0aac6402eb
The xz backdoor relied on obfuscated test files that contained malicious code instead of a real test. Since then, test and benchmark input that cannot be explained should be considered suspicious. Out of laziness, the input for the xl test (05) was generated through the `openssl rand -hex` command, which outputs random data as an hexadecimal string. Although I generated it myself and know there is nothing hidden in there, I cannot prove it to someone else. Therefore, I chose to stop using random data for this test and changed it to a readable "lorem ipsum" string of the same size, like the other tests. For more information about the xz backdoor and the context in which this commit take place, please read: CVE-2024-3094 https://www.openwall.com/lists/oss-security/2024/03/29/4 https://gynvael.coldwind.pl/?lang=en&id=782 https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27 |
||
---|---|---|
.. | ||
aes128gcm-sha256_01_xs.txt | ||
aes128gcm-sha256_02_s.txt | ||
aes128gcm-sha256_03_m.txt | ||
aes128gcm-sha256_04_l.txt | ||
aes128gcm-sha256_05_xl.txt | ||
plain_01_xs.txt | ||
plain_02_s.txt | ||
plain_03_m.txt | ||
plain_04_l.txt | ||
plain_05_xl.txt | ||
xchacha20poly1305-blake3_01_xs.txt | ||
xchacha20poly1305-blake3_02_s.txt | ||
xchacha20poly1305-blake3_03_m.txt | ||
xchacha20poly1305-blake3_04_l.txt | ||
xchacha20poly1305-blake3_05_xl.txt |