package(default_visibility = ["//visibility:public"])

licenses(["notice"])

filegroup(
    name = "credentials",
    testonly = 1,
    srcs = [
        "aws_credentials_cc.txt",
        "aws_key_arn.txt",
        "bad_access_keys_aws.csv",
        "bad_aws_key_arn.txt",
        "bad_aws_credentials_cc.txt",
        "bad_credentials_aws.csv",
        "bad_gcp_credentials.json",
        "bad_gcp_key_name.txt",
        "gcp_key_name.txt",
        "credential.json",
        "credentials_aws.csv",
        "credentials_aws.cred",
        "README_AWS.txt",
],
)

filegroup(
    name = "ecies_keysets",
    testonly = 1,
    srcs = [
        # Generated with
        # tinkey create \
        # --key-template examples/keytemplates/ECIES_P256_HKDFHMACSHA256_AES128CTR_128BITIV_HMACSHA256_128BITTAG.ascii \
        # --out testdata/ecies_private_keyset2.bin --out-format BINARY
        "ecies_private_keyset.bin",

        # Generated with
        # tinkey create \
        # --key-template examples/keytemplates/ECIES_P256_HKDFHMACSHA256_AES128GCM.ascii \
        # --out testdata/ecies_private_keyset2.bin --out-format BINARY
        "ecies_private_keyset2.bin",

        # tinkey create-public-keyset --in testdata/ecies_private_keyset.bin --in-form BINARY \
        # --out testdata/ecies_public_keyset.bin --out-form BINARY
        "ecies_public_keyset.bin",
        "ecies_public_keyset2.bin",
    ],
)

filegroup(
    name = "wycheproof",
    testonly = 1,
    srcs = glob([
        "wycheproof/*.*",
    ]),
)