: 64, N: 1024, r: 8, p: 16)\n    let derived = try! deriver.calculate()\n    let expected: [UInt8] = Array<UInt8>.init(hex: \"\"\"\n                    fd ba be 1c 9d 34 72 00 78 56 e7 19 0d 01 e9 fe\n                    7c 6a d7 cb c8 23 78 30 e7 73 76 63 4b 37 31 62\n                    2e af 30 d9 2e 22 a3 88 6f f1 09 27 9d 98 30 da\n                    c7 27 af b9 4a 83 ee 6d 83 60 cb df a2 cc 06 40\n    \"\"\".replacingOccurrences(of: \" \", with: \"\").replacingOccurrences(of: \"\\n\", with: \"\").replacingOccurrences(of: \"\\t\", with: \"\"))\n    XCTAssertEqual(derived, expected)\n  }\n\n  func testScrypt_1() {\n    let password = Array(\"pleaseletmein\".data(using: .ascii)!)\n    let salt = Array(\"SodiumChloride\".data(using: .ascii)!)\n    let deriver = try! CryptoSwift.Scrypt(password: password, salt: salt, dkLen: 64, N: 16384, r: 8, p: 1)\n    let derived = try! deriver.calculate()\n    let expected: [UInt8] = Array<UInt8>.init(hex: \"\"\"\n                    70 23 bd cb 3a fd 73 48 46 1c 06 cd 81 fd 38 eb\n                    fd a8 fb ba 90 4f 8e 3e a9 b5 43 f6 54 5d a1 f2\n                    d5 43 29 55 61 3f 0f cf 62 d4 97 05 24 2a 9a f9\n                    e6 1e 85 dc 0d 65 1e 40 df cf 01 7b 45 57 58 87\n    \"\"\".replacingOccurrences(of: \" \", with: \"\").replacingOccurrences(of: \"\\n\", with: \"\").replacingOccurrences(of: \"\\t\", with: \"\"))\n    XCTAssertEqual(derived, expected)\n  }\n\n//          Takes too long to run in debug mode!\n  func testScrypt_2() {\n    #if !DEBUG\n      let password = Array(\"pleaseletmein\".data(using: .ascii)!)\n      let salt = Array(\"SodiumChloride\".data(using: .ascii)!)\n      let deriver = try! CryptoSwift.Scrypt(password: password, salt: salt, dkLen: 64, N: 1048576, r: 8, p: 1)\n      let derived = try! deriver.calculate()\n      let expected: [UInt8] = Array<UInt8>.init(hex: \"\"\"\n                      21 01 cb 9b 6a 51 1a ae ad db be 09 cf 70 f8 81\n                      ec 56 8d 57 4a 2f fd 4d ab e5 ee 98 20 ad aa 47\n                      8e 56 fd 8f 4b a5 d0 9f fa 1c 6d 92 7c 40 f4 c3\n                      37 30 40 49 e8 a9 52 fb cb f4 5c 6f a7 7a 41 a4\n      \"\"\".replacingOccurrences(of: \" \", with: \"\").replacingOccurrences(of: \"\\n\", with: \"\").replacingOccurrences(of: \"\\t\", with: \"\"))\n      XCTAssertEqual(derived, expected)\n    #endif\n  }\n\n  static let allTests = [\n    (\"testScrypt_0\", testScrypt_0),\n    (\"testScrypt_1\", testScrypt_1),\n    (\"testScrypt_2\", testScrypt_2)\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/ScryptTestsPerf.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) 2014-2025 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass ScryptTestsPeft: XCTestCase {\n  func testScryptPerformance() {\n    let N = 16384\n    let password: Array<UInt8> = Array<UInt8>(repeating: 0, count: 32)\n    let salt: Array<UInt8> = Array<UInt8>(repeating: 0, count: 32)\n    measure {\n      _ = try! CryptoSwift.Scrypt(password: password, salt: salt, dkLen: 64, N: N, r: 8, p: 1).calculate()\n    }\n  }\n}\n\nextension ScryptTestsPeft {\n  static func allTests() -> [(String, (ScryptTestsPeft) -> () -> Void)] {\n    let tests = [\n      (\"testScryptPerformance\", testScryptPerformance)\n    ]\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/SignatureVerificationTests.swift",
    "content": "////  CryptoSwift\n//\n//  Copyright (C) 2014-2023 Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport Foundation\nimport XCTest\n@testable import CryptoSwift\n\nfinal class SignatureVerificationTests: XCTestCase {\n    \n  func testVerifySHA3Variants() {\n      let testVectors: [SignatureVerificationTests.TestVector] = [\n        SignatureVerificationTests.testVectorMessage_pkcs1v15_SHA3_256,\n        SignatureVerificationTests.testVectorMessage_pkcs1v15_SHA3_384,\n        SignatureVerificationTests.testVectorMessage_pkcs1v15_SHA3_512,\n        SignatureVerificationTests.testVectorDigest_pkcs1v15_SHA3_256,\n        SignatureVerificationTests.testVectorDigest_pkcs1v15_SHA3_384,\n        SignatureVerificationTests.testVectorDigest_pkcs1v15_SHA3_512\n      ]\n      \n    for testVector in testVectors {\n      do {\n        guard\n          let publicDerData = Data(base64Encoded: testVector.publicDER)\n        else {\n          XCTFail(\"Corrupted data - publicDER\")\n          continue\n        }\n        \n        let rsa = try RSA(publicDER: publicDerData.byteArray)\n        \n        guard\n          let signedMessageData = Data(base64Encoded: testVector.signedMessage)\n        else {\n          XCTFail(\"Corrupted data - signedMessage\")\n          continue\n        }\n        \n        let result = try rsa.verify(signature: signedMessageData.byteArray,\n                                    for: testVector.originalMessage.bytes,\n                                    variant: testVector.variant)\n        XCTAssertTrue(result, \"Verification failed for test vector with id `\\(testVector.id)`\")\n        \n      } catch let error {\n        XCTFail(\"Failed with error \\(error)\")\n      }\n    }\n  }\n\n}\n\nextension SignatureVerificationTests {\n  struct TestVector {\n    \n    /// String to identify test vector. Used for logging purposes\n    let id: String\n    /// Public DER for RSA key\n    let publicDER: String\n    /// RSA signature variant\n    let variant: RSA.SignatureVariant\n    /// Original message that was signed\n    let originalMessage: String\n    /// Signed message\n    let signedMessage: String\n  }\n  \n  static let testVectorMessage_pkcs1v15_SHA3_256 = TestVector(\n    id: \"1\",\n    publicDER: \"MIGJAoGBAJPTOQB0cqHPbrZO8Bnl77uFR8jgcYWmudETdRP57lCn/Q4v4Ga9OTqTkfbzX7DKq4WrrcPkx6/u4U4EVS6y7jyuq3Qn4VZMQPKiMiqRyRKhNKfC0i8SpMEhnIXGl824bi/YfV6arz0gicl24dP8C+HsO+WJGa7gtRs2d8hY2s+NAgMBAAE=\",\n    variant: .message_pkcs1v15_SHA3_256,\n    originalMessage: \"CryptoSwift Test\",\n    signedMessage: \"IOIA/8NgoLVwtfto5Lnea7GLBXMddCAgQFBt38HVJpbEtuEcmu8uFs4sJuAHalH1iIe/cGPrwASRM94fSDKzuQ7XNX2Dwt8DBzu9BlAtEWq9GUSL/6DED0xJfqrl6G5rh+RRk9YYIk3TeI9H4HzsmIDFjp5hxFu0SedoR5DzEVM=\"\n  )\n  \n  static let testVectorMessage_pkcs1v15_SHA3_384 = TestVector(\n    id: \"2\",\n    publicDER: \"MIGJAoGBAJPTOQB0cqHPbrZO8Bnl77uFR8jgcYWmudETdRP57lCn/Q4v4Ga9OTqTkfbzX7DKq4WrrcPkx6/u4U4EVS6y7jyuq3Qn4VZMQPKiMiqRyRKhNKfC0i8SpMEhnIXGl824bi/YfV6arz0gicl24dP8C+HsO+WJGa7gtRs2d8hY2s+NAgMBAAE=\",\n    variant: .message_pkcs1v15_SHA3_384,\n    originalMessage: \"CryptoSwift Test\",\n    signedMessage: \"J1qAdFj7iwlW6Mhyf5MfG2CN7BeUjKCFeCunBs2Hginwpcz/YfJgzNpGA93T+RBR4kLVuhs3OVILhwaMnTbgsMVNz0xLoZ5oegRADXDT1Ln3WuTUuqQH+RiMSILelgaHsU4fjj7jCC8wLFA2DtYm7aje1HF3ZRc/9SQSTREM5Gw=\"\n  )\n  \n  static let testVectorMessage_pkcs1v15_SHA3_512 = TestVector(\n    id: \"3\",\n    publicDER: \"MIGJAoGBAJPTOQB0cqHPbrZO8Bnl77uFR8jgcYWmudETdRP57lCn/Q4v4Ga9OTqTkfbzX7DKq4WrrcPkx6/u4U4EVS6y7jyuq3Qn4VZMQPKiMiqRyRKhNKfC0i8SpMEhnIXGl824bi/YfV6arz0gicl24dP8C+HsO+WJGa7gtRs2d8hY2s+NAgMBAAE=\",\n    variant: .message_pkcs1v15_SHA3_512,\n    originalMessage: \"CryptoSwift Test\",\n    signedMessage: \"KMmRIptAPCZV7I/6gRN6wUQekRm+sxXWtoAyxC7PPiSBNd9XJTVVrEUnEfpnupI6uum+r9YxAT5Ha0S5XrYlojHZFLW3gZHLAKmRBushg8YRfqK68cDLYBshuqBlf5nuQZDU+7LTBh6Jnup2rGbQj1Bra9X9Hl9uZmoPY8Uoh/g=\"\n  )\n  \n  static let testVectorDigest_pkcs1v15_SHA3_256 = TestVector(\n    id: \"4\",\n    publicDER: \"MIGJAoGBAJPTOQB0cqHPbrZO8Bnl77uFR8jgcYWmudETdRP57lCn/Q4v4Ga9OTqTkfbzX7DKq4WrrcPkx6/u4U4EVS6y7jyuq3Qn4VZMQPKiMiqRyRKhNKfC0i8SpMEhnIXGl824bi/YfV6arz0gicl24dP8C+HsO+WJGa7gtRs2d8hY2s+NAgMBAAE=\",\n    variant: .digest_pkcs1v15_SHA3_256,\n    originalMessage: \"CryptoSwift Test\",\n    signedMessage: \"Oj3CBwMQIEGrQwFuqIXklqOJG6pdaS5Kjal+sAKoMvEzXCB0h8K8w9YNt/XIOD9fJXdUaG0XR6RB8eEQxh/u6pYZPVUwssyA//FUjWLgKOecNkaca+EK98iIkivjVdEGK7yVhcQHJF19EfpZahVWWlEUCT02g8niomkWUHWIlo8=\"\n  )\n  \n  static let testVectorDigest_pkcs1v15_SHA3_384 = TestVector(\n    id: \"5\",\n    publicDER: \"MIGJAoGBAJPTOQB0cqHPbrZO8Bnl77uFR8jgcYWmudETdRP57lCn/Q4v4Ga9OTqTkfbzX7DKq4WrrcPkx6/u4U4EVS6y7jyuq3Qn4VZMQPKiMiqRyRKhNKfC0i8SpMEhnIXGl824bi/YfV6arz0gicl24dP8C+HsO+WJGa7gtRs2d8hY2s+NAgMBAAE=\",\n    variant: .digest_pkcs1v15_SHA3_384,\n    originalMessage: \"CryptoSwift Test\",\n    signedMessage: \"ZCn19KmnT/QdzcNm077uopZeIxkR5EECX0po2QypPTYorYa9dGTm3nKR0mMr/G2C7ukrR2a8j5WPf4hXi1rlzOoFNufpbyQB33I9INleN7FjASmoxFcw6TyFNeMPN+TwKj9MVTEkZ7HtPL0bBsD8E08eRCDwk3UYdUjcvZcOdzw=\"\n  )\n  \n  static let testVectorDigest_pkcs1v15_SHA3_512 = TestVector(\n    id: \"6\",\n    publicDER: \"MIGJAoGBAJPTOQB0cqHPbrZO8Bnl77uFR8jgcYWmudETdRP57lCn/Q4v4Ga9OTqTkfbzX7DKq4WrrcPkx6/u4U4EVS6y7jyuq3Qn4VZMQPKiMiqRyRKhNKfC0i8SpMEhnIXGl824bi/YfV6arz0gicl24dP8C+HsO+WJGa7gtRs2d8hY2s+NAgMBAAE=\",\n    variant: .digest_pkcs1v15_SHA3_512,\n    originalMessage: \"CryptoSwift Test\",\n    signedMessage: \"bk1/rtzt64ZApavxPrUEnsG/tN7nN6ITV3NKY0IR1i/3S4bkxIMulRsBPINpksTAafxrSm6EsLAmOPrqjwGycqRjSRi8/S6roUE/TIno2dGfO5e4eVKCQtD6I+CHA0Xji3X1k627vaYZqpTMFuMk8serfjMTHFe46s6S+f/64as=\"\n  )\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/XCTestManifests.swift",
    "content": "#if !canImport(ObjectiveC)\nimport XCTest\n\nextension AESCCMTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__AESCCMTests = [\n        (\"testAESCCMTestCase1\", testAESCCMTestCase1),\n        (\"testAESCCMTestCase1Decrypt\", testAESCCMTestCase1Decrypt),\n        (\"testAESCCMTestCase2\", testAESCCMTestCase2),\n        (\"testAESCCMTestCase2Decrypt\", testAESCCMTestCase2Decrypt),\n        (\"testAESCCMTestCase3\", testAESCCMTestCase3),\n        (\"testAESCCMTestCase3Decrypt\", testAESCCMTestCase3Decrypt),\n        (\"testAESCCMTestCase3DecryptPartial\", testAESCCMTestCase3DecryptPartial),\n        (\"testAESCCMTestDVPT256\", testAESCCMTestDVPT256),\n    ]\n}\n\nextension AESTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__AESTests = [\n        (\"testAESDecryptCBCWithPaddingPartial\", testAESDecryptCBCWithPaddingPartial),\n        (\"testAESDecryptCTRSeek\", testAESDecryptCTRSeek),\n        (\"testAESEncrypt\", testAESEncrypt),\n        (\"testAESEncrypt2\", testAESEncrypt2),\n        (\"testAESEncrypt3\", testAESEncrypt3),\n        (\"testAESEncryptCBCNoPadding\", testAESEncryptCBCNoPadding),\n        (\"testAESEncryptCBCWithPadding\", testAESEncryptCBCWithPadding),\n        (\"testAESEncryptCBCWithPaddingPartial\", testAESEncryptCBCWithPaddingPartial),\n        (\"testAESEncryptCFB\", testAESEncryptCFB),\n        (\"testAESEncryptCFBLong\", testAESEncryptCFBLong),\n        (\"testAESEncryptCTR\", testAESEncryptCTR),\n        (\"testAESEncryptCTRIrregularLength\", testAESEncryptCTRIrregularLength),\n        (\"testAESEncryptCTRIrregularLengthIncrementalUpdate\", testAESEncryptCTRIrregularLengthIncrementalUpdate),\n        (\"testAESEncryptCTRStream\", testAESEncryptCTRStream),\n        (\"testAESEncryptCTRZeroPadding\", testAESEncryptCTRZeroPadding),\n        (\"testAESEncryptIncremental\", testAESEncryptIncremental),\n        (\"testAESEncryptOFB128\", testAESEncryptOFB128),\n        (\"testAESEncryptOFB256\", testAESEncryptOFB256),\n        (\"testAESEncryptPCBC256\", testAESEncryptPCBC256),\n        (\"testAESGCMTagLengthCombined\", testAESGCMTagLengthCombined),\n        (\"testAESGCMTagLengthCombined2\", testAESGCMTagLengthCombined2),\n        (\"testAESGCMTagLengthDetached\", testAESGCMTagLengthDetached),\n        (\"testAESGCMTestCase1\", testAESGCMTestCase1),\n        (\"testAESGCMTestCase2\", testAESGCMTestCase2),\n        (\"testAESGCMTestCase3\", testAESGCMTestCase3),\n        (\"testAESGCMTestCase3Combined\", testAESGCMTestCase3Combined),\n        (\"testAESGCMTestCase4\", testAESGCMTestCase4),\n        (\"testAESGCMTestCase5\", testAESGCMTestCase5),\n        (\"testAESGCMTestCase6\", testAESGCMTestCase6),\n        (\"testAESGCMTestCase7\", testAESGCMTestCase7),\n        (\"testAESGCMTestCaseIrregularCombined1\", testAESGCMTestCaseIrregularCombined1),\n        (\"testAESGCMTestCaseIrregularCombined2\", testAESGCMTestCaseIrregularCombined2),\n        (\"testAESWithWrongKey\", testAESWithWrongKey),\n        (\"testIssue298\", testIssue298),\n        (\"testIssue394\", testIssue394),\n        (\"testIssue411\", testIssue411),\n    ]\n}\n\nextension AESTestsPerf {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__AESTestsPerf = [\n        (\"testAESDecryptPerformance\", testAESDecryptPerformance),\n        (\"testAESEncryptPerformance\", testAESEncryptPerformance),\n    ]\n}\n\nextension Access {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__Access = [\n        (\"testAES\", testAES),\n        (\"testArrayExtension\", testArrayExtension),\n        (\"testAuthenticators\", testAuthenticators),\n        (\"testBlowfish\", testBlowfish),\n        (\"testChaCha20\", testChaCha20),\n        (\"testChecksum\", testChecksum),\n        (\"testCollectionExtension\", testCollectionExtension),\n        (\"testDataExtension\", testDataExtension),\n        (\"testDigest\", testDigest),\n        (\"testIntExtension\", testIntExtension),\n        (\"testPadding\", testPadding),\n        (\"testPBKDF\", testPBKDF),\n        (\"testRabbit\", testRabbit),\n        (\"testRandomIV\", testRandomIV),\n        (\"testStringExtension\", testStringExtension),\n        (\"testStringFoundationExtension\", testStringFoundationExtension),\n        (\"testUInt16Extension\", testUInt16Extension),\n        (\"testUInt32Extension\", testUInt32Extension),\n        (\"testUInt64Extension\", testUInt64Extension),\n        (\"testUInt8Extension\", testUInt8Extension),\n        (\"testUpdatable\", testUpdatable),\n    ]\n}\n\nextension BlowfishTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__BlowfishTests = [\n        (\"testCBCZeroPadding\", testCBCZeroPadding),\n        (\"testDecrypt\", testDecrypt),\n        (\"testDecryptCFB415\", testDecryptCFB415),\n        (\"testEncrypt\", testEncrypt),\n        (\"testEncryptDecrypt\", testEncryptDecrypt),\n    ]\n}\n\nextension CBCMacTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__CBCMacTests = [\n        (\"testMessageLength0\", testMessageLength0),\n        (\"testMessageLength16\", testMessageLength16),\n        (\"testMessageLength40\", testMessageLength40),\n        (\"testMessageLength64\", testMessageLength64),\n    ]\n}\n\nextension CMACTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__CMACTests = [\n        (\"testMessageLength0\", testMessageLength0),\n        (\"testMessageLength16\", testMessageLength16),\n        (\"testMessageLength40\", testMessageLength40),\n        (\"testMessageLength64\", testMessageLength64),\n        (\"testOMACTextVectors\", testOMACTextVectors),\n    ]\n}\n\nextension ChaCha20Poly1305Tests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__ChaCha20Poly1305Tests = [\n        (\"test1\", test1),\n        (\"test2\", test2),\n        (\"test3\", test3),\n    ]\n}\n\nextension ChaCha20Tests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__ChaCha20Tests = [\n        (\"testChaCha20\", testChaCha20),\n        (\"testChaCha20EncryptPartial\", testChaCha20EncryptPartial),\n        (\"testCore\", testCore),\n        (\"testVector1Py\", testVector1Py),\n    ]\n}\n\nextension ChaCha20TestsPerf {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__ChaCha20TestsPerf = [\n        (\"testChaCha20Performance\", testChaCha20Performance),\n    ]\n}\n\nextension DigestTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__DigestTests = [\n        (\"testChecksum\", testChecksum),\n        (\"testChecksumPerformance\", testChecksumPerformance),\n        (\"testCRC16\", testCRC16),\n        (\"testCRC32\", testCRC32),\n        (\"testCRC32C\", testCRC32C),\n        (\"testCRC32NotReflected\", testCRC32NotReflected),\n        (\"testMD5\", testMD5),\n        (\"testMD5Data\", testMD5Data),\n        (\"testMD5Updates\", testMD5Updates),\n        (\"testSHA1\", testSHA1),\n        (\"testSHA1Updatable1\", testSHA1Updatable1),\n        (\"testSHA1Updatable2\", testSHA1Updatable2),\n        (\"testSHA2\", testSHA2),\n        (\"testSHA3\", testSHA3),\n        (\"testSHAPartialUpdates\", testSHAPartialUpdates),\n    ]\n}\n\nextension DigestTestsPerf {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__DigestTestsPerf = [\n        (\"testMD5Performance\", testMD5Performance),\n        (\"testSHA1Performance\", testSHA1Performance),\n    ]\n}\n\nextension ExtensionsTest {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__ExtensionsTest = [\n        (\"testArrayInitHex\", testArrayInitHex),\n        (\"testBytes\", testBytes),\n        (\"testDataInit\", testDataInit),\n        (\"testEmptyStringEncrypt\", testEmptyStringEncrypt),\n        (\"testStringDecryptBase64\", testStringDecryptBase64),\n        (\"testStringEncrypt\", testStringEncrypt),\n        (\"testToHexStringPerformance\", testToHexStringPerformance),\n        (\"testToUInt32Array\", testToUInt32Array),\n        (\"testToUInt32Performance\", testToUInt32Performance),\n        (\"testToUInt64Performance\", testToUInt64Performance),\n    ]\n}\n\nextension ExtensionsTestPerf {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__ExtensionsTestPerf = [\n        (\"testArrayInitHexPerformance\", testArrayInitHexPerformance),\n    ]\n}\n\nextension HKDFTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__HKDFTests = [\n        (\"testHKDF1\", testHKDF1),\n        (\"testHKDF2\", testHKDF2),\n        (\"testHKDF3\", testHKDF3),\n        (\"testHKDF4\", testHKDF4),\n        (\"testHKDF5\", testHKDF5),\n        (\"testHKDF6\", testHKDF6),\n    ]\n}\n\nextension HMACTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__HMACTests = [\n        (\"testMD5\", testMD5),\n        (\"testSHA1\", testSHA1),\n        (\"testSHA256\", testSHA256),\n        (\"testSHA384\", testSHA384),\n        (\"testSHA512\", testSHA512),\n    ]\n}\n\nextension OCBTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__OCBTests = [\n        (\"testAESOCBWithRFC7253Tests\", testAESOCBWithRFC7253Tests),\n    ]\n}\n\nextension PBKDF {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__PBKDF = [\n        (\"testPBKDF1\", testPBKDF1),\n        (\"testPBKDF2\", testPBKDF2),\n        (\"testPBKDF2Length\", testPBKDF2Length),\n    ]\n}\n\nextension PBKDFPerf {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__PBKDFPerf = [\n        (\"testPerformance\", testPerformance),\n    ]\n}\n\nextension PaddingTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__PaddingTests = [\n        (\"testISO78164_0\", testISO78164_0),\n        (\"testISO78164_1\", testISO78164_1),\n        (\"testISO78164_2\", testISO78164_2),\n        (\"testPKCS7_0\", testPKCS7_0),\n        (\"testPKCS7_1\", testPKCS7_1),\n        (\"testPKCS7_2\", testPKCS7_2),\n        (\"testZeroPadding1\", testZeroPadding1),\n        (\"testZeroPadding2\", testZeroPadding2),\n    ]\n}\n\nextension Poly1305Tests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__Poly1305Tests = [\n        (\"testIssue183\", testIssue183),\n        (\"testPoly1305\", testPoly1305),\n    ]\n}\n\nextension RabbitTests {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__RabbitTests = [\n        (\"testInitialization\", testInitialization),\n        (\"testRabbitWithIV\", testRabbitWithIV),\n        (\"testRabbitWithoutIV\", testRabbitWithoutIV),\n    ]\n}\n\nextension RabbitTestsPerf {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__RabbitTestsPerf = [\n        (\"testRabbitPerformance\", testRabbitPerformance),\n    ]\n}\n\nextension SHATestsPerf {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__SHATestsPerf = [\n        (\"testSHA1Performance\", testSHA1Performance),\n        (\"testSHA2224Performance\", testSHA2224Performance),\n        (\"testSHA2256Performance\", testSHA2256Performance),\n        (\"testSHA2384Performance\", testSHA2384Performance),\n        (\"testSHA2512Performance\", testSHA2512Performance),\n        (\"testSHA3224Performance\", testSHA3224Performance),\n        (\"testSHA3256Performance\", testSHA3256Performance),\n        (\"testSHA3384Performance\", testSHA3384Performance),\n        (\"testSHA3512Performance\", testSHA3512Performance),\n        (\"testSHA3keccak224Performance\", testSHA3keccak224Performance),\n        (\"testSHA3keccak256Performance\", testSHA3keccak256Performance),\n        (\"testSHA3keccak384Performance\", testSHA3keccak384Performance),\n        (\"testSHA3keccak512Performance\", testSHA3keccak512Performance),\n    ]\n}\n\nextension Scrypt {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__Scrypt = [\n        (\"testScrypt_0\", testScrypt_0),\n        (\"testScrypt_1\", testScrypt_1),\n        (\"testScrypt_2\", testScrypt_2),\n    ]\n}\n\nextension ScryptTestsPeft {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__ScryptTestsPeft = [\n        (\"testScryptPerformance\", testScryptPerformance),\n    ]\n}\n\npublic func __allTests() -> [XCTestCaseEntry] {\n    return [\n        testCase(AESCCMTests.__allTests__AESCCMTests),\n        testCase(AESTests.__allTests__AESTests),\n        testCase(AESTestsPerf.__allTests__AESTestsPerf),\n        testCase(Access.__allTests__Access),\n        testCase(BlowfishTests.__allTests__BlowfishTests),\n        testCase(CBCMacTests.__allTests__CBCMacTests),\n        testCase(CMACTests.__allTests__CMACTests),\n        testCase(ChaCha20Poly1305Tests.__allTests__ChaCha20Poly1305Tests),\n        testCase(ChaCha20Tests.__allTests__ChaCha20Tests),\n        testCase(ChaCha20TestsPerf.__allTests__ChaCha20TestsPerf),\n        testCase(DigestTests.__allTests__DigestTests),\n        testCase(DigestTestsPerf.__allTests__DigestTestsPerf),\n        testCase(ExtensionsTest.__allTests__ExtensionsTest),\n        testCase(ExtensionsTestPerf.__allTests__ExtensionsTestPerf),\n        testCase(HKDFTests.__allTests__HKDFTests),\n        testCase(HMACTests.__allTests__HMACTests),\n        testCase(OCBTests.__allTests__OCBTests),\n        testCase(PBKDF.__allTests__PBKDF),\n        testCase(PBKDFPerf.__allTests__PBKDFPerf),\n        testCase(PaddingTests.__allTests__PaddingTests),\n        testCase(Poly1305Tests.__allTests__Poly1305Tests),\n        testCase(RabbitTests.__allTests__RabbitTests),\n        testCase(RabbitTestsPerf.__allTests__RabbitTestsPerf),\n        testCase(SHATestsPerf.__allTests__SHATestsPerf),\n        testCase(Scrypt.__allTests__Scrypt),\n        testCase(ScryptTestsPeft.__allTests__ScryptTestsPeft),\n    ]\n}\n#endif\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/XChaCha20Poly1305Tests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nclass XChaCha20Poly1305Tests: XCTestCase {\n\n  /// See: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha#appendix-A.3.1\n  func testRoundTrip() {\n    do {\n      let plaintext: Array<UInt8> = .init(\n        hex: \"\"\"\n        4c616469657320616e642047656e746c656d656e206f662074686520636c6173\n        73206f66202739393a204966204920636f756c64206f6666657220796f75206f\n        6e6c79206f6e652074697020666f7220746865206675747572652c2073756e73\n        637265656e20776f756c642062652069742e\n        \"\"\".replacingOccurrences(of: \"\\n\", with: \"\")\n      )\n      let aad: Array<UInt8> = .init(\n        hex: \"50515253c0c1c2c3c4c5c6c7\")\n      let key: Array<UInt8> = .init(\n        hex: \"808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f\")\n      let iv: Array<UInt8> = .init(\n        hex: \"404142434445464748494a4b4c4d4e4f5051525354555657\")\n\n      let encryptResult = try AEADXChaCha20Poly1305.encrypt(\n        plaintext,\n        key: key,\n        iv: iv,\n        authenticationHeader: aad\n      )\n\n      XCTAssertEqual(\n        encryptResult.cipherText.toHexString(),\n        \"\"\"\n        bd6d179d3e83d43b9576579493c0e939572a1700252bfaccbed2902c21396cbb\n        731c7f1b0b4aa6440bf3a82f4eda7e39ae64c6708c54c216cb96b72e1213b452\n        2f8c9ba40db5d945b11b69b982c1bb9e3f3fac2bc369488f76b2383565d3fff9\n        21f9664c97637da9768812f615c68b13b52e\n        \"\"\".replacingOccurrences(of: \"\\n\", with: \"\")\n      )\n\n      XCTAssertEqual(\n        encryptResult.authenticationTag.toHexString(),\n        \"c0875924c1c7987947deafd8780acf49\"\n      )\n\n      let decryptResult = try AEADXChaCha20Poly1305.decrypt(\n        encryptResult.cipherText,\n        key: key,\n        iv: iv,\n        authenticationHeader: aad,\n        authenticationTag: encryptResult.authenticationTag\n      )\n\n      XCTAssertEqual(decryptResult.plainText, plaintext)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  static let allTests = [\n    (\"Test Vector for AEAD_XCHACHA20_POLY1305\", testRoundTrip)\n  ]\n}\n"
  },
  {
    "path": "Tests/CryptoSwiftTests/XChaCha20Tests.swift",
    "content": "//\n//  CryptoSwift\n//\n//  Copyright (C) Marcin Krzyżanowski <marcin@krzyzanowskim.com>\n//  This software is provided 'as-is', without any express or implied warranty.\n//\n//  In no event will the authors be held liable for any damages arising from the use of this software.\n//\n//  Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions:\n//\n//  - The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation is required.\n//  - Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.\n//  - This notice may not be removed or altered from any source or binary distribution.\n//\n\nimport XCTest\n@testable import CryptoSwift\n\nfinal class XChaCha20Tests: XCTestCase {\n\n  /// See: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha#section-2.2.1\n  func testHChaCha20BlockFunction() {\n    let key: Array<UInt8> = .init(\n      hex: \"00:01:02:03:04:05:06:07:08:09:0a:0b:0c:0d:0e:0f:10:11:12:13:14:15:16:17:18:19:1a:1b:1c:1d:1e:1f\".replacingOccurrences(of: \":\", with: \"\"))\n    let counter: Array<UInt8> = .init(\n      hex: \"00:00:00:09:00:00:00:4a:00:00:00:00:31:41:59:27\".replacingOccurrences(of: \":\", with: \"\"))\n    XCTAssertEqual(\n      XChaCha20.hChaCha20(key: key, nonce: counter).toHexString(),\n      \"\"\"\n      82413b42 27b27bfe d30e4250 8a877d73\n      a0f9e4d5 8a74a853 c12ec413 26d3ecdc\n      \"\"\".replacingOccurrences(of: \" \", with: \"\").replacingOccurrences(of: \"\\n\", with: \"\")\n    )\n  }\n\n  // See: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha#appendix-A.3.2.1\n\n  let plaintext: Array<UInt8> = .init(\n    hex: \"\"\"\n    5468652064686f6c65202870726f6e6f756e6365642022646f6c652229206973\n    20616c736f206b6e6f776e2061732074686520417369617469632077696c6420\n    646f672c2072656420646f672c20616e642077686973746c696e6720646f672e\n    2049742069732061626f7574207468652073697a65206f662061204765726d61\n    6e20736865706865726420627574206c6f6f6b73206d6f7265206c696b652061\n    206c6f6e672d6c656767656420666f782e205468697320686967686c7920656c\n    757369766520616e6420736b696c6c6564206a756d70657220697320636c6173\n    736966696564207769746820776f6c7665732c20636f796f7465732c206a6163\n    6b616c732c20616e6420666f78657320696e20746865207461786f6e6f6d6963\n    2066616d696c792043616e696461652e\n    \"\"\".replacingOccurrences(of: \"\\n\", with: \"\"))\n  let key: Array<UInt8> = .init(hex: \"808182838485868788898a8b8c8d8e8f909192939495969798999a9b9c9d9e9f\")\n  let iv: Array<UInt8> = .init(hex: \"404142434445464748494a4b4c4d4e4f5051525354555658\")\n  let expectedResult0 = \"\"\"\n  4559abba4e48c16102e8bb2c05e6947f50a786de162f9b0b7e592a9b53d0d4e9\n  8d8d6410d540a1a6375b26d80dace4fab52384c731acbf16a5923c0c48d3575d\n  4d0d2c673b666faa731061277701093a6bf7a158a8864292a41c48e3a9b4c0da\n  ece0f8d98d0d7e05b37a307bbb66333164ec9e1b24ea0d6c3ffddcec4f68e744\n  3056193a03c810e11344ca06d8ed8a2bfb1e8d48cfa6bc0eb4e2464b74814240\n  7c9f431aee769960e15ba8b96890466ef2457599852385c661f752ce20f9da0c\n  09ab6b19df74e76a95967446f8d0fd415e7bee2a12a114c20eb5292ae7a349ae\n  577820d5520a1f3fb62a17ce6a7e68fa7c79111d8860920bc048ef43fe84486c\n  cb87c25f0ae045f0cce1e7989a9aa220a28bdd4827e751a24a6d5c62d790a663\n  93b93111c1a55dd7421a10184974c7c5\n  \"\"\".replacingOccurrences(of: \"\\n\", with: \"\")\n\n  func testXChaCha20() {\n    do {\n      let actualResult0 = try XChaCha20(key: key, iv: iv, blockCounter: 0).encrypt(self.plaintext).toHexString()\n      XCTAssertEqual(actualResult0, self.expectedResult0)\n\n      // See: https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-xchacha#appendix-A.3.2.2\n      let actualResult1 = try XChaCha20(key: key, iv: iv, blockCounter: 1).encrypt(self.plaintext).toHexString()\n      XCTAssertEqual(\n        actualResult1,\n        \"\"\"\n        7d0a2e6b7f7c65a236542630294e063b7ab9b555a5d5149aa21e4ae1e4fbce87\n        ecc8e08a8b5e350abe622b2ffa617b202cfad72032a3037e76ffdcdc4376ee05\n        3a190d7e46ca1de04144850381b9cb29f051915386b8a710b8ac4d027b8b050f\n        7cba5854e028d564e453b8a968824173fc16488b8970cac828f11ae53cabd201\n        12f87107df24ee6183d2274fe4c8b1485534ef2c5fbc1ec24bfc3663efaa08bc\n        047d29d25043532db8391a8a3d776bf4372a6955827ccb0cdd4af403a7ce4c63\n        d595c75a43e045f0cce1f29c8b93bd65afc5974922f214a40b7c402cdb91ae73\n        c0b63615cdad0480680f16515a7ace9d39236464328a37743ffc28f4ddb324f4\n        d0f5bbdc270c65b1749a6efff1fbaa09536175ccd29fb9e6057b307320d31683\n        8a9c71f70b5b5907a66f7ea49aadc409\n        \"\"\".replacingOccurrences(of: \"\\n\", with: \"\")\n      )\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testXChaCha20PartialEncryption() {\n    do {\n      let cipher = try XChaCha20(key: key, iv: iv)\n      var ciphertext = Array<UInt8>()\n      var encryptor = try cipher.makeEncryptor()\n      try self.plaintext.batched(by: 8).forEach { chunk in\n        ciphertext += try encryptor.update(withBytes: chunk)\n      }\n      ciphertext += try encryptor.finish()\n      XCTAssertEqual(ciphertext.toHexString(), self.expectedResult0)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  func testXChaCha20PartialDecryption() {\n    do {\n      let cipher = try XChaCha20(key: key, iv: iv)\n      var plaintext = Array<UInt8>()\n      var decryptor = try cipher.makeDecryptor()\n      let ciphertext = Array<UInt8>(hex: expectedResult0)\n      try ciphertext.batched(by: 8).forEach { chunk in\n        plaintext += try decryptor.update(withBytes: chunk)\n      }\n      plaintext += try decryptor.finish()\n      XCTAssertEqual(plaintext, self.plaintext)\n    } catch {\n      XCTFail(error.localizedDescription)\n    }\n  }\n\n  static func allTests() -> [(String, (XChaCha20Tests) -> () -> Void)] {\n    let tests = [\n      (\"Test Vector for the HChaCha20 Block Function\", testHChaCha20BlockFunction),\n      (\"Test Vectors for XChaCha20\", testXChaCha20),\n      (\"XChaCha20 partial encryption\", testXChaCha20PartialEncryption),\n      (\"XChaCha20 partial decryption\", testXChaCha20PartialDecryption),\n    ]\n\n    return tests\n  }\n}\n"
  },
  {
    "path": "Tests/LinuxMain.swift",
    "content": "import XCTest\n\nimport CryptoSwiftTests\n\nvar tests = [XCTestCaseEntry]()\ntests += CryptoSwiftTests.__allTests()\n\nXCTMain(tests)\n"
  },
  {
    "path": "Tests/TestsPerformance/XCTestManifests.swift",
    "content": "#if !canImport(ObjectiveC)\nimport XCTest\n\nextension TestsPerformance {\n    // DO NOT MODIFY: This is autogenerated, use:\n    //   `swift test --generate-linuxmain`\n    // to regenerate.\n    static let __allTests__TestsPerformance = [\n        (\"testExample\", testExample),\n        (\"testPerformanceExample\", testPerformanceExample),\n    ]\n}\n\npublic func __allTests() -> [XCTestCaseEntry] {\n    return [\n        testCase(TestsPerformance.__allTests__TestsPerformance),\n    ]\n}\n#endif\n"
  },
  {
    "path": "_config.yml",
    "content": "theme: jekyll-theme-minimal\n"
  },
  {
    "path": "config/CryptoSwift-Debug.xcconfig",
    "content": "#include \"CryptoSwift-Shared.xcconfig\"\n\nOTHER_SWIFT_FLAGS = $(inherited) -Xfrontend -debug-time-function-bodies\nSWIFT_COMPILATION_MODE = incremental\nSWIFT_OPTIMIZATION_LEVEL = -Onone\nSWIFT_ENFORCE_EXCLUSIVE_ACCESS = none\n"
  },
  {
    "path": "config/CryptoSwift-Release.xcconfig",
    "content": "#include \"CryptoSwift-Shared.xcconfig\"\n\nBITCODE_GENERATION_MODE = bitcode\nCLANG_USE_OPTIMIZATION_PROFILE = NO\nGCC_GENERATE_DEBUGGING_SYMBOLS = NO\nGCC_UNROLL_LOOPS = YES\nLLVM_LTO = YES\nSWIFT_DISABLE_SAFETY_CHECKS = YES\nSWIFT_ENFORCE_EXCLUSIVE_ACCESS = compile-time\nSWIFT_OPTIMIZATION_LEVEL = -O\n"
  },
  {
    "path": "config/CryptoSwift-Shared.xcconfig",
    "content": "CLANG_ANALYZER_LOCALIZABILITY_NONLOCALIZED = YES\nAPPLICATION_EXTENSION_API_ONLY = YES\nDYLIB_COMPATIBILITY_VERSION = 1\nDYLIB_CURRENT_VERSION = 1\nDYLIB_INSTALL_NAME_BASE = @rpath\n\nENABLE_BITCODE = NO\nENABLE_BITCODE[sdk=macosx*] = NO\n\nINSTALL_PATH = $(LOCAL_LIBRARY_DIR)/Frameworks\nLD_RUNPATH_SEARCH_PATHS = $(inherited) @executable_path/Frameworks @loader_path/Frameworks\nINFOPLIST_FILE = Info.plist\nPRODUCT_BUNDLE_IDENTIFIER = com.krzyzanowskim.${PRODUCT_NAME:rfc1034identifier}\nPRODUCT_NAME = $(TARGET_NAME)\nSKIP_INSTALL = YES\nDEAD_CODE_STRIPPING = YES\n"
  },
  {
    "path": "config/CryptoSwift-Test.xcconfig",
    "content": "#include \"CryptoSwift-Shared.xcconfig\"\n\nENABLE_TESTABILITY = YES\nSTRIP_INSTALLED_PRODUCT = NO\n\n// Disable for tests. https://twitter.com/krzyzanowskim/status/1191515868401983489\nBUILD_LIBRARY_FOR_DISTRIBUTION = NO\nCOPY_PHASE_STRIP = NO\n"
  },
  {
    "path": "config/CryptoSwift-TestHostApp-Shared.xcconfig",
    "content": "//\n// CryptoSwift-TestHostApp-Shared.xcconfig\n//\n// Generated by BuildSettingExtractor on 02/04/2018\n// https://github.com/dempseyatgithub/BuildSettingExtractor\n//\n\nCODE_SIGN_STYLE = Automatic\nCODE_SIGN_IDENTITY = iPhone Developer\nDEVELOPMENT_TEAM = HA4H7JURM8\nPROVISIONING_PROFILE_SPECIFIER =\nALWAYS_EMBED_SWIFT_STANDARD_LIBRARIES = YES\n\n// Asset Catalog App Icon Set Name\n//\n// Name of an asset catalog app icon set whose contents will be merged into the\n// `Info.plist`.\n\nASSETCATALOG_COMPILER_APPICON_NAME =\n\n\n// Info.plist File\n//\n// The project-relative path to the property list file that contains the `Info.plist`\n// information used by bundles. For details on information property list files, see\n// [Information Property List\n// Files](https://developer.apple.com/library/content/documentation/MacOSX/Conceptual/BPRuntimeConfig/Articles/ConfigFiles.html#//apple_ref/doc/uid/20002091-CJBJIEDH)\n// in [Runtime Configuration\n// Guidelines](https://developer.apple.com/library/content/documentation/MacOSX/Conceptual/BPRuntimeConfig/000-Introduction/introduction.html).\n\nINFOPLIST_FILE = CryptoSwift-TestHostApp/Info.plist\n\n\n\n// Runpath Search Paths\n//\n// This is a list of paths to be added to the `runpath` search path list for the image\n// being created. At runtime, `dyld` uses the `runpath` when searching for dylibs whose\n// load path begins with `@rpath/`. See [Dynamic Library Programming\n// Topics](https://developer.apple.com/library/content/documentation/DeveloperTools/Conceptual/DynamicLibraries/000-Introduction/Introduction.html).\n\nLD_RUNPATH_SEARCH_PATHS = $(inherited) @executable_path/Frameworks\n\n\n\n// Product Bundle Identifier\n//\n// A string that uniquely identifies the bundle. The string should be in reverse DNS\n// format using only alphanumeric characters (`A-Z`, `a-z`, `0-9`), the dot (`.`), and\n// the hyphen (`-`). This value is used as the `CFBundleIdentifier` in the `Info.plist`\n// of the built bundle.\n\nPRODUCT_BUNDLE_IDENTIFIER = test.CryptoSwiftTestHostApp\n\n\n// Base SDK\n//\n// The name or path of the base SDK being used during the build. The product will be\n// built against the headers and libraries located inside the indicated SDK. This path\n// will be prepended to all search paths, and will be passed through the environment to\n// the compiler and linker. Additional SDKs can be specified in the `ADDITIONAL_SDKS`\n// setting.\n\nSDKROOT = iphoneos\nSUPPORTED_PLATFORMS = iphonesimulator iphoneos\n\nCOPY_PHASE_STRIP = NO\nONLY_ACTIVE_ARCH = YES\n"
  },
  {
    "path": "config/CryptoSwift-TestHostApp-Test.xcconfig",
    "content": "//\n// CryptoSwift-TestHostApp-Test.xcconfig\n//\n// Generated by BuildSettingExtractor on 02/04/2018\n// https://github.com/dempseyatgithub/BuildSettingExtractor\n//\n\n#include \"CryptoSwift-TestHostApp-Shared.xcconfig\"\n\nDEBUG_INFORMATION_FORMAT = dwarf-with-dsym\nENABLE_NS_ASSERTIONS = NO\nMTL_ENABLE_DEBUG_INFO = NO\nSWIFT_OPTIMIZATION_LEVEL = -O\nVALIDATE_PRODUCT = YES\n"
  },
  {
    "path": "config/Project-Debug.xcconfig",
    "content": "#include \"Project-Shared.xcconfig\"\n\nCOPY_PHASE_STRIP = NO\nGCC_DYNAMIC_NO_PIC = NO\nGCC_PREPROCESSOR_DEFINITIONS = $(inherited) DEBUG=1\nSWIFT_ACTIVE_COMPILATION_CONDITIONS = DEBUG\nMETAL_ENABLE_DEBUG_INFO = YES\nONLY_ACTIVE_ARCH = YES\nENABLE_TESTABILITY = YES\n"
  },
  {
    "path": "config/Project-Release.xcconfig",
    "content": "#include \"Project-Shared.xcconfig\"\n\nCODE_SIGN_IDENTITY[sdk=macosx*] = Developer ID Application\n\nCLANG_USE_OPTIMIZATION_PROFILE = YES\nCOPY_PHASE_STRIP = YES\nENABLE_NS_ASSERTIONS = NO\nGCC_OPTIMIZATION_LEVEL = fast\nMETAL_ENABLE_DEBUG_INFO = NO\nVALIDATE_PRODUCT = YES\n"
  },
  {
    "path": "config/Project-Shared.xcconfig",
    "content": "MARKETING_VERSION = 1.9.0\n\nSUPPORTED_PLATFORMS = iphonesimulator iphoneos macosx appletvos watchos appletvsimulator watchsimulator xrsimulator xros\n\nSWIFT_COMPILATION_MODE = wholemodule\nSWIFT_VERSION = 5.0\n\nTARGETED_DEVICE_FAMILY = 1,2,3,4\n\nTVOS_DEPLOYMENT_TARGET = 11.0\nIPHONEOS_DEPLOYMENT_TARGET = 11.0\nMACOSX_DEPLOYMENT_TARGET = 10.13\nWATCHOS_DEPLOYMENT_TARGET = 4.0\nXROS_DEPLOYMENT_TARGET = 1.0\n\nDEVELOPMENT_TEAM =\n//PROVISIONING_PROFILE =\n//PROVISIONING_PROFILE_SPECIFIER =\n\nCODE_SIGN_IDENTITY[sdk=macosx*] = Mac Developer\nCODE_SIGN_IDENTITY[sdk=iphoneos*] = iPhone Developer\nCODE_SIGN_IDENTITY[sdk=iphonesimulator*] = iPhone Developer\nCODE_SIGN_STYLE = Automatic\n\nPRODUCT_NAME = ${TARGET_NAME}\n\nCLANG_ANALYZER_NONNULL = YES\nCLANG_ANALYZER_NUMBER_OBJECT_CONVERSION = YES_AGGRESSIVE\n\nALWAYS_SEARCH_USER_PATHS = NO\n\nCLANG_CXX_LANGUAGE_STANDARD = gnu++0x\nCLANG_CXX_LIBRARY = libc++\nCLANG_ENABLE_MODULES = YES\nCLANG_ENABLE_OBJC_ARC = YES\nCLANG_ENABLE_OBJC_WEAK = YES\n\nCLANG_WARN__DUPLICATE_METHOD_MATCH = YES\nCLANG_WARN_BLOCK_CAPTURE_AUTORELEASING = YES\nCLANG_WARN_BOOL_CONVERSION = YES\nCLANG_WARN_COMMA = YES\nCLANG_WARN_CONSTANT_CONVERSION = YES\nCLANG_WARN_DEPRECATED_OBJC_IMPLEMENTATIONS = YES\nCLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR\nCLANG_WARN_EMPTY_BODY = YES\nCLANG_WARN_ENUM_CONVERSION = YES\nCLANG_WARN_INFINITE_RECURSION = YES\nCLANG_WARN_INT_CONVERSION = YES\nCLANG_WARN_NON_LITERAL_NULL_CONVERSION = YES\nCLANG_WARN_OBJC_IMPLICIT_RETAIN_SELF = YES\nCLANG_WARN_OBJC_LITERAL_CONVERSION = YES\nCLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR\nCLANG_WARN_RANGE_LOOP_ANALYSIS = YES\nCLANG_WARN_STRICT_PROTOTYPES = YES\nCLANG_WARN_SUSPICIOUS_MOVE = YES\nCLANG_WARN_UNREACHABLE_CODE = YES\nCLANG_WARN_DOCUMENTATION_COMMENTS = YES\nCLANG_WARN_UNGUARDED_AVAILABILITY = YES_AGGRESSIVE\n\nDEBUG_INFORMATION_FORMAT = dwarf\nDEFINES_MODULE = YES\n\nENABLE_STRICT_OBJC_MSGSEND = YES\n\nGCC_C_LANGUAGE_STANDARD = gnu99\nGCC_NO_COMMON_BLOCKS = YES\nGCC_WARN_64_TO_32_BIT_CONVERSION = YES\nGCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR\nGCC_WARN_UNDECLARED_SELECTOR = YES\nGCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE\nGCC_WARN_UNUSED_FUNCTION = YES\nGCC_WARN_UNUSED_LABEL = YES\nGCC_WARN_UNUSED_VARIABLE = YES\n\nCLANG_WARN_QUOTED_INCLUDE_IN_FRAMEWORK_HEADER = YES\n\nVERSION_INFO_PREFIX =\nVERSIONING_SYSTEM = apple-generic\nCURRENT_PROJECT_VERSION = 1\n\n// XCFramework\n// Swift have (at least) 2 language dialects: With and without Library Evolution behave differently regarding enums.\nBUILD_LIBRARY_FOR_DISTRIBUTION = YES\n\n// Catalyst\nSUPPORTS_MACCATALYST = YES\nSUPPORTS_MAC_DESIGNED_FOR_IPHONE_IPAD = YES\nDERIVE_MACCATALYST_PRODUCT_BUNDLE_IDENTIFIER = NO\n"
  },
  {
    "path": "config/Tests-Shared.xcconfig",
    "content": "DEVELOPMENT_TEAM =\nCODE_SIGN_IDENTITY =\nCODE_SIGN_STYLE = Manual\nCODE_SIGNING_REQUIRED = NO\n\nHEADER_SEARCH_PATHS = $(inherited) includes/**\n\nLD_RUNPATH_SEARCH_PATHS = $(inherited) @executable_path/Frameworks @loader_path/Frameworks @loader_path/../Frameworks @executable_path/../Frameworks\n\nPRODUCT_BUNDLE_IDENTIFIER = com.krzyzanowskim.${PRODUCT_NAME:rfc1034identifier}\n\nOTHER_SWIFT_FLAGS = $(inherited) -Xfrontend -debug-time-function-bodies\n\n// Disable for tests. https://twitter.com/krzyzanowskim/status/1191515868401983489\nBUILD_LIBRARY_FOR_DISTRIBUTION = NO\n\nMACOSX_DEPLOYMENT_TARGET = 10.15\n\nINFOPLIST_FILE = Info.plist\n"
  },
  {
    "path": "config/Tests-Test.xcconfig",
    "content": "#include \"Tests-Shared.xcconfig\"\n\nCOPY_PHASE_STRIP = NO\nENABLE_NS_ASSERTIONS = NO\nENABLE_TESTABILITY = YES\nGCC_OPTIMIZATION_LEVEL = fast\n\nGCC_PREPROCESSOR_DEFINITIONS = $(inherited) DEBUG=1 CI=1\nSWIFT_ACTIVE_COMPILATION_CONDITIONS = DEBUG\n\nSWIFT_DISABLE_SAFETY_CHECKS = YES\nSWIFT_OPTIMIZATION_LEVEL = -O\n\nMETAL_ENABLE_DEBUG_INFO = NO\nONLY_ACTIVE_ARCH = YES\nVALIDATE_PRODUCT = YES\n"
  },
  {
    "path": "scripts/build-framework.sh",
    "content": "#!/usr/bin/env bash\n\nset -e\n\nBASE_PWD=\"$PWD\"\nSCRIPT_DIR=\"$( cd \"$( dirname \"${BASH_SOURCE[0]}\" )\" >/dev/null && pwd )\"\nOUTPUT_DIR=$( mktemp -d )\nCOMMON_SETUP=\"-project ${SCRIPT_DIR}/../CryptoSwift.xcodeproj -scheme CryptoSwift -configuration Release -quiet SKIP_INSTALL=NO BUILD_LIBRARY_FOR_DISTRIBUTION=YES\"\n\n# macOS\nDERIVED_DATA_PATH=$( mktemp -d )\nxcrun xcodebuild build \\\n\t$COMMON_SETUP \\\n\t-derivedDataPath \"${DERIVED_DATA_PATH}\" \\\n\t-destination 'generic/platform=macOS'\n\nmkdir -p \"${OUTPUT_DIR}/macos\"\nditto \"${DERIVED_DATA_PATH}/Build/Products/Release/CryptoSwift.framework\" \"${OUTPUT_DIR}/macos/CryptoSwift.framework\"\nrm -rf \"${DERIVED_DATA_PATH}\"\n\n# macOS Catalyst\nDERIVED_DATA_PATH=$( mktemp -d )\nxcrun xcodebuild build \\\n\t$COMMON_SETUP \\\n\t-derivedDataPath \"${DERIVED_DATA_PATH}\" \\\n\t-destination 'generic/platform=macOS,variant=Mac Catalyst'\n\nmkdir -p \"${OUTPUT_DIR}/maccatalyst\"\nditto \"${DERIVED_DATA_PATH}/Build/Products/Release-maccatalyst/CryptoSwift.framework\" \"${OUTPUT_DIR}/maccatalyst/CryptoSwift.framework\"\nrm -rf \"${DERIVED_DATA_PATH}\"\n\n# iOS\nDERIVED_DATA_PATH=$( mktemp -d )\nxcrun xcodebuild build \\\n\t$COMMON_SETUP \\\n\t-derivedDataPath \"${DERIVED_DATA_PATH}\" \\\n\t-destination 'generic/platform=iOS'\n\nmkdir -p \"${OUTPUT_DIR}/iphoneos\"\nditto \"${DERIVED_DATA_PATH}/Build/Products/Release-iphoneos/CryptoSwift.framework\" \"${OUTPUT_DIR}/iphoneos/CryptoSwift.framework\"\nrm -rf \"${DERIVED_DATA_PATH}\"\n\n# iOS Simulator\nDERIVED_DATA_PATH=$( mktemp -d )\nxcrun xcodebuild build \\\n\t$COMMON_SETUP \\\n\t-derivedDataPath \"${DERIVED_DATA_PATH}\" \\\n\t-destination 'generic/platform=iOS Simulator'\n\nmkdir -p \"${OUTPUT_DIR}/iphonesimulator\"\nditto \"${DERIVED_DATA_PATH}/Build/Products/Release-iphonesimulator/CryptoSwift.framework\" \"${OUTPUT_DIR}/iphonesimulator/CryptoSwift.framework\"\nrm -rf \"${DERIVED_DATA_PATH}\"\n\n# tvOS\nDERIVED_DATA_PATH=$( mktemp -d )\nxcrun xcodebuild build \\\n\t$COMMON_SETUP \\\n\t-derivedDataPath \"${DERIVED_DATA_PATH}\" \\\n\t-destination 'generic/platform=tvOS'\n\nmkdir -p \"${OUTPUT_DIR}/appletvos\"\nditto \"${DERIVED_DATA_PATH}/Build/Products/Release-appletvos/CryptoSwift.framework\" \"${OUTPUT_DIR}/appletvos/CryptoSwift.framework\"\nrm -rf \"${DERIVED_DATA_PATH}\"\n\n# tvOS Simulator\nDERIVED_DATA_PATH=$( mktemp -d )\nxcrun xcodebuild build \\\n\t$COMMON_SETUP \\\n\t-derivedDataPath \"${DERIVED_DATA_PATH}\" \\\n\t-destination 'generic/platform=tvOS Simulator'\n\nmkdir -p \"${OUTPUT_DIR}/appletvsimulator\"\nditto \"${DERIVED_DATA_PATH}/Build/Products/Release-appletvsimulator/CryptoSwift.framework\" \"${OUTPUT_DIR}/appletvsimulator/CryptoSwift.framework\"\nrm -rf \"${DERIVED_DATA_PATH}\"\n\n# watchOS\nDERIVED_DATA_PATH=$( mktemp -d )\nxcrun xcodebuild build \\\n\t$COMMON_SETUP \\\n\t-derivedDataPath \"${DERIVED_DATA_PATH}\" \\\n\t-destination 'generic/platform=watchOS'\n\nmkdir -p \"${OUTPUT_DIR}/watchos\"\nditto \"${DERIVED_DATA_PATH}/Build/Products/Release-watchos/CryptoSwift.framework\" \"${OUTPUT_DIR}/watchos/CryptoSwift.framework\"\nrm -rf \"${DERIVED_DATA_PATH}\"\n\n# watchOS Simulator\nDERIVED_DATA_PATH=$( mktemp -d )\nxcrun xcodebuild build \\\n\t$COMMON_SETUP \\\n\t-derivedDataPath \"${DERIVED_DATA_PATH}\" \\\n\t-destination 'generic/platform=watchOS Simulator'\n\nmkdir -p \"${OUTPUT_DIR}/watchsimulator\"\nditto \"${DERIVED_DATA_PATH}/Build/Products/Release-watchsimulator/CryptoSwift.framework\" \"${OUTPUT_DIR}/watchsimulator/CryptoSwift.framework\"\nrm -rf \"${DERIVED_DATA_PATH}\"\n\n# XCFRAMEWORK\nrm -rf ${SCRIPT_DIR}/../CryptoSwift.xcframework\nxcrun xcodebuild -quiet -create-xcframework \\\n\t-framework \"${OUTPUT_DIR}/iphoneos/CryptoSwift.framework\" \\\n\t-framework \"${OUTPUT_DIR}/iphonesimulator/CryptoSwift.framework\" \\\n\t-framework \"${OUTPUT_DIR}/appletvos/CryptoSwift.framework\" \\\n\t-framework \"${OUTPUT_DIR}/appletvsimulator/CryptoSwift.framework\" \\\n\t-framework \"${OUTPUT_DIR}/watchos/CryptoSwift.framework\" \\\n\t-framework \"${OUTPUT_DIR}/watchsimulator/CryptoSwift.framework\" \\\n\t-framework \"${OUTPUT_DIR}/macos/CryptoSwift.framework\" \\\n\t-framework \"${OUTPUT_DIR}/maccatalyst/CryptoSwift.framework\" \\\n\t-output ${SCRIPT_DIR}/../CryptoSwift.xcframework\n\n# pushd ${OUTPUT_DIR}\n# xcrun zip --symlinks -r -o ${BASE_PWD}/CryptoSwift.xcframework.zip CryptoSwift.xcframework\n# popd\n\necho \"✔️ CryptoSwift.xcframework\"\necho ${OUTPUT_DIR}\n\nrm -rf ${OUTPUT_DIR}\ncd ${BASE_PWD}"
  },
  {
    "path": "scripts/generate-contributors-list.sh",
    "content": "#!/bin/bash\n##===----------------------------------------------------------------------===##\n##\n## This source file is part of the SwiftNIO open source project\n##\n## Copyright (c) 2017-2018 Apple Inc. and the SwiftNIO project authors\n## Licensed under Apache License v2.0\n##\n## See LICENSE.txt for license information\n## See CONTRIBUTORS.txt for the list of SwiftNIO project authors\n##\n## SPDX-License-Identifier: Apache-2.0\n##\n##===----------------------------------------------------------------------===##\n\nset -eu\nhere=\"$( cd \"$( dirname \"${BASH_SOURCE[0]}\" )\" && pwd )\"\ncontributors=$( cd \"$here\"/.. && git shortlog -es | cut -f2 | sed 's/^/- /' )\n\ncat > \"$here/../CONTRIBUTORS.txt\" <<- EOF\n\tFor the purpose of tracking copyright, this is the list of individuals and\n\torganizations who have contributed source code to CryptoSwift.\n\n\t### Contributors\n\n\t$contributors\n\n\t**Updating this list**\n\n\tPlease do not edit this file manually. It is generated using \\`./scripts/generate-contributors-list.sh\\`. If a name is misspelled or appearing multiple times: add an entry in \\`./.mailmap\\`\nEOF\n"
  },
  {
    "path": "scripts/swiftformat.sh",
    "content": "#!/bin/bash\n\nswiftformat  --hexliteralcase lowercase --hexgrouping none --ranges nospace --wrapelements beforefirst --self remove $1\n"
  }
]