[openssl] master update

Matt Caswell matt at openssl.org
Thu Feb 13 14:23:55 UTC 2020


The branch master has been updated
       via  06e62984c1e7cee5e50211dfb9a89d5095799133 (commit)
       via  afb638f137958205b6b089da8967f4775b4c9bb6 (commit)
      from  1b72105076bb2e73f3c8461f9c0ca5ecefe007c8 (commit)


- Log -----------------------------------------------------------------
commit 06e62984c1e7cee5e50211dfb9a89d5095799133
Author: Matt Caswell <matt at openssl.org>
Date:   Fri Jan 17 15:54:09 2020 +0000

    Add Asymmetric RSA cipher tests in FIPS provider
    
    We also add some DSA tests for code that is already in the FIPS provider.
    
    Reviewed-by: Richard Levitte <levitte at openssl.org>
    Reviewed-by: Shane Lontis <shane.lontis at oracle.com>
    (Merged from https://github.com/openssl/openssl/pull/10881)

commit afb638f137958205b6b089da8967f4775b4c9bb6
Author: Matt Caswell <matt at openssl.org>
Date:   Fri Jan 17 14:47:18 2020 +0000

    Make the RSA ASYM_CIPHER implementation available inside the FIPS module
    
    RSA ASYM_CIPHER was already available within the default provider. We
    now make it also available from inside the FIPS module.
    
    Reviewed-by: Richard Levitte <levitte at openssl.org>
    Reviewed-by: Shane Lontis <shane.lontis at oracle.com>
    (Merged from https://github.com/openssl/openssl/pull/10881)

-----------------------------------------------------------------------

Summary of changes:
 crypto/rsa/build.info                            |  15 +-
 crypto/rsa/rsa_crpt.c                            |   2 +-
 crypto/rsa/rsa_err.c                             |   2 +-
 crypto/rsa/rsa_lib.c                             |  69 +-
 crypto/rsa/rsa_local.h                           |   5 +-
 crypto/rsa/rsa_oaep.c                            |  21 +-
 crypto/rsa/rsa_ossl.c                            |  52 +-
 crypto/rsa/rsa_pk1.c                             |   7 +
 crypto/rsa/rsa_sp800_56b_check.c                 |   4 +-
 crypto/rsa/rsa_sp800_56b_gen.c                   |   2 +-
 include/crypto/rsa.h                             |   2 +
 include/openssl/rsaerr.h                         |   2 +-
 providers/fips/fipsprov.c                        |   8 +
 providers/implementations/asymciphers/build.info |   6 +-
 providers/implementations/asymciphers/rsa_enc.c  |  12 +
 providers/implementations/keymgmt/rsa_kmgmt.c    |  14 +-
 test/recipes/30-test_evp.t                       |   4 +-
 test/recipes/30-test_evp_data/evppkey.txt        | 763 +++++++++++++++++++++++
 18 files changed, 948 insertions(+), 42 deletions(-)

diff --git a/crypto/rsa/build.info b/crypto/rsa/build.info
index 70864170ed..274f376979 100644
--- a/crypto/rsa/build.info
+++ b/crypto/rsa/build.info
@@ -1,7 +1,10 @@
 LIBS=../../libcrypto
-SOURCE[../../libcrypto]=\
-        rsa_ossl.c rsa_gen.c rsa_lib.c rsa_sign.c rsa_saos.c rsa_err.c \
-        rsa_pk1.c rsa_ssl.c rsa_none.c rsa_oaep.c rsa_chk.c \
-        rsa_pss.c rsa_x931.c rsa_asn1.c rsa_depr.c rsa_ameth.c rsa_prn.c \
-        rsa_pmeth.c rsa_crpt.c rsa_x931g.c rsa_meth.c rsa_mp.c \
-        rsa_sp800_56b_gen.c rsa_sp800_56b_check.c
+
+$COMMON=rsa_ossl.c rsa_gen.c rsa_lib.c rsa_sign.c rsa_pk1.c \
+        rsa_none.c rsa_oaep.c rsa_chk.c rsa_pss.c rsa_x931.c rsa_crpt.c \
+        rsa_x931g.c rsa_sp800_56b_gen.c rsa_sp800_56b_check.c
+
+SOURCE[../../libcrypto]=$COMMON\
+        rsa_saos.c rsa_err.c rsa_asn1.c rsa_depr.c rsa_ameth.c rsa_prn.c \
+        rsa_pmeth.c rsa_meth.c rsa_mp.c rsa_ssl.c
+SOURCE[../../providers/libfips.a]=$COMMON
diff --git a/crypto/rsa/rsa_crpt.c b/crypto/rsa/rsa_crpt.c
index 6a408e907b..6abee298c6 100644
--- a/crypto/rsa/rsa_crpt.c
+++ b/crypto/rsa/rsa_crpt.c
@@ -114,7 +114,7 @@ BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx)
     BN_BLINDING *ret = NULL;
 
     if (in_ctx == NULL) {
-        if ((ctx = BN_CTX_new()) == NULL)
+        if ((ctx = BN_CTX_new_ex(rsa->libctx)) == NULL)
             return 0;
     } else {
         ctx = in_ctx;
diff --git a/crypto/rsa/rsa_err.c b/crypto/rsa/rsa_err.c
index 692b1a1bd3..382b8cb7d1 100644
--- a/crypto/rsa/rsa_err.c
+++ b/crypto/rsa/rsa_err.c
@@ -1,6 +1,6 @@
 /*
  * Generated by util/mkerr.pl DO NOT EDIT
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
  *
  * Licensed under the Apache License 2.0 (the "License").  You may not use
  * this file except in compliance with the License.  You can obtain a copy
diff --git a/crypto/rsa/rsa_lib.c b/crypto/rsa/rsa_lib.c
index 634c251efe..d6c5da752b 100644
--- a/crypto/rsa/rsa_lib.c
+++ b/crypto/rsa/rsa_lib.c
@@ -19,9 +19,12 @@
 #include "crypto/rsa.h"
 #include "rsa_local.h"
 
+static RSA *rsa_new_intern(ENGINE *engine, OPENSSL_CTX *libctx);
+
+#ifndef FIPS_MODE
 RSA *RSA_new(void)
 {
-    return RSA_new_method(NULL);
+    return rsa_new_intern(NULL, NULL);
 }
 
 const RSA_METHOD *RSA_get_method(const RSA *rsa)
@@ -50,28 +53,40 @@ int RSA_set_method(RSA *rsa, const RSA_METHOD *meth)
 }
 
 RSA *RSA_new_method(ENGINE *engine)
+{
+    return rsa_new_intern(engine, NULL);
+}
+#endif
+
+RSA *rsa_new_with_ctx(OPENSSL_CTX *libctx)
+{
+    return rsa_new_intern(NULL, libctx);
+}
+
+static RSA *rsa_new_intern(ENGINE *engine, OPENSSL_CTX *libctx)
 {
     RSA *ret = OPENSSL_zalloc(sizeof(*ret));
 
     if (ret == NULL) {
-        RSAerr(RSA_F_RSA_NEW_METHOD, ERR_R_MALLOC_FAILURE);
+        RSAerr(0, ERR_R_MALLOC_FAILURE);
         return NULL;
     }
 
     ret->references = 1;
     ret->lock = CRYPTO_THREAD_lock_new();
     if (ret->lock == NULL) {
-        RSAerr(RSA_F_RSA_NEW_METHOD, ERR_R_MALLOC_FAILURE);
+        RSAerr(0, ERR_R_MALLOC_FAILURE);
         OPENSSL_free(ret);
         return NULL;
     }
 
+    ret->libctx = libctx;
     ret->meth = RSA_get_default_method();
-#ifndef OPENSSL_NO_ENGINE
+#if !defined(OPENSSL_NO_ENGINE) && !defined(FIPS_MODE)
     ret->flags = ret->meth->flags & ~RSA_FLAG_NON_FIPS_ALLOW;
     if (engine) {
         if (!ENGINE_init(engine)) {
-            RSAerr(RSA_F_RSA_NEW_METHOD, ERR_R_ENGINE_LIB);
+            RSAerr(0, ERR_R_ENGINE_LIB);
             goto err;
         }
         ret->engine = engine;
@@ -81,7 +96,7 @@ RSA *RSA_new_method(ENGINE *engine)
     if (ret->engine) {
         ret->meth = ENGINE_get_RSA(ret->engine);
         if (ret->meth == NULL) {
-            RSAerr(RSA_F_RSA_NEW_METHOD, ERR_R_ENGINE_LIB);
+            RSAerr(0, ERR_R_ENGINE_LIB);
             goto err;
         }
     }
@@ -95,7 +110,7 @@ RSA *RSA_new_method(ENGINE *engine)
 #endif
 
     if ((ret->meth->init != NULL) && !ret->meth->init(ret)) {
-        RSAerr(RSA_F_RSA_NEW_METHOD, ERR_R_INIT_FAIL);
+        RSAerr(0, ERR_R_INIT_FAIL);
         goto err;
     }
 
@@ -121,7 +136,7 @@ void RSA_free(RSA *r)
 
     if (r->meth != NULL && r->meth->finish != NULL)
         r->meth->finish(r);
-#ifndef OPENSSL_NO_ENGINE
+#if !defined(OPENSSL_NO_ENGINE) && !defined(FIPS_MODE)
     ENGINE_finish(r->engine);
 #endif
 
@@ -139,8 +154,11 @@ void RSA_free(RSA *r)
     BN_clear_free(r->dmp1);
     BN_clear_free(r->dmq1);
     BN_clear_free(r->iqmp);
+    /* TODO(3.0): Support PSS in FIPS_MODE */
+#ifndef FIPS_MODE
     RSA_PSS_PARAMS_free(r->pss);
     sk_RSA_PRIME_INFO_pop_free(r->prime_infos, rsa_multip_info_free);
+#endif
     BN_BLINDING_free(r->blinding);
     BN_BLINDING_free(r->mt_blinding);
     OPENSSL_free(r->bignum_data);
@@ -302,6 +320,7 @@ int RSA_security_bits(const RSA *rsa)
 {
     int bits = BN_num_bits(rsa->n);
 
+#ifndef FIPS_MODE
     if (rsa->version == RSA_ASN1_VERSION_MULTI) {
         /* This ought to mean that we have private key at hand. */
         int ex_primes = sk_RSA_PRIME_INFO_num(rsa->prime_infos);
@@ -309,6 +328,7 @@ int RSA_security_bits(const RSA *rsa)
         if (ex_primes <= 0 || (ex_primes + 2) > rsa_multip_cap(bits))
             return 0;
     }
+#endif
     return rsa_compute_security_bits(bits);
 }
 
@@ -394,6 +414,7 @@ int RSA_set0_crt_params(RSA *r, BIGNUM *dmp1, BIGNUM *dmq1, BIGNUM *iqmp)
     return 1;
 }
 
+#ifndef FIPS_MODE
 /*
  * Is it better to export RSA_PRIME_INFO structure
  * and related functions to let user pass a triplet?
@@ -462,6 +483,7 @@ int RSA_set0_multi_prime_params(RSA *r, BIGNUM *primes[], BIGNUM *exps[],
     sk_RSA_PRIME_INFO_pop_free(prime_infos, rsa_multip_info_free_ex);
     return 0;
 }
+#endif
 
 void RSA_get0_key(const RSA *r,
                   const BIGNUM **n, const BIGNUM **e, const BIGNUM **d)
@@ -482,6 +504,7 @@ void RSA_get0_factors(const RSA *r, const BIGNUM **p, const BIGNUM **q)
         *q = r->q;
 }
 
+#ifndef FIPS_MODE
 int RSA_get_multi_prime_extra_count(const RSA *r)
 {
     int pnum;
@@ -511,6 +534,7 @@ int RSA_get0_multi_prime_factors(const RSA *r, const BIGNUM *primes[])
 
     return 1;
 }
+#endif
 
 void RSA_get0_crt_params(const RSA *r,
                          const BIGNUM **dmp1, const BIGNUM **dmq1,
@@ -524,6 +548,7 @@ void RSA_get0_crt_params(const RSA *r,
         *iqmp = r->iqmp;
 }
 
+#ifndef FIPS_MODE
 int RSA_get0_multi_prime_crt_params(const RSA *r, const BIGNUM *exps[],
                                     const BIGNUM *coeffs[])
 {
@@ -549,6 +574,7 @@ int RSA_get0_multi_prime_crt_params(const RSA *r, const BIGNUM *exps[],
 
     return 1;
 }
+#endif
 
 const BIGNUM *RSA_get0_n(const RSA *r)
 {
@@ -590,10 +616,13 @@ const BIGNUM *RSA_get0_iqmp(const RSA *r)
     return r->iqmp;
 }
 
+/* TODO(3.0): Temporary until we move PSS support into the FIPS module */
+#ifndef FIPS_MODE
 const RSA_PSS_PARAMS *RSA_get0_pss_params(const RSA *r)
 {
     return r->pss;
 }
+#endif
 
 void RSA_clear_flags(RSA *r, int flags)
 {
@@ -616,6 +645,7 @@ int RSA_get_version(RSA *r)
     return r->version;
 }
 
+#ifndef FIPS_MODE
 ENGINE *RSA_get0_engine(const RSA *r)
 {
     return r->engine;
@@ -630,6 +660,7 @@ int RSA_pkey_ctx_ctrl(EVP_PKEY_CTX *ctx, int optype, int cmd, int p1, void *p2)
         return -1;
      return EVP_PKEY_CTX_ctrl(ctx, -1, optype, cmd, p1, p2);
 }
+#endif
 
 DEFINE_STACK_OF(BIGNUM)
 
@@ -637,7 +668,9 @@ int rsa_set0_all_params(RSA *r, const STACK_OF(BIGNUM) *primes,
                         const STACK_OF(BIGNUM) *exps,
                         const STACK_OF(BIGNUM) *coeffs)
 {
+#ifndef FIPS_MODE
     STACK_OF(RSA_PRIME_INFO) *prime_infos, *old_infos = NULL;
+#endif
     int pnum;
 
     if (primes == NULL || exps == NULL || coeffs == NULL)
@@ -656,9 +689,12 @@ int rsa_set0_all_params(RSA *r, const STACK_OF(BIGNUM) *primes,
                                 sk_BIGNUM_value(coeffs, 0)))
         return 0;
 
+#ifndef FIPS_MODE
     old_infos = r->prime_infos;
+#endif
 
     if (pnum > 2) {
+#ifndef FIPS_MODE
         int i;
 
         prime_infos = sk_RSA_PRIME_INFO_new_reserve(NULL, pnum);
@@ -695,8 +731,12 @@ int rsa_set0_all_params(RSA *r, const STACK_OF(BIGNUM) *primes,
             r->prime_infos = old_infos;
             goto err;
         }
+#else
+        return 0;
+#endif
     }
 
+#ifndef FIPS_MODE
     if (old_infos != NULL) {
         /*
          * This is hard to deal with, since the old infos could
@@ -706,15 +746,18 @@ int rsa_set0_all_params(RSA *r, const STACK_OF(BIGNUM) *primes,
          */
         sk_RSA_PRIME_INFO_pop_free(old_infos, rsa_multip_info_free);
     }
+#endif
 
     r->version = pnum > 2 ? RSA_ASN1_VERSION_MULTI : RSA_ASN1_VERSION_DEFAULT;
     r->dirty_cnt++;
 
     return 1;
+#ifndef FIPS_MODE
  err:
     /* r, d, t should not be freed */
     sk_RSA_PRIME_INFO_pop_free(prime_infos, rsa_multip_info_free_ex);
     return 0;
+#endif
 }
 
 DEFINE_SPECIAL_STACK_OF_CONST(BIGNUM_const, BIGNUM)
@@ -723,29 +766,34 @@ int rsa_get0_all_params(RSA *r, STACK_OF(BIGNUM_const) *primes,
                         STACK_OF(BIGNUM_const) *exps,
                         STACK_OF(BIGNUM_const) *coeffs)
 {
+#ifndef FIPS_MODE
     RSA_PRIME_INFO *pinfo;
     int i, pnum;
+#endif
 
     if (r == NULL)
         return 0;
 
-    pnum = RSA_get_multi_prime_extra_count(r);
-
     sk_BIGNUM_const_push(primes, RSA_get0_p(r));
     sk_BIGNUM_const_push(primes, RSA_get0_q(r));
     sk_BIGNUM_const_push(exps, RSA_get0_dmp1(r));
     sk_BIGNUM_const_push(exps, RSA_get0_dmq1(r));
     sk_BIGNUM_const_push(coeffs, RSA_get0_iqmp(r));
+
+#ifndef FIPS_MODE
+    pnum = RSA_get_multi_prime_extra_count(r);
     for (i = 0; i < pnum; i++) {
         pinfo = sk_RSA_PRIME_INFO_value(r->prime_infos, i);
         sk_BIGNUM_const_push(primes, pinfo->r);
         sk_BIGNUM_const_push(exps, pinfo->d);
         sk_BIGNUM_const_push(coeffs, pinfo->t);
     }
+#endif
 
     return 1;
 }
 
+#ifndef FIPS_MODE
 int EVP_PKEY_CTX_set_rsa_padding(EVP_PKEY_CTX *ctx, int pad_mode)
 {
     OSSL_PARAM pad_params[2], *p = pad_params;
@@ -1129,3 +1177,4 @@ int EVP_PKEY_CTX_get0_rsa_oaep_label(EVP_PKEY_CTX *ctx, unsigned char **label)
 
     return (int)labellen;
 }
+#endif
diff --git a/crypto/rsa/rsa_local.h b/crypto/rsa/rsa_local.h
index 9b55115e47..e15c1ae3d5 100644
--- a/crypto/rsa/rsa_local.h
+++ b/crypto/rsa/rsa_local.h
@@ -29,6 +29,8 @@ DECLARE_ASN1_ITEM(RSA_PRIME_INFO)
 DEFINE_STACK_OF(RSA_PRIME_INFO)
 
 struct rsa_st {
+    OPENSSL_CTX *libctx;
+
     /*
      * The first parameter is used to pickup errors where this is passed
      * instead of an EVP_PKEY, it is set to 0
@@ -46,11 +48,12 @@ struct rsa_st {
     BIGNUM *dmp1;
     BIGNUM *dmq1;
     BIGNUM *iqmp;
+    /* TODO(3.0): Support PSS in FIPS_MODE */
+#ifndef FIPS_MODE
     /* for multi-prime RSA, defined in RFC 8017 */
     STACK_OF(RSA_PRIME_INFO) *prime_infos;
     /* If a PSS only key this contains the parameter restrictions */
     RSA_PSS_PARAMS *pss;
-#ifndef FIPS_MODE
     /* be careful using this if the RSA structure is shared */
     CRYPTO_EX_DATA ex_data;
 #endif
diff --git a/crypto/rsa/rsa_oaep.c b/crypto/rsa/rsa_oaep.c
index 1ae7ed287f..d1150f09a8 100644
--- a/crypto/rsa/rsa_oaep.c
+++ b/crypto/rsa/rsa_oaep.c
@@ -57,8 +57,14 @@ int RSA_padding_add_PKCS1_OAEP_mgf1(unsigned char *to, int tlen,
     unsigned char seedmask[EVP_MAX_MD_SIZE];
     int mdlen, dbmask_len = 0;
 
+#ifndef FIPS_MODE
     if (md == NULL)
         md = EVP_sha1();
+#else
+        RSAerr(RSA_F_RSA_PADDING_ADD_PKCS1_OAEP_MGF1,
+               ERR_R_PASSED_NULL_PARAMETER);
+        return 0;
+#endif
     if (mgf1md == NULL)
         mgf1md = md;
 
@@ -147,8 +153,15 @@ int RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen,
         phash[EVP_MAX_MD_SIZE];
     int mdlen;
 
-    if (md == NULL)
+    if (md == NULL) {
+#ifndef FIPS_MODE
         md = EVP_sha1();
+#else
+        RSAerr(0, ERR_R_PASSED_NULL_PARAMETER);
+        return -1;
+#endif
+    }
+
     if (mgf1md == NULL)
         mgf1md = md;
 
@@ -272,13 +285,19 @@ int RSA_padding_check_PKCS1_OAEP_mgf1(unsigned char *to, int tlen,
         to[i] = constant_time_select_8(mask, db[i + mdlen + 1], to[i]);
     }
 
+#ifndef FIPS_MODE
     /*
      * To avoid chosen ciphertext attacks, the error message should not
      * reveal which kind of decoding error happened.
+     *
+     * This trick doesn't work in the FIPS provider because libcrypto manages
+     * the error stack. Instead we opt not to put an error on the stack at all
+     * in case of padding failure in the FIPS provider.
      */
     RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_OAEP_MGF1,
            RSA_R_OAEP_DECODING_ERROR);
     err_clear_last_constant_time(1 & good);
+#endif
  cleanup:
     OPENSSL_cleanse(seed, sizeof(seed));
     OPENSSL_clear_free(db, dblen);
diff --git a/crypto/rsa/rsa_ossl.c b/crypto/rsa/rsa_ossl.c
index 39d17cf38c..6332a5a411 100644
--- a/crypto/rsa/rsa_ossl.c
+++ b/crypto/rsa/rsa_ossl.c
@@ -91,7 +91,7 @@ static int rsa_ossl_public_encrypt(int flen, const unsigned char *from,
         }
     }
 
-    if ((ctx = BN_CTX_new()) == NULL)
+    if ((ctx = BN_CTX_new_ex(rsa->libctx)) == NULL)
         goto err;
     BN_CTX_start(ctx);
     f = BN_CTX_get(ctx);
@@ -110,9 +110,11 @@ static int rsa_ossl_public_encrypt(int flen, const unsigned char *from,
     case RSA_PKCS1_OAEP_PADDING:
         i = RSA_padding_add_PKCS1_OAEP(buf, num, from, flen, NULL, 0);
         break;
+#ifndef FIPS_MODE
     case RSA_SSLV23_PADDING:
         i = RSA_padding_add_SSLv23(buf, num, from, flen);
         break;
+#endif
     case RSA_NO_PADDING:
         i = RSA_padding_add_none(buf, num, from, flen);
         break;
@@ -246,7 +248,7 @@ static int rsa_ossl_private_encrypt(int flen, const unsigned char *from,
     BIGNUM *unblind = NULL;
     BN_BLINDING *blinding = NULL;
 
-    if ((ctx = BN_CTX_new()) == NULL)
+    if ((ctx = BN_CTX_new_ex(rsa->libctx)) == NULL)
         goto err;
     BN_CTX_start(ctx);
     f = BN_CTX_get(ctx);
@@ -380,7 +382,7 @@ static int rsa_ossl_private_decrypt(int flen, const unsigned char *from,
     BIGNUM *unblind = NULL;
     BN_BLINDING *blinding = NULL;
 
-    if ((ctx = BN_CTX_new()) == NULL)
+    if ((ctx = BN_CTX_new_ex(rsa->libctx)) == NULL)
         goto err;
     BN_CTX_start(ctx);
     f = BN_CTX_get(ctx);
@@ -480,9 +482,11 @@ static int rsa_ossl_private_decrypt(int flen, const unsigned char *from,
     case RSA_PKCS1_OAEP_PADDING:
         r = RSA_padding_check_PKCS1_OAEP(to, num, buf, j, num, NULL, 0);
         break;
+#ifndef FIPS_MODE
     case RSA_SSLV23_PADDING:
         r = RSA_padding_check_SSLv23(to, num, buf, j, num);
         break;
+#endif
     case RSA_NO_PADDING:
         memcpy(to, buf, (r = j));
         break;
@@ -490,8 +494,15 @@ static int rsa_ossl_private_decrypt(int flen, const unsigned char *from,
         RSAerr(RSA_F_RSA_OSSL_PRIVATE_DECRYPT, RSA_R_UNKNOWN_PADDING_TYPE);
         goto err;
     }
+#ifndef FIPS_MODE
+    /*
+     * This trick doesn't work in the FIPS provider because libcrypto manages
+     * the error stack. Instead we opt not to put an error on the stack at all
+     * in case of padding failure in the FIPS provider.
+     */
     RSAerr(RSA_F_RSA_OSSL_PRIVATE_DECRYPT, RSA_R_PADDING_CHECK_FAILED);
     err_clear_last_constant_time(1 & ~constant_time_msb(r));
+#endif
 
  err:
     BN_CTX_end(ctx);
@@ -527,7 +538,7 @@ static int rsa_ossl_public_decrypt(int flen, const unsigned char *from,
         }
     }
 
-    if ((ctx = BN_CTX_new()) == NULL)
+    if ((ctx = BN_CTX_new_ex(rsa->libctx)) == NULL)
         goto err;
     BN_CTX_start(ctx);
     f = BN_CTX_get(ctx);
@@ -600,23 +611,31 @@ static int rsa_ossl_public_decrypt(int flen, const unsigned char *from,
 
 static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
 {
-    BIGNUM *r1, *m1, *vrfy, *r2, *m[RSA_MAX_PRIME_NUM - 2];
-    int ret = 0, i, ex_primes = 0, smooth = 0;
+    BIGNUM *r1, *m1, *vrfy;
+    int ret = 0, smooth = 0;
+#ifndef FIPS_MODE
+    BIGNUM *r2, *m[RSA_MAX_PRIME_NUM - 2];
+    int i, ex_primes = 0;
     RSA_PRIME_INFO *pinfo;
+#endif
 
     BN_CTX_start(ctx);
 
     r1 = BN_CTX_get(ctx);
+#ifndef FIPS_MODE
     r2 = BN_CTX_get(ctx);
+#endif
     m1 = BN_CTX_get(ctx);
     vrfy = BN_CTX_get(ctx);
     if (vrfy == NULL)
         goto err;
 
+#ifndef FIPS_MODE
     if (rsa->version == RSA_ASN1_VERSION_MULTI
         && ((ex_primes = sk_RSA_PRIME_INFO_num(rsa->prime_infos)) <= 0
              || ex_primes > RSA_MAX_PRIME_NUM - 2))
         goto err;
+#endif
 
     if (rsa->flags & RSA_FLAG_CACHE_PRIVATE) {
         BIGNUM *factor = BN_new();
@@ -637,6 +656,7 @@ static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
             BN_free(factor);
             goto err;
         }
+#ifndef FIPS_MODE
         for (i = 0; i < ex_primes; i++) {
             pinfo = sk_RSA_PRIME_INFO_value(rsa->prime_infos, i);
             BN_with_flags(factor, pinfo->r, BN_FLG_CONSTTIME);
@@ -645,13 +665,16 @@ static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
                 goto err;
             }
         }
+#endif
         /*
          * We MUST free |factor| before any further use of the prime factors
          */
         BN_free(factor);
 
-        smooth = (ex_primes == 0)
-                 && (rsa->meth->bn_mod_exp == BN_mod_exp_mont)
+        smooth = (rsa->meth->bn_mod_exp == BN_mod_exp_mont)
+#ifndef FIPS_MODE
+                 && (ex_primes == 0)
+#endif
                  && (BN_num_bits(rsa->q) == BN_num_bits(rsa->p));
     }
 
@@ -757,6 +780,7 @@ static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
         BN_free(dmp1);
     }
 
+#ifndef FIPS_MODE
     /*
      * calculate m_i in multi-prime case
      *
@@ -806,6 +830,7 @@ static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
         BN_free(cc);
         BN_free(di);
     }
+#endif
 
     if (!BN_sub(r0, r0, m1))
         goto err;
@@ -849,6 +874,7 @@ static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
     if (!BN_add(r0, r1, m1))
         goto err;
 
+#ifndef FIPS_MODE
     /* add m_i to m in multi-prime case */
     if (ex_primes > 0) {
         BIGNUM *pr2 = BN_new();
@@ -891,6 +917,7 @@ static int rsa_ossl_mod_exp(BIGNUM *r0, const BIGNUM *I, RSA *rsa, BN_CTX *ctx)
         }
         BN_free(pr2);
     }
+#endif
 
  tail:
     if (rsa->e && rsa->n) {
@@ -966,15 +993,18 @@ static int rsa_ossl_init(RSA *rsa)
 
 static int rsa_ossl_finish(RSA *rsa)
 {
+#ifndef FIPS_MODE
     int i;
     RSA_PRIME_INFO *pinfo;
 
-    BN_MONT_CTX_free(rsa->_method_mod_n);
-    BN_MONT_CTX_free(rsa->_method_mod_p);
-    BN_MONT_CTX_free(rsa->_method_mod_q);
     for (i = 0; i < sk_RSA_PRIME_INFO_num(rsa->prime_infos); i++) {
         pinfo = sk_RSA_PRIME_INFO_value(rsa->prime_infos, i);
         BN_MONT_CTX_free(pinfo->m);
     }
+#endif
+
+    BN_MONT_CTX_free(rsa->_method_mod_n);
+    BN_MONT_CTX_free(rsa->_method_mod_p);
+    BN_MONT_CTX_free(rsa->_method_mod_q);
     return 1;
 }
diff --git a/crypto/rsa/rsa_pk1.c b/crypto/rsa/rsa_pk1.c
index 007e9b8cd5..eedc558e3f 100644
--- a/crypto/rsa/rsa_pk1.c
+++ b/crypto/rsa/rsa_pk1.c
@@ -251,8 +251,15 @@ int RSA_padding_check_PKCS1_type_2(unsigned char *to, int tlen,
     }
 
     OPENSSL_clear_free(em, num);
+#ifndef FIPS_MODE
+    /*
+     * This trick doesn't work in the FIPS provider because libcrypto manages
+     * the error stack. Instead we opt not to put an error on the stack at all
+     * in case of padding failure in the FIPS provider.
+     */
     RSAerr(RSA_F_RSA_PADDING_CHECK_PKCS1_TYPE_2, RSA_R_PKCS_DECODING_ERROR);
     err_clear_last_constant_time(1 & good);
+#endif
 
     return constant_time_select_int(good, mlen, -1);
 }
diff --git a/crypto/rsa/rsa_sp800_56b_check.c b/crypto/rsa/rsa_sp800_56b_check.c
index 93d3103a18..e272840777 100644
--- a/crypto/rsa/rsa_sp800_56b_check.c
+++ b/crypto/rsa/rsa_sp800_56b_check.c
@@ -269,7 +269,7 @@ int rsa_sp800_56b_check_public(const RSA *rsa)
         return 0;
     }
 
-    ctx = BN_CTX_new();
+    ctx = BN_CTX_new_ex(rsa->libctx);
     gcd = BN_new();
     if (ctx == NULL || gcd == NULL)
         goto err;
@@ -358,7 +358,7 @@ int rsa_sp800_56b_check_keypair(const RSA *rsa, const BIGNUM *efixed,
         return 0;
     }
 
-    ctx = BN_CTX_new();
+    ctx = BN_CTX_new_ex(rsa->libctx);
     if (ctx == NULL)
         return 0;
 
diff --git a/crypto/rsa/rsa_sp800_56b_gen.c b/crypto/rsa/rsa_sp800_56b_gen.c
index 5474aaa4b5..1f8d01d477 100644
--- a/crypto/rsa/rsa_sp800_56b_gen.c
+++ b/crypto/rsa/rsa_sp800_56b_gen.c
@@ -297,7 +297,7 @@ int rsa_sp800_56b_generate_key(RSA *rsa, int nbits, const BIGNUM *efixed,
     if (!rsa_sp800_56b_validate_strength(nbits, -1))
         return 0;
 
-    ctx = BN_CTX_new();
+    ctx = BN_CTX_new_ex(rsa->libctx);
     if (ctx == NULL)
         return 0;
 
diff --git a/include/crypto/rsa.h b/include/crypto/rsa.h
index c3763d1e1f..97fd0f7aad 100644
--- a/include/crypto/rsa.h
+++ b/include/crypto/rsa.h
@@ -12,6 +12,8 @@
 
 #include <openssl/rsa.h>
 
+RSA *rsa_new_with_ctx(OPENSSL_CTX *libctx);
+
 int rsa_set0_all_params(RSA *r, const STACK_OF(BIGNUM) *primes,
                         const STACK_OF(BIGNUM) *exps,
                         const STACK_OF(BIGNUM) *coeffs);
diff --git a/include/openssl/rsaerr.h b/include/openssl/rsaerr.h
index 91fcc1cf8e..ef72bc744e 100644
--- a/include/openssl/rsaerr.h
+++ b/include/openssl/rsaerr.h
@@ -1,6 +1,6 @@
 /*
  * Generated by util/mkerr.pl DO NOT EDIT
- * Copyright 1995-2019 The OpenSSL Project Authors. All Rights Reserved.
+ * Copyright 1995-2020 The OpenSSL Project Authors. All Rights Reserved.
  *
  * Licensed under the Apache License 2.0 (the "License").  You may not use
  * this file except in compliance with the License.  You can obtain a copy
diff --git a/providers/fips/fipsprov.c b/providers/fips/fipsprov.c
index acc7edfa0d..596ece5235 100644
--- a/providers/fips/fipsprov.c
+++ b/providers/fips/fipsprov.c
@@ -805,6 +805,11 @@ static const OSSL_ALGORITHM fips_signature[] = {
     { NULL, NULL, NULL }
 };
 
+static const OSSL_ALGORITHM fips_asym_cipher[] = {
+    { "RSA:rsaEncryption", "fips=yes", rsa_asym_cipher_functions },
+    { NULL, NULL, NULL }
+};
+
 static const OSSL_ALGORITHM fips_keymgmt[] = {
 #ifndef OPENSSL_NO_DH
     { "DH:dhKeyAgreement", "fips=yes", dh_keymgmt_functions },
@@ -812,6 +817,7 @@ static const OSSL_ALGORITHM fips_keymgmt[] = {
 #ifndef OPENSSL_NO_DSA
     { "DSA", "fips=yes", dsa_keymgmt_functions },
 #endif
+    { "RSA:rsaEncryption", "default=yes", rsa_keymgmt_functions },
     { NULL, NULL, NULL }
 };
 
@@ -836,6 +842,8 @@ static const OSSL_ALGORITHM *fips_query(OSSL_PROVIDER *prov,
         return fips_keyexch;
     case OSSL_OP_SIGNATURE:
         return fips_signature;
+    case OSSL_OP_ASYM_CIPHER:
+        return fips_asym_cipher;
     }
     return NULL;
 }
diff --git a/providers/implementations/asymciphers/build.info b/providers/implementations/asymciphers/build.info
index aa050803d4..b4033d8a7d 100644
--- a/providers/implementations/asymciphers/build.info
+++ b/providers/implementations/asymciphers/build.info
@@ -1,4 +1,6 @@
-LIBS=../../../libcrypto
-SOURCE[../../../libcrypto]=rsa_enc.c
+# We make separate GOAL variables for each algorithm, to make it easy to
+# switch each to the Legacy provider when needed.
 
+$RSA_GOAL=../../libimplementations.a
 
+SOURCE[$RSA_GOAL]=rsa_enc.c
diff --git a/providers/implementations/asymciphers/rsa_enc.c b/providers/implementations/asymciphers/rsa_enc.c
index c72571d6bb..2cce8474cd 100644
--- a/providers/implementations/asymciphers/rsa_enc.c
+++ b/providers/implementations/asymciphers/rsa_enc.c
@@ -118,6 +118,11 @@ static int rsa_encrypt(void *vprsactx, unsigned char *out, size_t *outlen,
             PROVerr(0, ERR_R_MALLOC_FAILURE);
             return 0;
         }
+        if (prsactx->oaep_md == NULL) {
+            prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, "SHA-1", NULL);
+            PROVerr(0, ERR_R_INTERNAL_ERROR);
+            return 0;
+        }
         ret = RSA_padding_add_PKCS1_OAEP_mgf1(tbuf, rsasize, in, inlen,
                                               prsactx->oaep_label,
                                               prsactx->oaep_labellen,
@@ -194,6 +199,13 @@ static int rsa_decrypt(void *vprsactx, unsigned char *out, size_t *outlen,
             return 0;
         }
         if (prsactx->pad_mode == RSA_PKCS1_OAEP_PADDING) {
+            if (prsactx->oaep_md == NULL) {
+                prsactx->oaep_md = EVP_MD_fetch(prsactx->libctx, "SHA-1", NULL);
+                if (prsactx->oaep_md == NULL) {
+                    PROVerr(0, ERR_R_INTERNAL_ERROR);
+                    return 0;
+                }
+            }
             ret = RSA_padding_check_PKCS1_OAEP_mgf1(out, outsize, tbuf,
                                                     len, len,
                                                     prsactx->oaep_label,
diff --git a/providers/implementations/keymgmt/rsa_kmgmt.c b/providers/implementations/keymgmt/rsa_kmgmt.c
index 6ab695ea7b..f43520f857 100644
--- a/providers/implementations/keymgmt/rsa_kmgmt.c
+++ b/providers/implementations/keymgmt/rsa_kmgmt.c
@@ -18,6 +18,7 @@
 #include "internal/param_build.h"
 #include "prov/implementations.h"
 #include "prov/providercommon.h"
+#include "prov/provider_ctx.h"
 #include "crypto/rsa.h"
 
 static OSSL_OP_keymgmt_new_fn rsa_newdata;
@@ -170,7 +171,9 @@ static int key_to_params(RSA *rsa, OSSL_PARAM_BLD *tmpl)
 
 static void *rsa_newdata(void *provctx)
 {
-    return RSA_new();
+    OPENSSL_CTX *libctx = PROV_LIBRARY_CONTEXT_OF(provctx);
+
+    return rsa_new_with_ctx(libctx);
 }
 
 static void rsa_freedata(void *keydata)
@@ -321,7 +324,7 @@ static int rsa_get_params(void *key, OSSL_PARAM params[])
         && !OSSL_PARAM_set_int(p, RSA_size(rsa)))
         return 0;
 
-# if 0                           /* PSS support pending */
+# if 0  /* TODO(3.0): PSS support pending */
     if ((p = OSSL_PARAM_locate(params,
                                OSSL_PKEY_PARAM_MANDATORY_DIGEST)) != NULL
         && RSA_get0_pss_params(rsa) != NULL) {
@@ -338,9 +341,14 @@ static int rsa_get_params(void *key, OSSL_PARAM params[])
     }
 #endif
     if ((p = OSSL_PARAM_locate(params, OSSL_PKEY_PARAM_DEFAULT_DIGEST)) != NULL
-        && RSA_get0_pss_params(rsa) == NULL)
+/* TODO(3.0): PSS support pending */
+#if 0
+            && RSA_get0_pss_params(rsa) == NULL
+#endif
+            ) {
         if (!OSSL_PARAM_set_utf8_string(p, RSA_DEFAULT_MD))
             return 0;
+    }
 
     return 1;
 }
diff --git a/test/recipes/30-test_evp.t b/test/recipes/30-test_evp.t
index 11e4b9cae9..575a471d2f 100644
--- a/test/recipes/30-test_evp.t
+++ b/test/recipes/30-test_evp.t
@@ -31,9 +31,9 @@ my @configs = ( $defaultcnf );
 # Only add the FIPS config if the FIPS module has been built
 push @configs, 'fips.cnf' unless $no_fips;
 
-my @files = qw( evpciph.txt evpdigest.txt );
+my @files = qw( evpciph.txt evpdigest.txt evppkey.txt);
 my @defltfiles = qw( evpencod.txt evpkdf.txt evppkey_kdf.txt evpmac.txt
-    evppbe.txt evppkey.txt evppkey_ecc.txt evpcase.txt evpccmcavs.txt );
+    evppbe.txt evppkey_ecc.txt evpcase.txt evpccmcavs.txt );
 my @ideafiles = qw( evpciph_idea.txt );
 push @defltfiles, @ideafiles unless disabled("idea");
 
diff --git a/test/recipes/30-test_evp_data/evppkey.txt b/test/recipes/30-test_evp_data/evppkey.txt
index 9b3e514024..1ca16572c4 100644
--- a/test/recipes/30-test_evp_data/evppkey.txt
+++ b/test/recipes/30-test_evp_data/evppkey.txt
@@ -131,34 +131,40 @@ PrivPubKeyPair = DSA-1024:DSA-1024-PUBLIC
 Title = RSA tests
 
 Sign = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 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
 
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 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
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = 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
 Output = "0123456789ABCDEF1234"
 
 # Leading zero in the signature
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 00c09d402423cbf233d26cae21f954547bc43fe80fd41360a0336cfdbe9aedad05bef6fd2eaee6cd60089a52482d4809a238149520df3bdde4cb9e23d9307b05c0a6f327052325a29adf2cc95b66523be7024e2a585c3d4db15dfbe146efe0ecdc0402e33fe5d40324ee96c5c3edd374a15cdc0f5d84aa243c0f07e188c6518fbfceae158a9943be398e31097da81b62074f626eff738be6160741d5a26957a482b3251fd85d8df78b98148459de10aa93305dbb4a5230aa1da291a9b0e481918f99b7638d72bb687f97661d304ae145d64a474437a4ef39d7b8059332ddeb07e92bf6e0e3acaf8afedc93795e4511737ec1e7aab6d5bc9466afc950c1c17b48ad
 Result = VERIFY_ERROR
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = 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
 Result = KEYOP_ERROR
 
 # Digest too long
 Sign = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF12345"
 Output = 00
@@ -166,6 +172,7 @@ Result = KEYOP_ERROR
 
 # Digest too short
 Sign = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF12345"
 Output = 00
@@ -173,6 +180,7 @@ Result = KEYOP_ERROR
 
 # Mismatched digest
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1233"
 Output = c09d402423cbf233d26cae21f954547bc43fe80fd41360a0336cfdbe9aedad05bef6fd2eaee6cd60089a52482d4809a238149520df3bdde4cb9e23d9307b05c0a6f327052325a29adf2cc95b66523be7024e2a585c3d4db15dfbe146efe0ecdc0402e33fe5d40324ee96c5c3edd374a15cdc0f5d84aa243c0f07e188c6518fbfceae158a9943be398e31097da81b62074f626eff738be6160741d5a26957a482b3251fd85d8df78b98148459de10aa93305dbb4a5230aa1da291a9b0e481918f99b7638d72bb687f97661d304ae145d64a474437a4ef39d7b8059332ddeb07e92bf6e0e3acaf8afedc93795e4511737ec1e7aab6d5bc9466afc950c1c17b48ad
@@ -180,6 +188,7 @@ Result = VERIFY_ERROR
 
 # Corrupted signature
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1233"
 Output = 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
@@ -187,6 +196,7 @@ Result = VERIFY_ERROR
 
 # parameter is not NULL
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = "0123456789ABCDEF1234"
 Output = 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
@@ -194,65 +204,76 @@ Result = VERIFY_ERROR
 
 # embedded digest too long
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = "0123456789ABCDEF1234"
 Output = afec9a0d5330a08f54283bb4a9d4e7e7e70fc1342336c4c766fba713f66970151c6e27413c48c33864ea45a0238787004f338ed3e21b53b0fe9c1151c42c388cbc7cba5a06b706c407a5b48324fbe994dc7afc3a19fb3d2841e66222596c14cd72a0f0a7455a019d8eb554f59c0183f9552b75aa96fee8bf935945e079ca283d2bd3534a86f11351f6d6181fbf433e5b01a6d1422145c7a72214d3aacdd5d3af12b2d6bf6438f9f9a64010d8aeed801c87f0859412b236150b86a545f7239be022f4a7ad246b59df87514294cb4a4c7c5a997ee53c66054d9f38ca4e76c1f7af83c30f737ef70f83a45aebe18238ddb95e1998814ca4fc72388f1533147c169d
 Result = VERIFY_ERROR
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = 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
 Result = KEYOP_ERROR
 
 # embedded digest too short
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = "0123456789ABCDEF1234"
 Output = afec9a0d5330a08f54283bb4a9d4e7e7e70fc1342336c4c766fba713f66970151c6e27413c48c33864ea45a0238787004f338ed3e21b53b0fe9c1151c42c388cbc7cba5a06b706c407a5b48324fbe994dc7afc3a19fb3d2841e66222596c14cd72a0f0a7455a019d8eb554f59c0183f9552b75aa96fee8bf935945e079ca283d2bd3534a86f11351f6d6181fbf433e5b01a6d1422145c7a72214d3aacdd5d3af12b2d6bf6438f9f9a64010d8aeed801c87f0859412b236150b86a545f7239be022f4a7ad246b59df87514294cb4a4c7c5a997ee53c66054d9f38ca4e76c1f7af83c30f737ef70f83a45aebe18238ddb95e1998814ca4fc72388f1533147c169d
 Result = VERIFY_ERROR
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = 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
 Result = KEYOP_ERROR
 
 # Garbage after DigestInfo
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = "0123456789ABCDEF1234"
 Output = 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
 Result = VERIFY_ERROR
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = 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
 Result = KEYOP_ERROR
 
 # invalid tag for parameter
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = "0123456789ABCDEF1234"
 Output = 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
 Result = VERIFY_ERROR
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:sha1
 Input = 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
 Result = KEYOP_ERROR
 
 # MD5/SHA-1 combination
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MD5-SHA1
 Input = "0123456789ABCDEF0123456789ABCDEF0123"
 Output = 7b80e0d4d2a6b7f4b018ce164bc0be21a0604b1b05e91c6204372458b05a0e4dbf0b36b3f80dbf04b278ad1fcf7ff6d982d5ca5d98b13b68240d846d400b8db6675b1a5fcbe2256322c5f691378bc941785326030fa835d240e334e2a4d35b17c1149b59dbb6e6d53b44326ebfc371f754449d36bad3722c1878af1699bb0a00c28e37162f99aba550b7c333228a70c906e3701c519a460a14fac29ff164ca9413efd19b431b31a9ad2988662cdbda9cdcff85f294b4be2cf072caceb1d3f52642edafea2e1d1e495061f18b5b3a130d2242cec830e44d506590e5df69bb974879a35e6bdc1ad00e3e31b362f2f5cdeabd8a0dfddfdb66a7c43993a3e189b80d
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:MD5-SHA1
 Input = 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
 Output = "0123456789ABCDEF0123456789ABCDEF0123"
 
 # MD5/SHA-1 combination, digest mismatch
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MD5-SHA1
 Input = "000000000000000000000000000000000000"
 Output = 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
@@ -260,18 +281,21 @@ Result = VERIFY_ERROR
 
 # MD5/SHA-1 combination, wrong signature digest length
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MD5-SHA1
 Input = "0123456789ABCDEF0123456789ABCDEF0123"
 Output = 6c13511f97ffb8137545fce551a43cf2b5b3dbdd5c3ceaaccd4620a6a373f3c38cc523d95bbdd810c852743b981bc4393c6b0cdfb0da5e77a8cc0108b05ff95e0f4dd7a0125b7390af1408dca6ddefac3b05b768de7b0c3df3c74e5f102f62743d67813beee1777036078da4cff5b29f49f01a6df3a2e709c37a83737108517687fe754d9ee908cb36c55e88f67c0b537108707347d16049f5dfac3d400ea367222d36627937a7f822f451c3d2c2dbc9e2202bffd3dc1b22213e17270a6b657619c6f44cbf66b077d548cfc9e1a114f8b853412470f2bf8d828f04d0d9f1aef260d216acb0911329fb5bdc48c2be3b198bf6f96e1c3fb116ad4430140d0640d4
 Result = VERIFY_ERROR
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:MD5-SHA1
 Input = 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
 Result = KEYOP_ERROR
 
 # MD5/SHA-1 combination, wrong input digest length
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MD5-SHA1
 Input = "0123456789ABCDEF0123456789ABCDEF012"
 Output = 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
@@ -279,6 +303,7 @@ Result = VERIFY_ERROR
 
 # MD5/SHA-1 combination, wrong input and signature digest length
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MD5-SHA1
 Input = "0123456789ABCDEF0123456789ABCDEF012"
 Output = 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
@@ -286,28 +311,33 @@ Result = VERIFY_ERROR
 
 # DigestInfo-wrapped MDC-2 signature
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = "0123456789ABCDEF"
 Output = 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
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = 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
 Output = "0123456789ABCDEF"
 
 # Legacy OCTET STRING MDC-2 signature
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = "0123456789ABCDEF"
 Output = 6cde46bbfc6a3b772c3d884640709be9f2fb70fcf199c14eaff7811369ea99733f984a9c48cd372578fa37cedeef24c93286d6d64f438df051e625ab2e125a7d9974a76240873e43efc3acbcbdccc2ee63769cdbf983b334ccb982273315c222b3bbdc3e928ac8a141a7412f1f794cfcabcc069a2ae4975d7bb68bea145d789634c9e0b02d324b5efd599c9bf2b1d32d077aba59aa0ad4a82cbbb90eaa9214e4f57104cf049c4139e2ddecf6edf219cd986f4d79cf25128c58667562c9d22be0291430d6cc7dad977d56e08315fcec133ea95d8db550f89735b4d5f233eaff0c86fce2b99f3f508e920f882c31f3e13f8775a3c8fa585c4f4c69eca89f648b7e
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = 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
 Output = "0123456789ABCDEF"
 
 # Legacy OCTET STRING MDC-2 signature, digest mismatch
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = "0000000000000000"
 Output = 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
@@ -315,6 +345,7 @@ Result = VERIFY_ERROR
 
 # Legacy OCTET STRING MDC-2 signature, wrong input digest length
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = "0123456789ABCDE"
 Output = 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
@@ -322,18 +353,21 @@ Result = VERIFY_ERROR
 
 # Legacy OCTET STRING MDC-2 signature, wrong signature digest length
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = "0123456789ABCDEF"
 Output = 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
 Result = VERIFY_ERROR
 
 VerifyRecover = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = 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
 Result = KEYOP_ERROR
 
 # Legacy OCTET STRING MDC-2 signature, wrong input and signature digest length
 Verify = RSA-2048
+Availablein = default
 Ctrl = digest:MDC2
 Input = "0123456789ABCDE"
 Output = 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
@@ -342,6 +376,7 @@ Result = VERIFY_ERROR
 # Verify using public key
 
 Verify = RSA-2048-PUBLIC
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 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
@@ -377,6 +412,7 @@ Result = KEYOP_INIT_ERROR
 Reason = operation not supported for this keytype
 
 Sign = RSA-2048
+Availablein = default
 Ctrl = rsa_mgf1_md:sha1
 Result = PKEY_CTRL_INVALID
 Reason = invalid mgf1 md
@@ -459,6 +495,7 @@ PrivPubKeyPair = RSA-PSS:RSA-PSS-BAD2
 
 # Zero salt length makes output deterministic
 Sign = RSA-2048
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:0
 Ctrl = digest:sha256
@@ -467,6 +504,7 @@ Output=4DE433D5844043EF08D354DA03CB29068780D52706D7D1E4D50EFB7D58C9D547D83A747DD
 
 # Verify of above signature
 Verify = RSA-2048-PUBLIC
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:0
 Ctrl = digest:sha256
@@ -475,6 +513,7 @@ Output=4DE433D5844043EF08D354DA03CB29068780D52706D7D1E4D50EFB7D58C9D547D83A747DD
 
 # Verify using salt length auto detect
 Verify = RSA-2048-PUBLIC
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:auto
 Input="0123456789ABCDEF0123"
@@ -482,6 +521,7 @@ Output = 6BF7EDC63A0BA184EEEC7F3020FEC8F5EBF38C2B76481881F48BCCE5796E7AB294548BA
 
 # Digest too short
 Verify = RSA-2048-PUBLIC
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:0
 Ctrl = digest:sha256
@@ -491,6 +531,7 @@ Result = VERIFY_ERROR
 
 # Digest too long
 Verify = RSA-2048-PUBLIC
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:0
 Ctrl = digest:sha256
@@ -500,6 +541,7 @@ Result = VERIFY_ERROR
 
 # Wrong salt length
 Verify = RSA-2048
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:2
 Ctrl = digest:sha256
@@ -509,6 +551,7 @@ Result = VERIFY_ERROR
 
 # Wrong MGF1 digest
 Verify = RSA-2048
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:0
 Ctrl = digest:sha256
@@ -520,11 +563,13 @@ Result = VERIFY_ERROR
 
 # Verify using default parameters
 Verify = RSA-PSS-DEFAULT
+Availablein = default
 Input="0123456789ABCDEF0123"
 Output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
 
 # Verify using default parameters, explicitly setting parameters
 Verify = RSA-PSS-DEFAULT
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:20
 Ctrl = digest:sha1
@@ -533,6 +578,7 @@ Output = 3EFE09D88509027D837BFA5F8471CF7B69E6DF395DD999BB9CA42021F15722D9AC76670
 
 # Verify explicitly setting parameters "digest" salt length
 Verify = RSA-PSS-DEFAULT
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_pss_saltlen:digest
 Ctrl = digest:sha1
@@ -547,37 +593,44 @@ Output = 6BF7EDC63A0BA184EEEC7F3020FEC8F5EBF38C2B76481881F48BCCE5796E7AB294548BA
 
 # Verify using maximum salt length
 Verify = RSA-PSS-DEFAULT
+Availablein = default
 Ctrl = rsa_pss_saltlen:max
 Input="0123456789ABCDEF0123"
 Output = 4470DCFE812DEE2E58E4301D4ED274AB348FE040B724B2CD1D8CD0914BFF375F0B86FCB32BFA8AEA9BD22BD7C4F1ADD4F3D215A5CFCC99055BAFECFC23800E9BECE19A08C66BEBC5802122D13A732E5958FC228DCC0B49B5B4B1154F032D8FA2F3564AA949C1310CC9266B0C47F86D449AC9D2E7678347E7266E2D7C888CCE1ADF44A109A293F8516AE2BD94CE220F26E137DB8E7A66BB9FCE052CDC1D0BE24D8CEBB20D10125F26B069F117044B9E1D16FDDAABCA5340AE1702F37D0E1C08A2E93801C0A41035C6C73DA02A0E32227EAFB0B85E79107B59650D0EE7DC32A6772CCCE90F06369B2880FE87ED76997BA61F5EA818091EE88F8B0D6F24D02A3FC6
 
 # Attempt to change salt length below minimum
 Verify = RSA-PSS-DEFAULT
+Availablein = default
 Ctrl = rsa_pss_saltlen:0
 Result = PKEY_CTRL_ERROR
 
 # Attempt to change padding mode
 Verify = RSA-PSS-DEFAULT
+Availablein = default
 Ctrl = rsa_padding_mode:pkcs1
 Result = PKEY_CTRL_INVALID
 
 # Attempt to change digest
 Verify = RSA-PSS-DEFAULT
+Availablein = default
 Ctrl = digest:sha256
 Result = PKEY_CTRL_ERROR
 
 # Illegal decrypt
 Decrypt = RSA-PSS
+Availablein = default
 Result = KEYOP_INIT_ERROR
 Reason = operation not supported for this keytype
 
 # Invalid key: rejected when we try to init
 Verify = RSA-PSS-BAD
+Availablein = default
 Result = KEYOP_INIT_ERROR
 Reason = invalid salt length
 
 # Invalid key: rejected when we try to init
 Verify = RSA-PSS-BAD2
+Availablein = default
 Result = KEYOP_INIT_ERROR
 Reason = invalid salt length
 
@@ -585,12 +638,14 @@ Reason = invalid salt length
 Title = EC tests
 
 Verify = P-256
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 3045022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec8
 
 # Digest too long
 Verify = P-256
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF12345"
 Output = 3045022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec8
@@ -598,6 +653,7 @@ Result = VERIFY_ERROR
 
 # Digest too short
 Verify = P-256
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF123"
 Output = 3045022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec8
@@ -605,6 +661,7 @@ Result = VERIFY_ERROR
 
 # Digest invalid
 Verify = P-256
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1235"
 Output = 3045022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec8
@@ -612,6 +669,7 @@ Result = VERIFY_ERROR
 
 # Invalid signature
 Verify = P-256
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 3045022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec7
@@ -619,6 +677,7 @@ Result = VERIFY_ERROR
 
 # Garbage after signature
 Verify = P-256
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 3045022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec800
@@ -626,21 +685,25 @@ Result = VERIFY_ERROR
 
 # BER signature
 Verify = P-256
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 3080022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec80000
 Result = VERIFY_ERROR
 
 Verify = P-256-PUBLIC
+Availablein = default
 Ctrl = digest:SHA1
 Input = "0123456789ABCDEF1234"
 Output = 3045022100b1d1cb1a577035bccdd5a86c6148c2cc7c633cd42b7234139b593076d041e15202201898cdd52b41ca502098184b409cf83a21bc945006746e3b7cea52234e043ec8
 
 Derive=P-256
+Availablein = default
 PeerKey=P-256-Peer-PUBLIC
 SharedSecret=E3CC07DFBDDE76A1139811DB9FF5FAF9D17EF39944F1E77D1F6A208524BF7B1B
 
 Derive=P-256-Peer
+Availablein = default
 PeerKey=P-256-PUBLIC
 SharedSecret=E3CC07DFBDDE76A1139811DB9FF5FAF9D17EF39944F1E77D1F6A208524BF7B1B
 
@@ -738,28 +801,34 @@ PrivPubKeyPair = Bob-25519:Bob-25519-PUBLIC
 PrivPubKeyPair = Bob-25519-Raw:Bob-25519-PUBLIC-Raw
 
 Derive=Alice-25519
+Availablein = default
 PeerKey=Bob-25519-PUBLIC
 SharedSecret=4A5D9D5BA4CE2DE1728E3BF480350F25E07E21C947D19E3376F09B3C1E161742
 
 Derive=Bob-25519
+Availablein = default
 PeerKey=Alice-25519-PUBLIC
 SharedSecret=4A5D9D5BA4CE2DE1728E3BF480350F25E07E21C947D19E3376F09B3C1E161742
 
 Derive=Alice-25519-Raw
+Availablein = default
 PeerKey=Bob-25519-PUBLIC-Raw
 SharedSecret=4A5D9D5BA4CE2DE1728E3BF480350F25E07E21C947D19E3376F09B3C1E161742
 
 Derive=Bob-25519-Raw
+Availablein = default
 PeerKey=Alice-25519-PUBLIC-Raw
 SharedSecret=4A5D9D5BA4CE2DE1728E3BF480350F25E07E21C947D19E3376F09B3C1E161742
 
 # Illegal sign/verify operations with X25519 key
 
 Sign=Alice-25519
+Availablein = default
 Result = KEYOP_INIT_ERROR
 Reason = operation not supported for this keytype
 
 Verify=Alice-25519
+Availablein = default
 Result = KEYOP_INIT_ERROR
 Reason = operation not supported for this keytype
 
@@ -810,33 +879,40 @@ PrivPubKeyPair = Bob-448-Raw:Bob-448-PUBLIC-Raw
 PublicKeyRaw=Bob-448-PUBLIC-Raw-NonCanonical:X448:ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
 
 Derive=Alice-448
+Availablein = default
 PeerKey=Bob-448-PUBLIC
 SharedSecret=07fff4181ac6cc95ec1c16a94a0f74d12da232ce40a77552281d282bb60c0b56fd2464c335543936521c24403085d59a449a5037514a879d
 
 Derive=Bob-448
+Availablein = default
 PeerKey=Alice-448-PUBLIC
 SharedSecret=07fff4181ac6cc95ec1c16a94a0f74d12da232ce40a77552281d282bb60c0b56fd2464c335543936521c24403085d59a449a5037514a879d
 
 Derive=Alice-448-Raw
+Availablein = default
 PeerKey=Bob-448-PUBLIC-Raw
 SharedSecret=07fff4181ac6cc95ec1c16a94a0f74d12da232ce40a77552281d282bb60c0b56fd2464c335543936521c24403085d59a449a5037514a879d
 
 Derive=Bob-448-Raw
+Availablein = default
 PeerKey=Alice-448-PUBLIC-Raw
 SharedSecret=07fff4181ac6cc95ec1c16a94a0f74d12da232ce40a77552281d282bb60c0b56fd2464c335543936521c24403085d59a449a5037514a879d
 
 # Self-generated non-canonical
 Derive=Alice-448-Raw
+Availablein = default
 PeerKey=Bob-448-PUBLIC-Raw-NonCanonical
 SharedSecret=66e2e682b1f8e68c809f1bb3e406bd826921d9c1a5bfbfcbab7ae72feecee63660eabd54934f3382061d17607f581a90bdac917a064959fb
 
 # Illegal sign/verify operations with X448 key
 
 Sign=Alice-448
+Availablein = default
 Result = KEYOP_INIT_ERROR
 Reason = operation not supported for this keytype
 
 Verify=Alice-448
+Availablein = default
 Result = KEYOP_INIT_ERROR
 Reason = operation not supported for this keytype
 
@@ -854,36 +930,42 @@ CAltWyuLbfXWce9jd8CSHLI8Jwpw4lmOb/idGfEFrMLT8Ms18pKA4Thrb2TE7yLh
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-1
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=cd8b6538cb8e8de566b68bd067569dbf1ee2718e
 Output=9074308fb598e9701b2294388e52f971faac2b60a5145af185df5287b5ed2887e57ce7fd44dc8634e407c8e0e4360bc226f3ec227f9d9e54638e8d31f5051215df6ebb9c2f9579aa77598a38f914b5b9c1bd83c4e2f9f382a0d0aa3542ffee65984a601bc69eb28deb27dca12c82c2d4c3f66cd500f1ff2b994d8a4e30cbb33c
 
 Verify=RSA-PSS-1
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=e35befc17a1d160b9ce35fbd8eb16e7ee491d3fd
 Output=3ef7f46e831bf92b32274142a585ffcefbdca7b32ae90d10fb0f0c729984f04ef29a9df0780775ce43739b97838390db0a5505e63de927028d9d29b219ca2c4517832558a55d694a6d25b9dab66003c4cccd907802193be5170d26147d37b93590241be51c25055f47ef62752cfbe21418fafe98c22c4d4d47724fdb5669e843
 
 Verify=RSA-PSS-1
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=0652ec67bcee30f9d2699122b91c19abdba89f91
 Output=666026fba71bd3e7cf13157cc2c51a8e4aa684af9778f91849f34335d141c00154c4197621f9624a675b5abc22ee7d5baaffaae1c9baca2cc373b3f33e78e6143c395a91aa7faca664eb733afd14d8827259d99a7550faca501ef2b04e33c23aa51f4b9e8282efdb728cc0ab09405a91607c6369961bc8270d2d4f39fce612b1
 
 Verify=RSA-PSS-1
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=39c21c4cceda9c1adf839c744e1212a6437575ec
 Output=4609793b23e9d09362dc21bb47da0b4f3a7622649a47d464019b9aeafe53359c178c91cd58ba6bcb78be0346a7bc637f4b873d4bab38ee661f199634c547a1ad8442e03da015b136e543f7ab07c0c13e4225b8de8cce25d4f6eb8400f81f7e1833b7ee6e334d370964ca79fdb872b4d75223b5eeb08101591fb532d155a6de87
 
 Verify=RSA-PSS-1
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=36dae913b77bd17cae6e7b09453d24544cebb33c
 Output=1d2aad221ca4d31ddf13509239019398e3d14b32dc34dc5af4aeaea3c095af73479cf0a45e5629635a53a018377615b16cb9b13b3e09d671eb71e387b8545c5960da5a64776e768e82b2c93583bf104c3fdb23512b7b4e89f633dd0063a530db4524b01c3f384c09310e315a79dcd3d684022a7f31c865a664e316978b759fad
 
 Verify=RSA-PSS-1
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=45eef191f4f79c31fe5d2ede7e5098994e929d2d
@@ -898,36 +980,42 @@ PRdqAX7cYf0ybEszyQIDAQAB
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-2
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=5c81a3e2a658246628cd0ee8b00bb4c012bc9739
 Output=014c5ba5338328ccc6e7a90bf1c0ab3fd606ff4796d3c12e4b639ed9136a5fec6c16d8884bdd99cfdc521456b0742b736868cf90de099adb8d5ffd1deff39ba4007ab746cefdb22d7df0e225f54627dc65466131721b90af445363a8358b9f607642f78fab0ab0f43b7168d64bae70d8827848d8ef1e421c5754ddf42c2589b5b3
 
 Verify=RSA-PSS-2
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=27f71611446aa6eabf037f7dedeede3203244991
 Output=010991656cca182b7f29d2dbc007e7ae0fec158eb6759cb9c45c5ff87c7635dd46d150882f4de1e9ae65e7f7d9018f6836954a47c0a81a8a6b6f83f2944d6081b1aa7c759b254b2c34b691da67cc0226e20b2f18b42212761dcd4b908a62b371b5918c5742af4b537e296917674fb914194761621cc19a41f6fb953fbcbb649dea
 
 Verify=RSA-PSS-2
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=03ecc2c33e93f05fc7224fcc0d461356cb897217
 Output=007f0030018f53cdc71f23d03659fde54d4241f758a750b42f185f87578520c30742afd84359b6e6e8d3ed959dc6fe486bedc8e2cf001f63a7abe16256a1b84df0d249fc05d3194ce5f0912742dbbf80dd174f6c51f6bad7f16cf3364eba095a06267dc3793803ac7526aebe0a475d38b8c2247ab51c4898df7047dc6adf52c6c4
 
 Verify=RSA-PSS-2
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=246c727b4b9494849dddb068d582e179ac20999c
 Output=009cd2f4edbe23e12346ae8c76dd9ad3230a62076141f16c152ba18513a48ef6f010e0e37fd3df10a1ec629a0cb5a3b5d2893007298c30936a95903b6ba85555d9ec3673a06108fd62a2fda56d1ce2e85c4db6b24a81ca3b496c36d4fd06eb7c9166d8e94877c42bea622b3bfe9251fdc21d8d5371badad78a488214796335b40b
 
 Verify=RSA-PSS-2
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=e8617ca3ea66ce6a58ede2d11af8c3ba8a6ba912
 Output=00ec430824931ebd3baa43034dae98ba646b8c36013d1671c3cf1cf8260c374b19f8e1cc8d965012405e7e9bf7378612dfcc85fce12cda11f950bd0ba8876740436c1d2595a64a1b32efcfb74a21c873b3cc33aaf4e3dc3953de67f0674c0453b4fd9f604406d441b816098cb106fe3472bc251f815f59db2e4378a3addc181ecf
 
 Verify=RSA-PSS-2
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=7a6fdc1a4e434ecbc35d657ad49a2f4fafd43bc8
@@ -942,42 +1030,49 @@ nQ6tsIdYbKSJM9o8yVPZW9DtUN4Q3ctnNhB9bIMcf2Y+gzykwJfnAM4PuUX4j7hf
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-3
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=3552be69dd74bdc56d2cf8c38ef7bafe269040fe
 Output=0088b135fb1794b6b96c4a3e678197f8cac52b64b2fe907d6f27de761124964a99a01a882740ecfaed6c01a47464bb05182313c01338a8cd097214cd68ca103bd57d3bc9e816213e61d784f182467abf8a01cf253e99a156eaa8e3e1f90e3c6e4e3aa2d83ed0345b89fafc9c26077c14b6ac51454fa26e446e3a2f153b2b16797f
 
 Verify=RSA-PSS-3
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=609143ff7240e55c062aba8b9e4426a781919bc9
 Output=02a5f0a858a0864a4f65017a7d69454f3f973a2999839b7bbc48bf78641169179556f595fa41f6ff18e286c2783079bc0910ee9cc34f49ba681124f923dfa88f426141a368a5f5a930c628c2c3c200e18a7644721a0cbec6dd3f6279bde3e8f2be5e2d4ee56f97e7ceaf33054be7042bd91a63bb09f897bd41e81197dee99b11af
 
 Verify=RSA-PSS-3
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=0afd22f879a9cda7c584f4135f8f1c961db114c0
 Output=0244bcd1c8c16955736c803be401272e18cb990811b14f72db964124d5fa760649cbb57afb8755dbb62bf51f466cf23a0a1607576e983d778fceffa92df7548aea8ea4ecad2c29dd9f95bc07fe91ecf8bee255bfe8762fd7690aa9bfa4fa0849ef728c2c42c4532364522df2ab7f9f8a03b63f7a499175828668f5ef5a29e3802c
 
 Verify=RSA-PSS-3
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=405dd56d395ef0f01b555c48f748cc32b210650b
 Output=0196f12a005b98129c8df13c4cb16f8aa887d3c40d96df3a88e7532ef39cd992f273abc370bc1be6f097cfebbf0118fd9ef4b927155f3df22b904d90702d1f7ba7a52bed8b8942f412cd7bd676c9d18e170391dcd345c06a730964b3f30bcce0bb20ba106f9ab0eeb39cf8a6607f75c0347f0af79f16afa081d2c92d1ee6f836b8
 
 Verify=RSA-PSS-3
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=a2c313b0440c8a0c47233b87f0a160c61af3eae7
 Output=021eca3ab4892264ec22411a752d92221076d4e01c0e6f0dde9afd26ba5acf6d739ef987545d16683e5674c9e70f1de649d7e61d48d0caeb4fb4d8b24fba84a6e3108fee7d0705973266ac524b4ad280f7ae17dc59d96d3351586b5a3bdb895d1e1f7820ac6135d8753480998382ba32b7349559608c38745290a85ef4e9f9bd83
 
 Verify=RSA-PSS-3
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=f1bf6ca7b4bbdbb6bf20a4bf55728725d177154a
 Output=012fafec862f56e9e92f60ab0c77824f4299a0ca734ed26e0644d5d222c7f0bde03964f8e70a5cb65ed44e44d56ae0edf1ff86ca032cc5dd4404dbb76ab854586c44eed8336d08d457ce6c03693b45c0f1efef93624b95b8ec169c616d20e5538ebc0b6737a6f82b4bc0570924fc6b35759a3348426279f8b3d7744e2d222426ce
 
 PublicKey=RSA-PSS-4
+Availablein = default
 -----BEGIN PUBLIC KEY-----
 MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQVK23iGRH7+b1fgNo8Gz1KwozcH
 YNFhzvEmuRvn+JxCG2Km7B2jwxHXXtUOCrX/8/0zisw6qKTnfuJjaay4G6kA+oP1
@@ -986,36 +1081,42 @@ iEjIuVlAdAvnv3w3BQIDAQAB
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-4
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=f8b0abf70fec0bca74f0accbc24f75e6e90d3bfd
 Output=0323d5b7bf20ba4539289ae452ae4297080feff4518423ff4811a817837e7d82f1836cdfab54514ff0887bddeebf40bf99b047abc3ecfa6a37a3ef00f4a0c4a88aae0904b745c846c4107e8797723e8ac810d9e3d95dfa30ff4966f4d75d13768d20857f2b1406f264cfe75e27d7652f4b5ed3575f28a702f8c4ed9cf9b2d44948
 
 Verify=RSA-PSS-4
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=04a10944bfe11ab801e77889f3fd3d7f4ff0b629
 Output=049d0185845a264d28feb1e69edaec090609e8e46d93abb38371ce51f4aa65a599bdaaa81d24fba66a08a116cb644f3f1e653d95c89db8bbd5daac2709c8984000178410a7c6aa8667ddc38c741f710ec8665aa9052be929d4e3b16782c1662114c5414bb0353455c392fc28f3db59054b5f365c49e1d156f876ee10cb4fd70598
 
 Verify=RSA-PSS-4
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=ba01243db223eb97fb86d746c3148adaaa0ca344
 Output=03fbc410a2ced59500fb99f9e2af2781ada74e13145624602782e2994813eefca0519ecd253b855fb626a90d771eae028b0c47a199cbd9f8e3269734af4163599090713a3fa910fa0960652721432b971036a7181a2bc0cab43b0b598bc6217461d7db305ff7e954c5b5bb231c39e791af6bcfa76b147b081321f72641482a2aad
 
 Verify=RSA-PSS-4
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=934bb0d38d6836daec9de82a9648d4593da67cd2
 Output=0486644bc66bf75d28335a6179b10851f43f09bded9fac1af33252bb9953ba4298cd6466b27539a70adaa3f89b3db3c74ab635d122f4ee7ce557a61e59b82ffb786630e5f9db53c77d9a0c12fab5958d4c2ce7daa807cd89ba2cc7fcd02ff470ca67b229fcce814c852c73cc93bea35be68459ce478e9d4655d121c8472f371d4f
 
 Verify=RSA-PSS-4
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=ec35d81abd1cceac425a935758b683465c8bd879
 Output=022a80045353904cb30cbb542d7d4990421a6eec16a8029a8422adfd22d6aff8c4cc0294af110a0c067ec86a7d364134459bb1ae8ff836d5a8a2579840996b320b19f13a13fad378d931a65625dae2739f0c53670b35d9d3cbac08e733e4ec2b83af4b9196d63e7c4ff1ddeae2a122791a125bfea8deb0de8ccf1f4ffaf6e6fb0a
 
 Verify=RSA-PSS-4
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=72ce251d17b04dd3970d6ff1fbe3624899e9e941
@@ -1030,36 +1131,42 @@ pLDMjaMl7YqmdrDQ9ibgp38HaSFwrKyAgvQvqn3HzRI+cw4xqHmFIEyry+ZnDUOi
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-5
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=d98b7061943510bc3dd9162f7169aabdbdcd0222
 Output=0ba373f76e0921b70a8fbfe622f0bf77b28a3db98e361051c3d7cb92ad0452915a4de9c01722f6823eeb6adf7e0ca8290f5de3e549890ac2a3c5950ab217ba58590894952de96f8df111b2575215da6c161590c745be612476ee578ed384ab33e3ece97481a252f5c79a98b5532ae00cdd62f2ecc0cd1baefe80d80b962193ec1d
 
 Verify=RSA-PSS-5
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=7ae8e699f754988f4fd645e463302e49a2552072
 Output=08180de825e4b8b014a32da8ba761555921204f2f90d5f24b712908ff84f3e220ad17997c0dd6e706630ba3e84add4d5e7ab004e58074b549709565d43ad9e97b5a7a1a29e85b9f90f4aafcdf58321de8c5974ef9abf2d526f33c0f2f82e95d158ea6b81f1736db8d1af3d6ac6a83b32d18bae0ff1b2fe27de4c76ed8c7980a34e
 
 Verify=RSA-PSS-5
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=8d46c7c05534c1ba2cc7624500d48a4531604bff
 Output=05e0fdbdf6f756ef733185ccfa8ced2eb6d029d9d56e35561b5db8e70257ee6fd019d2f0bbf669fe9b9821e78df6d41e31608d58280f318ee34f559941c8df13287574bac000b7e58dc4f414ba49fb127f9d0f8936638c76e85356c994f79750f7fa3cf4fd482df75e3fb9978cd061f7abb17572e6e63e0bde12cbdcf18c68b979
 
 Verify=RSA-PSS-5
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=ee3de96783fd0a157c8b20bf5566124124dcfe65
 Output=0bc989853bc2ea86873271ce183a923ab65e8a53100e6df5d87a24c4194eb797813ee2a187c097dd872d591da60c568605dd7e742d5af4e33b11678ccb63903204a3d080b0902c89aba8868f009c0f1c0cb85810bbdd29121abb8471ff2d39e49fd92d56c655c8e037ad18fafbdc92c95863f7f61ea9efa28fea401369d19daea1
 
 Verify=RSA-PSS-5
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=1204df0b03c2724e2709c23fc71789a21b00ae4c
 Output=0aefa943b698b9609edf898ad22744ac28dc239497cea369cbbd84f65c95c0ad776b594740164b59a739c6ff7c2f07c7c077a86d95238fe51e1fcf33574a4ae0684b42a3f6bf677d91820ca89874467b2c23add77969c80717430d0efc1d3695892ce855cb7f7011630f4df26def8ddf36fc23905f57fa6243a485c770d5681fcd
 
 Verify=RSA-PSS-5
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=29926bc3280c841f601acd0d6f17ea38023eddbc
@@ -1074,36 +1181,42 @@ nJnpaUMfYcuMTcaY0QIDAQAB
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-6
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=ab464e8cb65ae5fdea47a53fa84b234d6bfd52f6
 Output=04c0cfacec04e5badbece159a5a1103f69b3f32ba593cb4cc4b1b7ab455916a96a27cd2678ea0f46ba37f7fc9c86325f29733b389f1d97f43e7201c0f348fc45fe42892335362eee018b5b161f2f9393031225c713012a576bc88e23052489868d9010cbf033ecc568e8bc152bdc59d560e41291915d28565208e22aeec9ef85d1
 
 Verify=RSA-PSS-6
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=92d0bcae82b641f578f040f5151be8eda6d42299
 Output=0a2314250cf52b6e4e908de5b35646bcaa24361da8160fb0f9257590ab3ace42b0dc3e77ad2db7c203a20bd952fbb56b1567046ecfaa933d7b1000c3de9ff05b7d989ba46fd43bc4c2d0a3986b7ffa13471d37eb5b47d64707bd290cfd6a9f393ad08ec1e3bd71bb5792615035cdaf2d8929aed3be098379377e777ce79aaa4773
 
 Verify=RSA-PSS-6
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=3569bd8fd2e28f2443375efa94f186f6911ffc2b
 Output=086df6b500098c120f24ff8423f727d9c61a5c9007d3b6a31ce7cf8f3cbec1a26bb20e2bd4a046793299e03e37a21b40194fb045f90b18bf20a47992ccd799cf9c059c299c0526854954aade8a6ad9d97ec91a1145383f42468b231f4d72f23706d9853c3fa43ce8ace8bfe7484987a1ec6a16c8daf81f7c8bf42774707a9df456
 
 Verify=RSA-PSS-6
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=7abbb7b42de335730a0b641f1e314b6950b84f98
 Output=0b5b11ad549863ffa9c51a14a1106c2a72cc8b646e5c7262509786105a984776534ca9b54c1cc64bf2d5a44fd7e8a69db699d5ea52087a4748fd2abc1afed1e5d6f7c89025530bdaa2213d7e030fa55df6f34bcf1ce46d2edf4e3ae4f3b01891a068c9e3a44bbc43133edad6ecb9f35400c4252a5762d65744b99cb9f4c559329f
 
 Verify=RSA-PSS-6
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=55b7eb27be7a787a59eb7e5fac468db8917a7725
 Output=02d71fa9b53e4654fefb7f08385cf6b0ae3a817942ebf66c35ac67f0b069952a3ce9c7e1f1b02e480a9500836de5d64cdb7ecde04542f7a79988787e24c2ba05f5fd482c023ed5c30e04839dc44bed2a3a3a4fee01113c891a47d32eb8025c28cb050b5cdb576c70fe76ef523405c08417faf350b037a43c379339fcb18d3a356b
 
 Verify=RSA-PSS-6
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=de2fa0367ef49083ff89b9905d3fd646fcc12c38
@@ -1118,36 +1231,42 @@ MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgTfJ2kpmyMQIuNon0MnXn4zLHq/B
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-7
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=8be4afbdd76bd8d142c5f4f46dba771ee5d6d29d
 Output=187f390723c8902591f0154bae6d4ecbffe067f0e8b795476ea4f4d51ccc810520bb3ca9bca7d0b1f2ea8a17d873fa27570acd642e3808561cb9e975ccfd80b23dc5771cdb3306a5f23159dacbd3aa2db93d46d766e09ed15d900ad897a8d274dc26b47e994a27e97e2268a766533ae4b5e42a2fcaf755c1c4794b294c60555823
 
 Verify=RSA-PSS-7
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=402140dc605b2f5c5ec0d15bce9f9ba8857fe117
 Output=10fd89768a60a67788abb5856a787c8561f3edcf9a83e898f7dc87ab8cce79429b43e56906941a886194f137e591fe7c339555361fbbe1f24feb2d4bcdb80601f3096bc9132deea60ae13082f44f9ad41cd628936a4d51176e42fc59cb76db815ce5ab4db99a104aafea68f5d330329ebf258d4ede16064bd1d00393d5e1570eb8
 
 Verify=RSA-PSS-7
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=3e885205892ff2b6b37c2c4eb486c4bf2f9e7f20
 Output=2b31fde99859b977aa09586d8e274662b25a2a640640b457f594051cb1e7f7a911865455242926cf88fe80dfa3a75ba9689844a11e634a82b075afbd69c12a0df9d25f84ad4945df3dc8fe90c3cefdf26e95f0534304b5bdba20d3e5640a2ebfb898aac35ae40f26fce5563c2f9f24f3042af76f3c7072d687bbfb959a88460af1
 
 Verify=RSA-PSS-7
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=1fc2201d0c442a4736cd8b2cd00c959c47a3bf42
 Output=32c7ca38ff26949a15000c4ba04b2b13b35a3810e568184d7ecabaa166b7ffabddf2b6cf4ba07124923790f2e5b1a5be040aea36fe132ec130e1f10567982d17ac3e89b8d26c3094034e762d2e031264f01170beecb3d1439e05846f25458367a7d9c02060444672671e64e877864559ca19b2074d588a281b5804d23772fbbe19
 
 Verify=RSA-PSS-7
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=e4351b66819e5a31501f89acc7faf57030e9aac5
 Output=07eb651d75f1b52bc263b2e198336e99fbebc4f332049a922a10815607ee2d989db3a4495b7dccd38f58a211fb7e193171a3d891132437ebca44f318b280509e52b5fa98fcce8205d9697c8ee4b7ff59d4c59c79038a1970bd2a0d451ecdc5ef11d9979c9d35f8c70a6163717607890d586a7c6dc01c79f86a8f28e85235f8c2f1
 
 Verify=RSA-PSS-7
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=49f6cc58365e514e1a3f301f4de16f9fb5347ff2
@@ -1162,36 +1281,42 @@ R1PbPO4O4Gx9+uix1TtZUyGPnM7qaVsIZo7eqtztlGOx15DV6/J+kRW0bK1NmiuO
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-8
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=a1dd230d8ead860199b6277c2ecfe3d95f6d9160
 Output=0262ac254bfa77f3c1aca22c5179f8f040422b3c5bafd40a8f21cf0fa5a667ccd5993d42dbafb409c520e25fce2b1ee1e716577f1efa17f3da28052f40f0419b23106d7845aaf01125b698e7a4dfe92d3967bb00c4d0d35ba3552ab9a8b3eef07c7fecdbc5424ac4db1e20cb37d0b2744769940ea907e17fbbca673b20522380c5
 
 Verify=RSA-PSS-8
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=f6e68e53c602c5c65fa67b5aa6d786e5524b12ab
 Output=2707b9ad5115c58c94e932e8ec0a280f56339e44a1b58d4ddcff2f312e5f34dcfe39e89c6a94dcee86dbbdae5b79ba4e0819a9e7bfd9d982e7ee6c86ee68396e8b3a14c9c8f34b178eb741f9d3f121109bf5c8172fada2e768f9ea1433032c004a8aa07eb990000a48dc94c8bac8aabe2b09b1aa46c0a2aa0e12f63fbba775ba7e
 
 Verify=RSA-PSS-8
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=d6f9fcd3ae27f32bb2c7c93536782eba52af1f76
 Output=2ad20509d78cf26d1b6c406146086e4b0c91a91c2bd164c87b966b8faa42aa0ca446022323ba4b1a1b89706d7f4c3be57d7b69702d168ab5955ee290356b8c4a29ed467d547ec23cbadf286ccb5863c6679da467fc9324a151c7ec55aac6db4084f82726825cfe1aa421bc64049fb42f23148f9c25b2dc300437c38d428aa75f96
 
 Verify=RSA-PSS-8
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=7ff2a53ce2e2d900d468e498f230a5f5dd0020de
 Output=1e24e6e58628e5175044a9eb6d837d48af1260b0520e87327de7897ee4d5b9f0df0be3e09ed4dea8c1454ff3423bb08e1793245a9df8bf6ab3968c8eddc3b5328571c77f091cc578576912dfebd164b9de5454fe0be1c1f6385b328360ce67ec7a05f6e30eb45c17c48ac70041d2cab67f0a2ae7aafdcc8d245ea3442a6300ccc7
 
 Verify=RSA-PSS-8
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=4eb309f7022ba0b03bb78601b12931ec7c1be8d3
 Output=33341ba3576a130a50e2a5cf8679224388d5693f5accc235ac95add68e5eb1eec31666d0ca7a1cda6f70a1aa762c05752a51950cdb8af3c5379f18cfe6b5bc55a4648226a15e912ef19ad77adeea911d67cfefd69ba43fa4119135ff642117ba985a7e0100325e9519f1ca6a9216bda055b5785015291125e90dcd07a2ca9673ee
 
 Verify=RSA-PSS-8
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=65033bc2f67d6aba7d526acb873b8d9241e5e4d9
@@ -1207,36 +1332,42 @@ swU7R97S7NSkyu/WFIM9yLtiLzF+0Ha4BX/o3j+ESArV6D5KYZBKTySPs5cCc1fh
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-9
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=2715a49b8b0012cd7aee84c116446e6dfe3faec0
 Output=586107226c3ce013a7c8f04d1a6a2959bb4b8e205ba43a27b50f124111bc35ef589b039f5932187cb696d7d9a32c0c38300a5cdda4834b62d2eb240af33f79d13dfbf095bf599e0d9686948c1964747b67e89c9aba5cd85016236f566cc5802cb13ead51bc7ca6bef3b94dcbdbb1d570469771df0e00b1a8a06777472d2316279edae86474668d4e1efff95f1de61c6020da32ae92bbf16520fef3cf4d88f61121f24bbd9fe91b59caf1235b2a93ff81fc403addf4ebdea84934a9cdaf8e1a9e
 
 Verify=RSA-PSS-9
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=2dac956d53964748ac364d06595827c6b4f143cd
 Output=80b6d643255209f0a456763897ac9ed259d459b49c2887e5882ecb4434cfd66dd7e1699375381e51cd7f554f2c271704b399d42b4be2540a0eca61951f55267f7c2878c122842dadb28b01bd5f8c025f7e228418a673c03d6bc0c736d0a29546bd67f786d9d692ccea778d71d98c2063b7a71092187a4d35af108111d83e83eae46c46aa34277e06044589903788f1d5e7cee25fb485e92949118814d6f2c3ee361489016f327fb5bc517eb50470bffa1afa5f4ce9aa0ce5b8ee19bf5501b958
 
 Verify=RSA-PSS-9
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=28d98c46cccafbd3bc04e72f967a54bd3ea12298
 Output=484408f3898cd5f53483f80819efbf2708c34d27a8b2a6fae8b322f9240237f981817aca1846f1084daa6d7c0795f6e5bf1af59c38e1858437ce1f7ec419b98c8736adf6dd9a00b1806d2bd3ad0a73775e05f52dfef3a59ab4b08143f0df05cd1ad9d04bececa6daa4a2129803e200cbc77787caf4c1d0663a6c5987b605952019782caf2ec1426d68fb94ed1d4be816a7ed081b77e6ab330b3ffc073820fecde3727fcbe295ee61a050a343658637c3fd659cfb63736de32d9f90d3c2f63eca
 
 Verify=RSA-PSS-9
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=0866d2ff5a79f25ef668cd6f31b42dee421e4c0e
 Output=84ebeb481be59845b46468bafb471c0112e02b235d84b5d911cbd1926ee5074ae0424495cb20e82308b8ebb65f419a03fb40e72b78981d88aad143053685172c97b29c8b7bf0ae73b5b2263c403da0ed2f80ff7450af7828eb8b86f0028bd2a8b176a4d228cccea18394f238b09ff758cc00bc04301152355742f282b54e663a919e709d8da24ade5500a7b9aa50226e0ca52923e6c2d860ec50ff480fa57477e82b0565f4379f79c772d5c2da80af9fbf325ece6fc20b00961614bee89a183e
 
 Verify=RSA-PSS-9
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=6a5b4be4cd36cc97dfde9995efbf8f097a4a991a
 Output=82102df8cb91e7179919a04d26d335d64fbc2f872c44833943241de8454810274cdf3db5f42d423db152af7135f701420e39b494a67cbfd19f9119da233a23da5c6439b5ba0d2bc373eee3507001378d4a4073856b7fe2aba0b5ee93b27f4afec7d4d120921c83f606765b02c19e4d6a1a3b95fa4c422951be4f52131077ef17179729cddfbdb56950dbaceefe78cb16640a099ea56d24389eef10f8fecb31ba3ea3b227c0a86698bb89e3e9363905bf22777b2a3aa521b65b4cef76d83bde4c
 
 Verify=RSA-PSS-9
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=b9dfd1df76a461c51e6576c6c8ed0a923d1c50e7
@@ -1254,36 +1385,42 @@ BQIDAQAB
 -----END PUBLIC KEY-----
 
 Verify=RSA-PSS-10
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=9596bb630cf6a8d4ea4600422b9eba8b13675dd4
 Output=82c2b160093b8aa3c0f7522b19f87354066c77847abf2a9fce542d0e84e920c5afb49ffdfdace16560ee94a1369601148ebad7a0e151cf16331791a5727d05f21e74e7eb811440206935d744765a15e79f015cb66c532c87a6a05961c8bfad741a9a6657022894393e7223739796c02a77455d0f555b0ec01ddf259b6207fd0fd57614cef1a5573baaff4ec00069951659b85f24300a25160ca8522dc6e6727e57d019d7e63629b8fe5e89e25cc15beb3a647577559299280b9b28f79b0409000be25bbd96408ba3b43cc486184dd1c8e62553fa1af4040f60663de7f5e49c04388e257f1ce89c95dab48a315d9b66b1b7628233876ff2385230d070d07e1666
 
 Verify=RSA-PSS-10
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=b503319399277fd6c1c8f1033cbf04199ea21716
 Output=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
 
 Verify=RSA-PSS-10
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=50aaede8536b2c307208b275a67ae2df196c7628
 Output=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
 
 Verify=RSA-PSS-10
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=aa0b72b8b371ddd10c8ae474425ccccf8842a294
 Output=34047ff96c4dc0dc90b2d4ff59a1a361a4754b255d2ee0af7d8bf87c9bc9e7ddeede33934c63ca1c0e3d262cb145ef932a1f2c0a997aa6a34f8eaee7477d82ccf09095a6b8acad38d4eec9fb7eab7ad02da1d11d8e54c1825e55bf58c2a23234b902be124f9e9038a8f68fa45dab72f66e0945bf1d8bacc9044c6f07098c9fcec58a3aab100c805178155f030a124c450e5acbda47d0e4f10b80a23f803e774d023b0015c20b9f9bbe7c91296338d5ecb471cafb032007b67a60be5f69504a9f01abb3cb467b260e2bce860be8d95bf92c0c8e1496ed1e528593a4abb6df462dde8a0968dffe4683116857a232f5ebf6c85be238745ad0f38f767a5fdbf486fb
 
 Verify=RSA-PSS-10
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=fad3902c9750622a2bc672622c48270cc57d3ea8
 Output=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
 
 Verify=RSA-PSS-10
+Availablein = default
 Ctrl = rsa_padding_mode:pss
 Ctrl = rsa_mgf1_md:sha1
 Input=122196deb5d122bd8c6fc781ff6924d7c695aade
@@ -1926,11 +2063,13 @@ PrivPubKeyPair = BOB_secp112r2:BOB_secp112r2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp112r2
+Availablein = default
 PeerKey=BOB_secp112r2_PUB
 SharedSecret=6bed2c55e233e9214d5898c4c12a
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp112r2
+Availablein = default
 PeerKey=ALICE_secp112r2_PUB
 SharedSecret=6bed2c55e233e9214d5898c4c12a
 
@@ -1968,11 +2107,13 @@ PrivPubKeyPair = BOB_secp128r1:BOB_secp128r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp128r1
+Availablein = default
 PeerKey=BOB_secp128r1_PUB
 SharedSecret=91ded46ac404afdbd708fdcc1cac6842
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp128r1
+Availablein = default
 PeerKey=ALICE_secp128r1_PUB
 SharedSecret=91ded46ac404afdbd708fdcc1cac6842
 
@@ -2010,11 +2151,13 @@ PrivPubKeyPair = BOB_secp128r2:BOB_secp128r2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp128r2
+Availablein = default
 PeerKey=BOB_secp128r2_PUB
 SharedSecret=dc32faa978008a694672076b756a1e4b
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp128r2
+Availablein = default
 PeerKey=ALICE_secp128r2_PUB
 SharedSecret=dc32faa978008a694672076b756a1e4b
 
@@ -2054,11 +2197,13 @@ PrivPubKeyPair = BOB_secp160k1:BOB_secp160k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp160k1
+Availablein = default
 PeerKey=BOB_secp160k1_PUB
 SharedSecret=5457d367346cc3e82031784f95ebcd856de0c735
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp160k1
+Availablein = default
 PeerKey=ALICE_secp160k1_PUB
 SharedSecret=5457d367346cc3e82031784f95ebcd856de0c735
 
@@ -2098,11 +2243,13 @@ PrivPubKeyPair = BOB_secp160r1:BOB_secp160r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp160r1
+Availablein = default
 PeerKey=BOB_secp160r1_PUB
 SharedSecret=87856536b6a295ea94d3e483d69c6212d5c7afcf
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp160r1
+Availablein = default
 PeerKey=ALICE_secp160r1_PUB
 SharedSecret=87856536b6a295ea94d3e483d69c6212d5c7afcf
 
@@ -2142,11 +2289,13 @@ PrivPubKeyPair = BOB_secp160r2:BOB_secp160r2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp160r2
+Availablein = default
 PeerKey=BOB_secp160r2_PUB
 SharedSecret=5481e282c47cbd37c84873847c4fc2f31fc15a1a
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp160r2
+Availablein = default
 PeerKey=ALICE_secp160r2_PUB
 SharedSecret=5481e282c47cbd37c84873847c4fc2f31fc15a1a
 
@@ -2186,11 +2335,13 @@ PrivPubKeyPair = BOB_secp192k1:BOB_secp192k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp192k1
+Availablein = default
 PeerKey=BOB_secp192k1_PUB
 SharedSecret=6a4daca0412284172e8fcaafa0d9df76257d899752bf0f23
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp192k1
+Availablein = default
 PeerKey=ALICE_secp192k1_PUB
 SharedSecret=6a4daca0412284172e8fcaafa0d9df76257d899752bf0f23
 
@@ -2230,11 +2381,13 @@ PrivPubKeyPair = BOB_secp224k1:BOB_secp224k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp224k1
+Availablein = default
 PeerKey=BOB_secp224k1_PUB
 SharedSecret=80b65e65fe29c779213dd31189d371ff57b0b2bf08c6458ed142399a
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp224k1
+Availablein = default
 PeerKey=ALICE_secp224k1_PUB
 SharedSecret=80b65e65fe29c779213dd31189d371ff57b0b2bf08c6458ed142399a
 
@@ -2274,11 +2427,13 @@ PrivPubKeyPair = BOB_secp224r1:BOB_secp224r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp224r1
+Availablein = default
 PeerKey=BOB_secp224r1_PUB
 SharedSecret=34ea06d16d82f0d1725de47f3639ac0c23db7d7ed68f01488539a2a5
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp224r1
+Availablein = default
 PeerKey=ALICE_secp224r1_PUB
 SharedSecret=34ea06d16d82f0d1725de47f3639ac0c23db7d7ed68f01488539a2a5
 
@@ -2318,11 +2473,13 @@ PrivPubKeyPair = BOB_secp256k1:BOB_secp256k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp256k1
+Availablein = default
 PeerKey=BOB_secp256k1_PUB
 SharedSecret=af43b52790082fd87afb1d14b883c12d12bb9e554080d1f8e527920676e31f3e
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp256k1
+Availablein = default
 PeerKey=ALICE_secp256k1_PUB
 SharedSecret=af43b52790082fd87afb1d14b883c12d12bb9e554080d1f8e527920676e31f3e
 
@@ -2366,11 +2523,13 @@ PrivPubKeyPair = BOB_secp384r1:BOB_secp384r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp384r1
+Availablein = default
 PeerKey=BOB_secp384r1_PUB
 SharedSecret=2006ed49acbb991b8fbf8a15c3f263542496eaefe1e2952591b72fb929463eac7a403a5419cebbfb73734918eaed59fd
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp384r1
+Availablein = default
 PeerKey=ALICE_secp384r1_PUB
 SharedSecret=2006ed49acbb991b8fbf8a15c3f263542496eaefe1e2952591b72fb929463eac7a403a5419cebbfb73734918eaed59fd
 
@@ -2420,11 +2579,13 @@ PrivPubKeyPair = BOB_secp521r1:BOB_secp521r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_secp521r1
+Availablein = default
 PeerKey=BOB_secp521r1_PUB
 SharedSecret=018c8f33e544a0fa8854dcd96bdba75b7687d1c42b2ff1bf0a06d49c424fee96d8a7f3af3119dcbfabc1c147477c50f7c72971956f9bb17ddec6d02b2187f06cf4be
 
 # ECDH Bob with Alice peer
 Derive=BOB_secp521r1
+Availablein = default
 PeerKey=ALICE_secp521r1_PUB
 SharedSecret=018c8f33e544a0fa8854dcd96bdba75b7687d1c42b2ff1bf0a06d49c424fee96d8a7f3af3119dcbfabc1c147477c50f7c72971956f9bb17ddec6d02b2187f06cf4be
 
@@ -2464,11 +2625,13 @@ PrivPubKeyPair = BOB_prime192v1:BOB_prime192v1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_prime192v1
+Availablein = default
 PeerKey=BOB_prime192v1_PUB
 SharedSecret=be2a779b587f8f5d7c9d8f006e0a6d0e996c9c63c255f861
 
 # ECDH Bob with Alice peer
 Derive=BOB_prime192v1
+Availablein = default
 PeerKey=ALICE_prime192v1_PUB
 SharedSecret=be2a779b587f8f5d7c9d8f006e0a6d0e996c9c63c255f861
 
@@ -2508,11 +2671,13 @@ PrivPubKeyPair = BOB_prime192v2:BOB_prime192v2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_prime192v2
+Availablein = default
 PeerKey=BOB_prime192v2_PUB
 SharedSecret=9b37033a48af7fe1825c062625f8b57d4b3ac48c12bec69c
 
 # ECDH Bob with Alice peer
 Derive=BOB_prime192v2
+Availablein = default
 PeerKey=ALICE_prime192v2_PUB
 SharedSecret=9b37033a48af7fe1825c062625f8b57d4b3ac48c12bec69c
 
@@ -2552,11 +2717,13 @@ PrivPubKeyPair = BOB_prime192v3:BOB_prime192v3_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_prime192v3
+Availablein = default
 PeerKey=BOB_prime192v3_PUB
 SharedSecret=7133f1d99b0e03ed9c4d78d3be40598cf419cd588283ac29
 
 # ECDH Bob with Alice peer
 Derive=BOB_prime192v3
+Availablein = default
 PeerKey=ALICE_prime192v3_PUB
 SharedSecret=7133f1d99b0e03ed9c4d78d3be40598cf419cd588283ac29
 
@@ -2596,11 +2763,13 @@ PrivPubKeyPair = BOB_prime239v1:BOB_prime239v1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_prime239v1
+Availablein = default
 PeerKey=BOB_prime239v1_PUB
 SharedSecret=2ef92070f7a5fa14c8a67a8aa3080b4c4a597eafaa81d3f698599ac0be1e
 
 # ECDH Bob with Alice peer
 Derive=BOB_prime239v1
+Availablein = default
 PeerKey=ALICE_prime239v1_PUB
 SharedSecret=2ef92070f7a5fa14c8a67a8aa3080b4c4a597eafaa81d3f698599ac0be1e
 
@@ -2640,11 +2809,13 @@ PrivPubKeyPair = BOB_prime239v2:BOB_prime239v2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_prime239v2
+Availablein = default
 PeerKey=BOB_prime239v2_PUB
 SharedSecret=5bdab282dc371ee88ade318a6aad2b329ec3ea957e0df18b7a691c1bf703
 
 # ECDH Bob with Alice peer
 Derive=BOB_prime239v2
+Availablein = default
 PeerKey=ALICE_prime239v2_PUB
 SharedSecret=5bdab282dc371ee88ade318a6aad2b329ec3ea957e0df18b7a691c1bf703
 
@@ -2684,11 +2855,13 @@ PrivPubKeyPair = BOB_prime239v3:BOB_prime239v3_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_prime239v3
+Availablein = default
 PeerKey=BOB_prime239v3_PUB
 SharedSecret=78e80ae760061178bd005e9e3634333971468bc6d3f82baee238c5ed32f9
 
 # ECDH Bob with Alice peer
 Derive=BOB_prime239v3
+Availablein = default
 PeerKey=ALICE_prime239v3_PUB
 SharedSecret=78e80ae760061178bd005e9e3634333971468bc6d3f82baee238c5ed32f9
 
@@ -2728,11 +2901,13 @@ PrivPubKeyPair = BOB_prime256v1:BOB_prime256v1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_prime256v1
+Availablein = default
 PeerKey=BOB_prime256v1_PUB
 SharedSecret=390021fbca00d959c1adaf7e9cedef0e65a582489eab9adbe739ef66bf82adb4
 
 # ECDH Bob with Alice peer
 Derive=BOB_prime256v1
+Availablein = default
 PeerKey=ALICE_prime256v1_PUB
 SharedSecret=390021fbca00d959c1adaf7e9cedef0e65a582489eab9adbe739ef66bf82adb4
 
@@ -2770,11 +2945,13 @@ PrivPubKeyPair = BOB_sect113r1:BOB_sect113r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect113r1
+Availablein = default
 PeerKey=BOB_sect113r1_PUB
 SharedSecret=015405437add26b8841c62a9016c85
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect113r1
+Availablein = default
 PeerKey=ALICE_sect113r1_PUB
 SharedSecret=015405437add26b8841c62a9016c85
 
@@ -2812,11 +2989,13 @@ PrivPubKeyPair = BOB_sect113r2:BOB_sect113r2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect113r2
+Availablein = default
 PeerKey=BOB_sect113r2_PUB
 SharedSecret=014231c5e9e28d451aa44a755407e1
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect113r2
+Availablein = default
 PeerKey=ALICE_sect113r2_PUB
 SharedSecret=014231c5e9e28d451aa44a755407e1
 
@@ -2854,11 +3033,13 @@ PrivPubKeyPair = BOB_sect131r1:BOB_sect131r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect131r1
+Availablein = default
 PeerKey=BOB_sect131r1_PUB
 SharedSecret=009e4acc8c1ba3a129a9ad83a733d7d702
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect131r1
+Availablein = default
 PeerKey=ALICE_sect131r1_PUB
 SharedSecret=009e4acc8c1ba3a129a9ad83a733d7d702
 
@@ -2896,11 +3077,13 @@ PrivPubKeyPair = BOB_sect131r2:BOB_sect131r2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect131r2
+Availablein = default
 PeerKey=BOB_sect131r2_PUB
 SharedSecret=03cbec3a3050c7f13d4801ad692d61c417
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect131r2
+Availablein = default
 PeerKey=ALICE_sect131r2_PUB
 SharedSecret=03cbec3a3050c7f13d4801ad692d61c417
 
@@ -2940,11 +3123,13 @@ PrivPubKeyPair = BOB_sect163k1:BOB_sect163k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect163k1
+Availablein = default
 PeerKey=BOB_sect163k1_PUB
 SharedSecret=07bfdf00759b383aa7741ae4634400f8ddf2047092
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect163k1
+Availablein = default
 PeerKey=ALICE_sect163k1_PUB
 SharedSecret=07bfdf00759b383aa7741ae4634400f8ddf2047092
 
@@ -2984,11 +3169,13 @@ PrivPubKeyPair = BOB_sect163r1:BOB_sect163r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect163r1
+Availablein = default
 PeerKey=BOB_sect163r1_PUB
 SharedSecret=02355c765bbc07fcc44bb1496e490912f6df56e6d4
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect163r1
+Availablein = default
 PeerKey=ALICE_sect163r1_PUB
 SharedSecret=02355c765bbc07fcc44bb1496e490912f6df56e6d4
 
@@ -3028,11 +3215,13 @@ PrivPubKeyPair = BOB_sect163r2:BOB_sect163r2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect163r2
+Availablein = default
 PeerKey=BOB_sect163r2_PUB
 SharedSecret=040df54e6df412790ef5c0fafbbfcba5136b872951
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect163r2
+Availablein = default
 PeerKey=ALICE_sect163r2_PUB
 SharedSecret=040df54e6df412790ef5c0fafbbfcba5136b872951
 
@@ -3072,11 +3261,13 @@ PrivPubKeyPair = BOB_sect193r1:BOB_sect193r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect193r1
+Availablein = default
 PeerKey=BOB_sect193r1_PUB
 SharedSecret=00458b4c5ad122de5a377bea0adf1ab87bcb961b24ed764f47
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect193r1
+Availablein = default
 PeerKey=ALICE_sect193r1_PUB
 SharedSecret=00458b4c5ad122de5a377bea0adf1ab87bcb961b24ed764f47
 
@@ -3116,11 +3307,13 @@ PrivPubKeyPair = BOB_sect193r2:BOB_sect193r2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect193r2
+Availablein = default
 PeerKey=BOB_sect193r2_PUB
 SharedSecret=019d1f316d204a9cd1b9632cebb4accddb204158be3e435891
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect193r2
+Availablein = default
 PeerKey=ALICE_sect193r2_PUB
 SharedSecret=019d1f316d204a9cd1b9632cebb4accddb204158be3e435891
 
@@ -3160,11 +3353,13 @@ PrivPubKeyPair = BOB_sect233k1:BOB_sect233k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect233k1
+Availablein = default
 PeerKey=BOB_sect233k1_PUB
 SharedSecret=00a5e5f2e992f4360d530dd365d14f5c6013212e14f4ea258c91c71f1512
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect233k1
+Availablein = default
 PeerKey=ALICE_sect233k1_PUB
 SharedSecret=00a5e5f2e992f4360d530dd365d14f5c6013212e14f4ea258c91c71f1512
 
@@ -3204,11 +3399,13 @@ PrivPubKeyPair = BOB_sect233r1:BOB_sect233r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect233r1
+Availablein = default
 PeerKey=BOB_sect233r1_PUB
 SharedSecret=01625f3fcd367ee7cd74c67cca02dccfce6c3b19ef07e358ed943d17a8e2
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect233r1
+Availablein = default
 PeerKey=ALICE_sect233r1_PUB
 SharedSecret=01625f3fcd367ee7cd74c67cca02dccfce6c3b19ef07e358ed943d17a8e2
 
@@ -3248,11 +3445,13 @@ PrivPubKeyPair = BOB_sect239k1:BOB_sect239k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect239k1
+Availablein = default
 PeerKey=BOB_sect239k1_PUB
 SharedSecret=4d1c9a8ae73f754d0a593d6e426114f4f67d7c8082ccc4e04a72b0d2aff8
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect239k1
+Availablein = default
 PeerKey=ALICE_sect239k1_PUB
 SharedSecret=4d1c9a8ae73f754d0a593d6e426114f4f67d7c8082ccc4e04a72b0d2aff8
 
@@ -3294,11 +3493,13 @@ PrivPubKeyPair = BOB_sect283k1:BOB_sect283k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect283k1
+Availablein = default
 PeerKey=BOB_sect283k1_PUB
 SharedSecret=02f2e682c2f60d7261624f3661a5e85fca920443b72aa4dd5a540082e65e552302d8f825
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect283k1
+Availablein = default
 PeerKey=ALICE_sect283k1_PUB
 SharedSecret=02f2e682c2f60d7261624f3661a5e85fca920443b72aa4dd5a540082e65e552302d8f825
 
@@ -3340,11 +3541,13 @@ PrivPubKeyPair = BOB_sect283r1:BOB_sect283r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect283r1
+Availablein = default
 PeerKey=BOB_sect283r1_PUB
 SharedSecret=05778bc1afcf38d7dddb2150cacbfe4d38dc588968fd8b2e859c28ae2629d3435f89f6cc
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect283r1
+Availablein = default
 PeerKey=ALICE_sect283r1_PUB
 SharedSecret=05778bc1afcf38d7dddb2150cacbfe4d38dc588968fd8b2e859c28ae2629d3435f89f6cc
 
@@ -3390,11 +3593,13 @@ PrivPubKeyPair = BOB_sect409k1:BOB_sect409k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect409k1
+Availablein = default
 PeerKey=BOB_sect409k1_PUB
 SharedSecret=01523ec40ad40226a57281a4c423801ae9495dcf736eddd667023b1390977d018ce79313fb99c503f39cbee80f5c1968f3bd02e0
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect409k1
+Availablein = default
 PeerKey=ALICE_sect409k1_PUB
 SharedSecret=01523ec40ad40226a57281a4c423801ae9495dcf736eddd667023b1390977d018ce79313fb99c503f39cbee80f5c1968f3bd02e0
 
@@ -3440,11 +3645,13 @@ PrivPubKeyPair = BOB_sect409r1:BOB_sect409r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect409r1
+Availablein = default
 PeerKey=BOB_sect409r1_PUB
 SharedSecret=019dc849870dc6f79978aca8e1fc6aa6836c8fcb25bbfe3d5ab41ea53eae2c7329952280efb30f9097a31a774191e476dbd842d5
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect409r1
+Availablein = default
 PeerKey=ALICE_sect409r1_PUB
 SharedSecret=019dc849870dc6f79978aca8e1fc6aa6836c8fcb25bbfe3d5ab41ea53eae2c7329952280efb30f9097a31a774191e476dbd842d5
 
@@ -3494,11 +3701,13 @@ PrivPubKeyPair = BOB_sect571k1:BOB_sect571k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect571k1
+Availablein = default
 PeerKey=BOB_sect571k1_PUB
 SharedSecret=05a423515fcc91b3171c83edd5c4085ff729a8ff0a3fa1578ebf769523ded0f5c1e387cf63109f2fbd95e117345b788b4577fdc6b6e727230bfc73eae0d4e851cb6f6e616eddb13e
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect571k1
+Availablein = default
 PeerKey=ALICE_sect571k1_PUB
 SharedSecret=05a423515fcc91b3171c83edd5c4085ff729a8ff0a3fa1578ebf769523ded0f5c1e387cf63109f2fbd95e117345b788b4577fdc6b6e727230bfc73eae0d4e851cb6f6e616eddb13e
 
@@ -3548,11 +3757,13 @@ PrivPubKeyPair = BOB_sect571r1:BOB_sect571r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_sect571r1
+Availablein = default
 PeerKey=BOB_sect571r1_PUB
 SharedSecret=004b397e564055e2c7d87648183c948655ccb0ebb20bd441f9b11635cf461cb5815ff060eab33091b9f7aed67bec8ba1bb7b22437ece3c92c7cf76124408fb951595dfb4a512b2ae
 
 # ECDH Bob with Alice peer
 Derive=BOB_sect571r1
+Availablein = default
 PeerKey=ALICE_sect571r1_PUB
 SharedSecret=004b397e564055e2c7d87648183c948655ccb0ebb20bd441f9b11635cf461cb5815ff060eab33091b9f7aed67bec8ba1bb7b22437ece3c92c7cf76124408fb951595dfb4a512b2ae
 
@@ -3592,11 +3803,13 @@ PrivPubKeyPair = BOB_c2pnb163v1:BOB_c2pnb163v1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2pnb163v1
+Availablein = default
 PeerKey=BOB_c2pnb163v1_PUB
 SharedSecret=05939a47cb503656e684f433001e45776c7620e13b
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2pnb163v1
+Availablein = default
 PeerKey=ALICE_c2pnb163v1_PUB
 SharedSecret=05939a47cb503656e684f433001e45776c7620e13b
 
@@ -3636,11 +3849,13 @@ PrivPubKeyPair = BOB_c2pnb163v2:BOB_c2pnb163v2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2pnb163v2
+Availablein = default
 PeerKey=BOB_c2pnb163v2_PUB
 SharedSecret=0779fb5f6ac7892f2f342b785d71244e0b03ca562d
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2pnb163v2
+Availablein = default
 PeerKey=ALICE_c2pnb163v2_PUB
 SharedSecret=0779fb5f6ac7892f2f342b785d71244e0b03ca562d
 
@@ -3680,11 +3895,13 @@ PrivPubKeyPair = BOB_c2pnb163v3:BOB_c2pnb163v3_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2pnb163v3
+Availablein = default
 PeerKey=BOB_c2pnb163v3_PUB
 SharedSecret=02bf68863a8798e72cdc9cd3b9ce731f12654bfa81
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2pnb163v3
+Availablein = default
 PeerKey=ALICE_c2pnb163v3_PUB
 SharedSecret=02bf68863a8798e72cdc9cd3b9ce731f12654bfa81
 
@@ -3724,11 +3941,13 @@ PrivPubKeyPair = BOB_c2pnb176v1:BOB_c2pnb176v1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2pnb176v1
+Availablein = default
 PeerKey=BOB_c2pnb176v1_PUB
 SharedSecret=b204734417542df762e09013d6ba958940837a2aa25a
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2pnb176v1
+Availablein = default
 PeerKey=ALICE_c2pnb176v1_PUB
 SharedSecret=b204734417542df762e09013d6ba958940837a2aa25a
 
@@ -3768,11 +3987,13 @@ PrivPubKeyPair = BOB_c2tnb191v1:BOB_c2tnb191v1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2tnb191v1
+Availablein = default
 PeerKey=BOB_c2tnb191v1_PUB
 SharedSecret=7a30d30acd3b067f38bb3be9e8cdef739483df26455e36e1
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2tnb191v1
+Availablein = default
 PeerKey=ALICE_c2tnb191v1_PUB
 SharedSecret=7a30d30acd3b067f38bb3be9e8cdef739483df26455e36e1
 
@@ -3812,11 +4033,13 @@ PrivPubKeyPair = BOB_c2tnb191v2:BOB_c2tnb191v2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2tnb191v2
+Availablein = default
 PeerKey=BOB_c2tnb191v2_PUB
 SharedSecret=5ec2b6ccd193620dbad302c4ad8f8909a40698bf454d7534
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2tnb191v2
+Availablein = default
 PeerKey=ALICE_c2tnb191v2_PUB
 SharedSecret=5ec2b6ccd193620dbad302c4ad8f8909a40698bf454d7534
 
@@ -3856,11 +4079,13 @@ PrivPubKeyPair = BOB_c2tnb191v3:BOB_c2tnb191v3_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2tnb191v3
+Availablein = default
 PeerKey=BOB_c2tnb191v3_PUB
 SharedSecret=39093dc8a2e6724a6206ed41bb99490d527d80c902c41891
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2tnb191v3
+Availablein = default
 PeerKey=ALICE_c2tnb191v3_PUB
 SharedSecret=39093dc8a2e6724a6206ed41bb99490d527d80c902c41891
 
@@ -3900,11 +4125,13 @@ PrivPubKeyPair = BOB_c2pnb208w1:BOB_c2pnb208w1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2pnb208w1
+Availablein = default
 PeerKey=BOB_c2pnb208w1_PUB
 SharedSecret=59bf3c91bd168d4d4d900d9ce155933045e0fd16dcf0511bb5af
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2pnb208w1
+Availablein = default
 PeerKey=ALICE_c2pnb208w1_PUB
 SharedSecret=59bf3c91bd168d4d4d900d9ce155933045e0fd16dcf0511bb5af
 
@@ -3944,11 +4171,13 @@ PrivPubKeyPair = BOB_c2tnb239v1:BOB_c2tnb239v1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2tnb239v1
+Availablein = default
 PeerKey=BOB_c2tnb239v1_PUB
 SharedSecret=78c42256900725df9a47bb042cef7dad9f639b32e3010738a144e7472d1a
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2tnb239v1
+Availablein = default
 PeerKey=ALICE_c2tnb239v1_PUB
 SharedSecret=78c42256900725df9a47bb042cef7dad9f639b32e3010738a144e7472d1a
 
@@ -3988,11 +4217,13 @@ PrivPubKeyPair = BOB_c2tnb239v2:BOB_c2tnb239v2_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2tnb239v2
+Availablein = default
 PeerKey=BOB_c2tnb239v2_PUB
 SharedSecret=4ba2ecfa8ec7a375594d1673886cccf96d7763c55611b3c9008a35160192
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2tnb239v2
+Availablein = default
 PeerKey=ALICE_c2tnb239v2_PUB
 SharedSecret=4ba2ecfa8ec7a375594d1673886cccf96d7763c55611b3c9008a35160192
 
@@ -4032,11 +4263,13 @@ PrivPubKeyPair = BOB_c2tnb239v3:BOB_c2tnb239v3_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2tnb239v3
+Availablein = default
 PeerKey=BOB_c2tnb239v3_PUB
 SharedSecret=47ad60e5480375fccd9246c93ab04da8e5da83e1dbf5f177f10a47cb54a0
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2tnb239v3
+Availablein = default
 PeerKey=ALICE_c2tnb239v3_PUB
 SharedSecret=47ad60e5480375fccd9246c93ab04da8e5da83e1dbf5f177f10a47cb54a0
 
@@ -4076,11 +4309,13 @@ PrivPubKeyPair = BOB_c2pnb272w1:BOB_c2pnb272w1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2pnb272w1
+Availablein = default
 PeerKey=BOB_c2pnb272w1_PUB
 SharedSecret=3ae063b2bed6ba8aa28ff35e9bd2673f22ee8087860c86b89429a5b52538216632a3
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2pnb272w1
+Availablein = default
 PeerKey=ALICE_c2pnb272w1_PUB
 SharedSecret=3ae063b2bed6ba8aa28ff35e9bd2673f22ee8087860c86b89429a5b52538216632a3
 
@@ -4124,11 +4359,13 @@ PrivPubKeyPair = BOB_c2pnb304w1:BOB_c2pnb304w1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2pnb304w1
+Availablein = default
 PeerKey=BOB_c2pnb304w1_PUB
 SharedSecret=6df88b20de9f095c7632234291ea4658a9265cd2293424e11ed56705b09a069f09dc4e055eb7
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2pnb304w1
+Availablein = default
 PeerKey=ALICE_c2pnb304w1_PUB
 SharedSecret=6df88b20de9f095c7632234291ea4658a9265cd2293424e11ed56705b09a069f09dc4e055eb7
 
@@ -4172,11 +4409,13 @@ PrivPubKeyPair = BOB_c2tnb359v1:BOB_c2tnb359v1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2tnb359v1
+Availablein = default
 PeerKey=BOB_c2tnb359v1_PUB
 SharedSecret=1d3f3396492d130caea54233c79833e90a072fe883071bb08cec671ce0319f0bc39c68dda0199952152a5c3563
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2tnb359v1
+Availablein = default
 PeerKey=ALICE_c2tnb359v1_PUB
 SharedSecret=1d3f3396492d130caea54233c79833e90a072fe883071bb08cec671ce0319f0bc39c68dda0199952152a5c3563
 
@@ -4220,11 +4459,13 @@ PrivPubKeyPair = BOB_c2pnb368w1:BOB_c2pnb368w1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2pnb368w1
+Availablein = default
 PeerKey=BOB_c2pnb368w1_PUB
 SharedSecret=d191710b156d1b1d14242843a7f0abf28060bbb9e655655b53852a8b0f250ef1eee37d59364d9791c8e1bc526cbb
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2pnb368w1
+Availablein = default
 PeerKey=ALICE_c2pnb368w1_PUB
 SharedSecret=d191710b156d1b1d14242843a7f0abf28060bbb9e655655b53852a8b0f250ef1eee37d59364d9791c8e1bc526cbb
 
@@ -4270,11 +4511,13 @@ PrivPubKeyPair = BOB_c2tnb431r1:BOB_c2tnb431r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_c2tnb431r1
+Availablein = default
 PeerKey=BOB_c2tnb431r1_PUB
 SharedSecret=4c4d7d387843ff5152f22f101b0609238819357fae2ccc9097b818e383ef6809cb46671fb514009d4d1d3d0119fba265107302e95748
 
 # ECDH Bob with Alice peer
 Derive=BOB_c2tnb431r1
+Availablein = default
 PeerKey=ALICE_c2tnb431r1_PUB
 SharedSecret=4c4d7d387843ff5152f22f101b0609238819357fae2ccc9097b818e383ef6809cb46671fb514009d4d1d3d0119fba265107302e95748
 
@@ -4312,11 +4555,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls1:BOB_wap-wsg-idm-ecid-wtls1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls1
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls1_PUB
 SharedSecret=0000fc6e280987e8b9bf6e3c7fa003
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls1
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls1_PUB
 SharedSecret=0000fc6e280987e8b9bf6e3c7fa003
 
@@ -4356,11 +4601,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls3:BOB_wap-wsg-idm-ecid-wtls3_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls3
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls3_PUB
 SharedSecret=00cf1d850f396436be68f1e5502935853ed054511f
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls3
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls3_PUB
 SharedSecret=00cf1d850f396436be68f1e5502935853ed054511f
 
@@ -4398,11 +4645,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls4:BOB_wap-wsg-idm-ecid-wtls4_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls4
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls4_PUB
 SharedSecret=01076232302ca32b5f3daf075e5213
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls4
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls4_PUB
 SharedSecret=01076232302ca32b5f3daf075e5213
 
@@ -4442,11 +4691,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls5:BOB_wap-wsg-idm-ecid-wtls5_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls5
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls5_PUB
 SharedSecret=066091c591278f5b949106052b2546aacc20917c20
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls5
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls5_PUB
 SharedSecret=066091c591278f5b949106052b2546aacc20917c20
 
@@ -4484,11 +4735,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls6:BOB_wap-wsg-idm-ecid-wtls6_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls6
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls6_PUB
 SharedSecret=8d184455748c56115ba2183070b0
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls6
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls6_PUB
 SharedSecret=8d184455748c56115ba2183070b0
 
@@ -4528,11 +4781,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls7:BOB_wap-wsg-idm-ecid-wtls7_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls7
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls7_PUB
 SharedSecret=990eda6a0406caef965018b97c94d0faa200f6e4
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls7
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls7_PUB
 SharedSecret=990eda6a0406caef965018b97c94d0faa200f6e4
 
@@ -4570,11 +4825,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls8:BOB_wap-wsg-idm-ecid-wtls8_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls8
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls8_PUB
 SharedSecret=7524c547bd6b26644ce70571cb06
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls8
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls8_PUB
 SharedSecret=7524c547bd6b26644ce70571cb06
 
@@ -4614,11 +4871,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls9:BOB_wap-wsg-idm-ecid-wtls9_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls9
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls9_PUB
 SharedSecret=5ca1d9eed44def2c390fd5bbb16ca2c3a09eb7b1
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls9
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls9_PUB
 SharedSecret=5ca1d9eed44def2c390fd5bbb16ca2c3a09eb7b1
 
@@ -4658,11 +4917,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls10:BOB_wap-wsg-idm-ecid-wtls10_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls10
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls10_PUB
 SharedSecret=0199de137bc263e25b543994d6315b5a3f1e38e7e1f60662cb5cbaab5f98
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls10
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls10_PUB
 SharedSecret=0199de137bc263e25b543994d6315b5a3f1e38e7e1f60662cb5cbaab5f98
 
@@ -4702,11 +4963,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls11:BOB_wap-wsg-idm-ecid-wtls11_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls11
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls11_PUB
 SharedSecret=01ee4b517d8a64be5ee32e10152c7bbcb8cde73a3da8e9643bce173011f7
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls11
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls11_PUB
 SharedSecret=01ee4b517d8a64be5ee32e10152c7bbcb8cde73a3da8e9643bce173011f7
 
@@ -4746,11 +5009,13 @@ PrivPubKeyPair = BOB_wap-wsg-idm-ecid-wtls12:BOB_wap-wsg-idm-ecid-wtls12_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_wap-wsg-idm-ecid-wtls12
+Availablein = default
 PeerKey=BOB_wap-wsg-idm-ecid-wtls12_PUB
 SharedSecret=c75a8283a73312de82c8f99d41a9173a43b8f921e8161dd140131b36
 
 # ECDH Bob with Alice peer
 Derive=BOB_wap-wsg-idm-ecid-wtls12
+Availablein = default
 PeerKey=ALICE_wap-wsg-idm-ecid-wtls12_PUB
 SharedSecret=c75a8283a73312de82c8f99d41a9173a43b8f921e8161dd140131b36
 
@@ -4790,11 +5055,13 @@ PrivPubKeyPair = BOB_brainpoolP160r1:BOB_brainpoolP160r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP160r1
+Availablein = default
 PeerKey=BOB_brainpoolP160r1_PUB
 SharedSecret=e4fe5ae99a60d17b597f5705a719cea6709c63b9
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP160r1
+Availablein = default
 PeerKey=ALICE_brainpoolP160r1_PUB
 SharedSecret=e4fe5ae99a60d17b597f5705a719cea6709c63b9
 
@@ -4834,11 +5101,13 @@ PrivPubKeyPair = BOB_brainpoolP160t1:BOB_brainpoolP160t1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP160t1
+Availablein = default
 PeerKey=BOB_brainpoolP160t1_PUB
 SharedSecret=199a218458b71a4e13f05a599fc17bc76f30ea2f
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP160t1
+Availablein = default
 PeerKey=ALICE_brainpoolP160t1_PUB
 SharedSecret=199a218458b71a4e13f05a599fc17bc76f30ea2f
 
@@ -4878,11 +5147,13 @@ PrivPubKeyPair = BOB_brainpoolP192r1:BOB_brainpoolP192r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP192r1
+Availablein = default
 PeerKey=BOB_brainpoolP192r1_PUB
 SharedSecret=7ce122b49afdfd1adde6cdfaa13dc7180d6d4e70322c8773
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP192r1
+Availablein = default
 PeerKey=ALICE_brainpoolP192r1_PUB
 SharedSecret=7ce122b49afdfd1adde6cdfaa13dc7180d6d4e70322c8773
 
@@ -4922,11 +5193,13 @@ PrivPubKeyPair = BOB_brainpoolP192t1:BOB_brainpoolP192t1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP192t1
+Availablein = default
 PeerKey=BOB_brainpoolP192t1_PUB
 SharedSecret=1a5444c2600d9d21d6a450d158fd25272ade262ab519790b
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP192t1
+Availablein = default
 PeerKey=ALICE_brainpoolP192t1_PUB
 SharedSecret=1a5444c2600d9d21d6a450d158fd25272ade262ab519790b
 
@@ -4966,11 +5239,13 @@ PrivPubKeyPair = BOB_brainpoolP224r1:BOB_brainpoolP224r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP224r1
+Availablein = default
 PeerKey=BOB_brainpoolP224r1_PUB
 SharedSecret=419e446a66968fcc372126cff4d637505c848c3a9b82503f2d441215
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP224r1
+Availablein = default
 PeerKey=ALICE_brainpoolP224r1_PUB
 SharedSecret=419e446a66968fcc372126cff4d637505c848c3a9b82503f2d441215
 
@@ -5010,11 +5285,13 @@ PrivPubKeyPair = BOB_brainpoolP224t1:BOB_brainpoolP224t1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP224t1
+Availablein = default
 PeerKey=BOB_brainpoolP224t1_PUB
 SharedSecret=8f83465fb6353912a51c2809ea30b19b73b3e391c0422650e0f20b58
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP224t1
+Availablein = default
 PeerKey=ALICE_brainpoolP224t1_PUB
 SharedSecret=8f83465fb6353912a51c2809ea30b19b73b3e391c0422650e0f20b58
 
@@ -5054,11 +5331,13 @@ PrivPubKeyPair = BOB_brainpoolP256r1:BOB_brainpoolP256r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP256r1
+Availablein = default
 PeerKey=BOB_brainpoolP256r1_PUB
 SharedSecret=78ed4b7bb4ed808813f8c27132fe04f5d805365549b754994d83b002416b6ba0
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP256r1
+Availablein = default
 PeerKey=ALICE_brainpoolP256r1_PUB
 SharedSecret=78ed4b7bb4ed808813f8c27132fe04f5d805365549b754994d83b002416b6ba0
 
@@ -5098,11 +5377,13 @@ PrivPubKeyPair = BOB_brainpoolP256t1:BOB_brainpoolP256t1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP256t1
+Availablein = default
 PeerKey=BOB_brainpoolP256t1_PUB
 SharedSecret=287a8f19e6f06476b222805eb11907c536fa6ea02b8877ea6d5323f9fabccdd8
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP256t1
+Availablein = default
 PeerKey=ALICE_brainpoolP256t1_PUB
 SharedSecret=287a8f19e6f06476b222805eb11907c536fa6ea02b8877ea6d5323f9fabccdd8
 
@@ -5146,11 +5427,13 @@ PrivPubKeyPair = BOB_brainpoolP320r1:BOB_brainpoolP320r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP320r1
+Availablein = default
 PeerKey=BOB_brainpoolP320r1_PUB
 SharedSecret=13a56c63c2dafe3e053534d5bf32c7eb4a0733bf356510725d378c5cbcf6974240719e3e53b352bb
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP320r1
+Availablein = default
 PeerKey=ALICE_brainpoolP320r1_PUB
 SharedSecret=13a56c63c2dafe3e053534d5bf32c7eb4a0733bf356510725d378c5cbcf6974240719e3e53b352bb
 
@@ -5194,11 +5477,13 @@ PrivPubKeyPair = BOB_brainpoolP320t1:BOB_brainpoolP320t1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP320t1
+Availablein = default
 PeerKey=BOB_brainpoolP320t1_PUB
 SharedSecret=170d1f5fc4248700be75499eac813fac642df1311ab005e10796cc2ef43b82f8d788eb232d580243
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP320t1
+Availablein = default
 PeerKey=ALICE_brainpoolP320t1_PUB
 SharedSecret=170d1f5fc4248700be75499eac813fac642df1311ab005e10796cc2ef43b82f8d788eb232d580243
 
@@ -5242,11 +5527,13 @@ PrivPubKeyPair = BOB_brainpoolP384r1:BOB_brainpoolP384r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP384r1
+Availablein = default
 PeerKey=BOB_brainpoolP384r1_PUB
 SharedSecret=0b3ad57e83759760d94904d9ea266b538120c6db2b5046217aa1ecd924828b949d335c8ce8a5b36bac7556bf6058c40a
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP384r1
+Availablein = default
 PeerKey=ALICE_brainpoolP384r1_PUB
 SharedSecret=0b3ad57e83759760d94904d9ea266b538120c6db2b5046217aa1ecd924828b949d335c8ce8a5b36bac7556bf6058c40a
 
@@ -5290,11 +5577,13 @@ PrivPubKeyPair = BOB_brainpoolP384t1:BOB_brainpoolP384t1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP384t1
+Availablein = default
 PeerKey=BOB_brainpoolP384t1_PUB
 SharedSecret=0fde85a61157cdd898196f291802ebd57bb2e39d98c4e6ad9bb3e2e0375e1df9bf7dadb8df7db1fea32818ef2c88babc
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP384t1
+Availablein = default
 PeerKey=ALICE_brainpoolP384t1_PUB
 SharedSecret=0fde85a61157cdd898196f291802ebd57bb2e39d98c4e6ad9bb3e2e0375e1df9bf7dadb8df7db1fea32818ef2c88babc
 
@@ -5342,11 +5631,13 @@ PrivPubKeyPair = BOB_brainpoolP512r1:BOB_brainpoolP512r1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP512r1
+Availablein = default
 PeerKey=BOB_brainpoolP512r1_PUB
 SharedSecret=80751feb09215a9da32f9f8c97133f53f0286a89969bd00d7f365da7f7736f45e634a35012d71b22f09bd89760ab0d2b0d426133cd9a379da9739d0f5f2e0360
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP512r1
+Availablein = default
 PeerKey=ALICE_brainpoolP512r1_PUB
 SharedSecret=80751feb09215a9da32f9f8c97133f53f0286a89969bd00d7f365da7f7736f45e634a35012d71b22f09bd89760ab0d2b0d426133cd9a379da9739d0f5f2e0360
 
@@ -5394,11 +5685,13 @@ PrivPubKeyPair = BOB_brainpoolP512t1:BOB_brainpoolP512t1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_brainpoolP512t1
+Availablein = default
 PeerKey=BOB_brainpoolP512t1_PUB
 SharedSecret=0afecb44d108c9bf2bc159fcc613a1429e3906d5d201d579adc2167058e972ef85fc13d837f3566a2ff3a881e47bfe36b722baf4a9f865097fe11e171189a944
 
 # ECDH Bob with Alice peer
 Derive=BOB_brainpoolP512t1
+Availablein = default
 PeerKey=ALICE_brainpoolP512t1_PUB
 SharedSecret=0afecb44d108c9bf2bc159fcc613a1429e3906d5d201d579adc2167058e972ef85fc13d837f3566a2ff3a881e47bfe36b722baf4a9f865097fe11e171189a944
 
@@ -5481,10 +5774,12 @@ PrivPubKeyPair = SECP224R1_RFC5114-Peer:SECP224R1_RFC5114-Peer-PUBLIC
 
 
 Derive=SECP224R1_RFC5114
+Availablein = default
 PeerKey=SECP224R1_RFC5114-Peer-PUBLIC
 SharedSecret=52272F50F46F4EDC9151569092F46DF2D96ECC3B6DC1714A4EA949FA
 
 Derive=SECP224R1_RFC5114-Peer
+Availablein = default
 PeerKey=SECP224R1_RFC5114-PUBLIC
 SharedSecret=52272F50F46F4EDC9151569092F46DF2D96ECC3B6DC1714A4EA949FA
 
@@ -5522,10 +5817,12 @@ PrivPubKeyPair = PRIME256V1_RFC5114-Peer:PRIME256V1_RFC5114-Peer-PUBLIC
 
 
 Derive=PRIME256V1_RFC5114
+Availablein = default
 PeerKey=PRIME256V1_RFC5114-Peer-PUBLIC
 SharedSecret=DD0F5396219D1EA393310412D19A08F1F5811E9DC8EC8EEA7F80D21C820C2788
 
 Derive=PRIME256V1_RFC5114-Peer
+Availablein = default
 PeerKey=PRIME256V1_RFC5114-PUBLIC
 SharedSecret=DD0F5396219D1EA393310412D19A08F1F5811E9DC8EC8EEA7F80D21C820C2788
 
@@ -5567,10 +5864,12 @@ PrivPubKeyPair = SECP384R1_RFC5114-Peer:SECP384R1_RFC5114-Peer-PUBLIC
 
 
 Derive=SECP384R1_RFC5114
+Availablein = default
 PeerKey=SECP384R1_RFC5114-Peer-PUBLIC
 SharedSecret=5EA1FC4AF7256D2055981B110575E0A8CAE53160137D904C59D926EB1B8456E427AA8A4540884C37DE159A58028ABC0E
 
 Derive=SECP384R1_RFC5114-Peer
+Availablein = default
 PeerKey=SECP384R1_RFC5114-PUBLIC
 SharedSecret=5EA1FC4AF7256D2055981B110575E0A8CAE53160137D904C59D926EB1B8456E427AA8A4540884C37DE159A58028ABC0E
 
@@ -5618,10 +5917,12 @@ PrivPubKeyPair = SECP521R1_RFC5114-Peer:SECP521R1_RFC5114-Peer-PUBLIC
 
 
 Derive=SECP521R1_RFC5114
+Availablein = default
 PeerKey=SECP521R1_RFC5114-Peer-PUBLIC
 SharedSecret=00CDEA89621CFA46B132F9E4CFE2261CDE2D4368EB5656634C7CC98C7A00CDE54ED1866A0DD3E6126C9D2F845DAFF82CEB1DA08F5D87521BB0EBECA77911169C20CC
 
 Derive=SECP521R1_RFC5114-Peer
+Availablein = default
 PeerKey=SECP521R1_RFC5114-PUBLIC
 SharedSecret=00CDEA89621CFA46B132F9E4CFE2261CDE2D4368EB5656634C7CC98C7A00CDE54ED1866A0DD3E6126C9D2F845DAFF82CEB1DA08F5D87521BB0EBECA77911169C20CC
 
@@ -5660,10 +5961,12 @@ PrivPubKeyPair = PRIME256V1_RFC5903-Peer:PRIME256V1_RFC5903-Peer-PUBLIC
 
 
 Derive=PRIME256V1_RFC5903
+Availablein = default
 PeerKey=PRIME256V1_RFC5903-Peer-PUBLIC
 SharedSecret=D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE
 
 Derive=PRIME256V1_RFC5903-Peer
+Availablein = default
 PeerKey=PRIME256V1_RFC5903-PUBLIC
 SharedSecret=D6840F6B42F6EDAFD13116E0E12565202FEF8E9ECE7DCE03812464D04B9442DE
 
@@ -5705,10 +6008,12 @@ PrivPubKeyPair = SECP384R1_RFC5903-Peer:SECP384R1_RFC5903-Peer-PUBLIC
 
 
 Derive=SECP384R1_RFC5903
+Availablein = default
 PeerKey=SECP384R1_RFC5903-Peer-PUBLIC
 SharedSecret=11187331C279962D93D604243FD592CB9D0A926F422E47187521287E7156C5C4D603135569B9E9D09CF5D4A270F59746
 
 Derive=SECP384R1_RFC5903-Peer
+Availablein = default
 PeerKey=SECP384R1_RFC5903-PUBLIC
 SharedSecret=11187331C279962D93D604243FD592CB9D0A926F422E47187521287E7156C5C4D603135569B9E9D09CF5D4A270F59746
 
@@ -5756,10 +6061,12 @@ PrivPubKeyPair = SECP521R1_RFC5903-Peer:SECP521R1_RFC5903-Peer-PUBLIC
 
 
 Derive=SECP521R1_RFC5903
+Availablein = default
 PeerKey=SECP521R1_RFC5903-Peer-PUBLIC
 SharedSecret=01144C7D79AE6956BC8EDB8E7C787C4521CB086FA64407F97894E5E6B2D79B04D1427E73CA4BAA240A34786859810C06B3C715A3A8CC3151F2BEE417996D19F3DDEA
 
 Derive=SECP521R1_RFC5903-Peer
+Availablein = default
 PeerKey=SECP521R1_RFC5903-PUBLIC
 SharedSecret=01144C7D79AE6956BC8EDB8E7C787C4521CB086FA64407F97894E5E6B2D79B04D1427E73CA4BAA240A34786859810C06B3C715A3A8CC3151F2BEE417996D19F3DDEA
 
@@ -5798,10 +6105,12 @@ PrivPubKeyPair = BRAINPOOLP256R1_RFC7027-Peer:BRAINPOOLP256R1_RFC7027-Peer-PUBLI
 
 
 Derive=BRAINPOOLP256R1_RFC7027
+Availablein = default
 PeerKey=BRAINPOOLP256R1_RFC7027-Peer-PUBLIC
 SharedSecret=89AFC39D41D3B327814B80940B042590F96556EC91E6AE7939BCE31F3A18BF2B
 
 Derive=BRAINPOOLP256R1_RFC7027-Peer
+Availablein = default
 PeerKey=BRAINPOOLP256R1_RFC7027-PUBLIC
 SharedSecret=89AFC39D41D3B327814B80940B042590F96556EC91E6AE7939BCE31F3A18BF2B
 
@@ -5843,10 +6152,12 @@ PrivPubKeyPair = BRAINPOOLP384R1_RFC7027-Peer:BRAINPOOLP384R1_RFC7027-Peer-PUBLI
 
 
 Derive=BRAINPOOLP384R1_RFC7027
+Availablein = default
 PeerKey=BRAINPOOLP384R1_RFC7027-Peer-PUBLIC
 SharedSecret=0BD9D3A7EA0B3D519D09D8E48D0785FB744A6B355E6304BC51C229FBBCE239BBADF6403715C35D4FB2A5444F575D4F42
 
 Derive=BRAINPOOLP384R1_RFC7027-Peer
+Availablein = default
 PeerKey=BRAINPOOLP384R1_RFC7027-PUBLIC
 SharedSecret=0BD9D3A7EA0B3D519D09D8E48D0785FB744A6B355E6304BC51C229FBBCE239BBADF6403715C35D4FB2A5444F575D4F42
 
@@ -5892,10 +6203,12 @@ PrivPubKeyPair = BRAINPOOLP512R1_RFC7027-Peer:BRAINPOOLP512R1_RFC7027-Peer-PUBLI
 
 
 Derive=BRAINPOOLP512R1_RFC7027
+Availablein = default
 PeerKey=BRAINPOOLP512R1_RFC7027-Peer-PUBLIC
 SharedSecret=A7927098655F1F9976FA50A9D566865DC530331846381C87256BAF3226244B76D36403C024D7BBF0AA0803EAFF405D3D24F11A9B5C0BEF679FE1454B21C4CD1F
 
 Derive=BRAINPOOLP512R1_RFC7027-Peer
+Availablein = default
 PeerKey=BRAINPOOLP512R1_RFC7027-PUBLIC
 SharedSecret=A7927098655F1F9976FA50A9D566865DC530331846381C87256BAF3226244B76D36403C024D7BBF0AA0803EAFF405D3D24F11A9B5C0BEF679FE1454B21C4CD1F
 
@@ -5929,6 +6242,7 @@ hXzA375dfGH6yIsRgRveMo6KDRK/AanSBLUj
 
 
 Derive=KAS-ECC-CDH_P-192_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=803d8ab2e5b6e6fca715737c3a82f7ce3c783124f6d51cd0
@@ -5957,6 +6271,7 @@ MEkwEwYHKoZIzj0CAQYIKoZIzj0DAQEDMgAE3rVxL6AnrI0vIsRVzLc6keF7ZRK1
 
 
 Derive=KAS-ECC-CDH_P-192_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=c208847568b98835d7312cef1f97f7aa298283152313c29d
@@ -5985,6 +6300,7 @@ Y8IPCp+Nxno+YO9tZLUiGF0D3x/Arf1CR4J5
 
 
 Derive=KAS-ECC-CDH_P-192_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=87229107047a3b611920d6e3b2c0c89bea4f49412260b8dd
@@ -6013,6 +6329,7 @@ OC6IBMUJe6ZkXhYgbPtw9wUmVZR91EoX8fnV
 
 
 Derive=KAS-ECC-CDH_P-192_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=eec0bed8fc55e1feddc82158fd6dc0d48a4d796aaf47d46c
@@ -6041,6 +6358,7 @@ GNWUVCwxTkFCfAgnigjOjXMF87W4Scctiv9z
 
 
 Derive=KAS-ECC-CDH_P-192_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=716e743b1b37a2cd8479f0a3d5a74c10ba2599be18d7e2f4
@@ -6069,6 +6387,7 @@ zUUWNo7sDVv7hHch32qv8OXUjERPdL+c2KWn
 
 
 Derive=KAS-ECC-CDH_P-192_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=f67053b934459985a315cb017bf0302891798d45d0e19508
@@ -6097,6 +6416,7 @@ SfbQvFLZHiNDY7wy7gtnePJc2MGEdRD0NIuU
 
 
 Derive=KAS-ECC-CDH_P-192_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=75822971193edd472bf30151a782619c55ad0b279c9303dd
@@ -6125,6 +6445,7 @@ AR0h4crNa3vRftjdtQtq7gZUw18tDt3Bz/z2
 
 
 Derive=KAS-ECC-CDH_P-192_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=67cba2cbb69ee78bf1abafb0e6fbe33fa2094c128d59652d
@@ -6153,6 +6474,7 @@ Dc7RIJiZgb6q8ABtiKlueXGi+jozukYEf8e6
 
 
 Derive=KAS-ECC-CDH_P-192_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=cf99a2770a386ca0137d1eca0a226e484297ac3c513f3631
@@ -6181,6 +6503,7 @@ scYrbKZT8IJy4DhvyUIfvVgAk9euYwG8qUR2
 
 
 Derive=KAS-ECC-CDH_P-192_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=576331e2b4fb38a112810e1529834de8307fb0a0d2756877
@@ -6209,6 +6532,7 @@ MEkwEwYHKoZIzj0CAQYIKoZIzj0DAQEDMgAEU5vED+IKD7JniItkewPqr27CDAKh
 
 
 Derive=KAS-ECC-CDH_P-192_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=902f4501916a0dd945554c3a37b3d780d375a6da713197c4
@@ -6237,6 +6561,7 @@ liUPmfvfnZfdiK1BAjXaw25bks4oJLjlh6gs
 
 
 Derive=KAS-ECC-CDH_P-192_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=46e4de335054d429863218ae33636fc9b89c628b64b506c7
@@ -6265,6 +6590,7 @@ N2IgE10wtctmDu+HZP/HRPFcG11twGukQW03
 
 
 Derive=KAS-ECC-CDH_P-192_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=1bfe9e5a20ac7a38d8f605b425bb9030be31ef97c101c76c
@@ -6293,6 +6619,7 @@ SD3D4ci6Y+H0cdsjGF9Q2chx7eohJVs6Y7S3
 
 
 Derive=KAS-ECC-CDH_P-192_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0e8c493a4adc445dc9288a3b9b272599224054592d7265b3
@@ -6321,6 +6648,7 @@ q3fxWNZ0mjqSPcgEQPJmH9NbZRYX5lKUtGN1
 
 
 Derive=KAS-ECC-CDH_P-192_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0f1991086b455ded6a1c4146f7bf59fe9b495de566ebc6bf
@@ -6349,6 +6677,7 @@ drUD4ebjizcra+4P9bNQLYNzXjssJoJeTw/M
 
 
 Derive=KAS-ECC-CDH_P-192_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=b30f2127c34df35aaa91dbf0bbe15798e799a03ed11698c1
@@ -6377,6 +6706,7 @@ E40RMSJfM4ZO1I2gb6RakTtGz0JVd0LjUIXm
 
 
 Derive=KAS-ECC-CDH_P-192_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=64a5c246599d3e8177a2402a1110eb81e6c456ab4edb5127
@@ -6405,6 +6735,7 @@ NbzJN8KXynA/d8UrsGLYzpcduECXugx1OkGP
 
 
 Derive=KAS-ECC-CDH_P-192_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=017b8ca53c82fab163da2ab783966a39e061b32c8cfa334d
@@ -6433,6 +6764,7 @@ zo5dRJVS73V4vpYjb+XtnQZDwLtsWpE0sBCN
 
 
 Derive=KAS-ECC-CDH_P-192_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=340ef3db3dbebdd91c62c3d4e1a3da2c7c52a3338b865259
@@ -6461,6 +6793,7 @@ mDv1DzURBIGRme8HyaYFHSB1jzr3kCfqZqU/
 
 
 Derive=KAS-ECC-CDH_P-192_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=2162144921df5103d0e6a650fb13fd246f4738d0896ce92f
@@ -6489,6 +6822,7 @@ zzB4siynJDdUXhDW1PBSQi64mLc3pLhUPuVQ
 
 
 Derive=KAS-ECC-CDH_P-192_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=4c69e7feed4b11159adfc16a6047a92572ea44e0740b23af
@@ -6517,6 +6851,7 @@ yAPfcTlsnPCLzZGFTj5uQtjGV84PJ6t3qdxL
 
 
 Derive=KAS-ECC-CDH_P-192_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=46072acefd67bff50de355ca7a31fa6be59f26e467587259
@@ -6545,6 +6880,7 @@ FPF4plSpqooaCALyzg7ooPTr6W3uGzdGSx/y
 
 
 Derive=KAS-ECC-CDH_P-192_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ec5580eabca9f3389d2b427ddf6e49e26d629afd03fa766e
@@ -6573,6 +6909,7 @@ w0cYEClVe+uk/xmSvSHCPLSCX22ucOMxj9HK
 
 
 Derive=KAS-ECC-CDH_P-192_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=7f3929dd3cbf7673bc30d859d90b880307475f800660ea32
@@ -6601,6 +6938,7 @@ oiH8RkZJ1siMqJYUSIocx7hEK7Qvn7MCCj12
 
 
 Derive=KAS-ECC-CDH_P-192_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-192_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=72e88f3ea67d46d46dbf83926e7e2a6b85b54536741e6d2c
@@ -6629,6 +6967,7 @@ q6rigIggksy7p5MPQZqKT5uxaXi7w4OHKZklWaby4tc=
 
 
 Derive=KAS-ECC-CDH_P-224_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=7d96f9a3bd3c05cf5cc37feb8b9d5209d5c2597464dec3e9983743e8
@@ -6657,6 +6996,7 @@ ME4wEAYHKoZIzj0CAQYFK4EEACEDOgAEE7/NT46UQjk8q4+0a58FZsImsis3B2l2
 
 
 Derive=KAS-ECC-CDH_P-224_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ee93ce06b89ff72009e858c68eb708e7bc79ee0300f73bed69bbca09
@@ -6685,6 +7025,7 @@ ME4wEAYHKoZIzj0CAQYFK4EEACEDOgAEdW3YBrnZw02JlpHstFt3GvRo7ABEhqD9
 
 
 Derive=KAS-ECC-CDH_P-224_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=3fcc01e34d4449da2a974b23fc36f9566754259d39149790cfa1ebd3
@@ -6713,6 +7054,7 @@ T5khxPebJtMOSRp3NpbMLHm08FlrxbnuuvOU0WL7hoQ=
 
 
 Derive=KAS-ECC-CDH_P-224_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=49129628b23afcef48139a3f6f59ff5e9811aa746aa4ff33c24bb940
@@ -6741,6 +7083,7 @@ xksiOYPeKa49rTGtwCNsbefxRWHKLqCDxScMeKLmy8A=
 
 
 Derive=KAS-ECC-CDH_P-224_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=fcdc69a40501d308a6839653a8f04309ec00233949522902ffa5eac6
@@ -6769,6 +7112,7 @@ cKAjOH0tG2KqBG35NA+cN6CHoGsyz38IoiP5koEqgos=
 
 
 Derive=KAS-ECC-CDH_P-224_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=827e9025cb62e0e837c596063f3b9b5a0f7afd8d8783200086d61ec1
@@ -6797,6 +7141,7 @@ ME4wEAYHKoZIzj0CAQYFK4EEACEDOgAEMUoLJt0xwkiEXXzBe2HK1GCCWb7YWljR
 
 
 Derive=KAS-ECC-CDH_P-224_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=335ba51228d94acbed851ca7821c801d5cb1c7975d7aa90a7159f8fa
@@ -6825,6 +7170,7 @@ C0YD5Wr+hnOpbEupkArYWZXmMeQ2xsyIosK0e3xIhrg=
 
 
 Derive=KAS-ECC-CDH_P-224_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=8c2e627594206b34f7356d3426eb3d79f518ef843fbe94014cceace3
@@ -6853,6 +7199,7 @@ hNT1J9y+51tRV1H47irjVeiv1d4hxiqTmmUHtTjLxK8=
 
 
 Derive=KAS-ECC-CDH_P-224_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=632abb662728dbc994508873d5c527ca5ef923c0d31fa6c47ef4c825
@@ -6881,6 +7228,7 @@ oigGWYKlj/YbyQAZu8u1h104Y9sLwqH6NLCtTeGoP5k=
 
 
 Derive=KAS-ECC-CDH_P-224_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=34641141aab05ef58bd376d609345901fb8f63477c6be9097f037f1f
@@ -6909,6 +7257,7 @@ ME4wEAYHKoZIzj0CAQYFK4EEACEDOgAEc8xkU3LKLnFjfNqUPYFI8zgqtt0PLhpJ
 
 
 Derive=KAS-ECC-CDH_P-224_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=4f74ac8507501a32bfc5a78d8271c200e835966e187e8d00011a8c75
@@ -6937,6 +7286,7 @@ zg9FEtKiL81m0avtx2dmgyfFy5xZkEMnYjnPPIUWryQ=
 
 
 Derive=KAS-ECC-CDH_P-224_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ad09c9ae4d2324ea81bb555b200d3c003e22a6870ee03b52df49e4de
@@ -6965,6 +7315,7 @@ sq+iKg7J5l7JfiGDc+f8EVwidNW4KaYNk/ceAdWBNsM=
 
 
 Derive=KAS-ECC-CDH_P-224_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ef029c28c68064b8abd2965a38c404fb5e944ace57e8638daba9d3cd
@@ -6993,6 +7344,7 @@ E2UG4N8SPZinogu985Q98uNWNCL4wM901TqqvdfJc7o=
 
 
 Derive=KAS-ECC-CDH_P-224_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=f83c16661dfcbad021cc3b5a5af51d9a18db4653866b3ff90787ce3e
@@ -7021,6 +7373,7 @@ ks39ylB4euLy8VuIvBD3tfCu4UGDc/FhU669H7pUKI0=
 
 
 Derive=KAS-ECC-CDH_P-224_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=f51258c63f232e55a66aa25ebd597b2018d1052c02eeb63866758005
@@ -7049,6 +7402,7 @@ uE98JHCWkI5GFSZr5ZpTzWVVFQVv+SNwpicaXTgj1wQ=
 
 
 Derive=KAS-ECC-CDH_P-224_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=7fdc969a186ff18429f2a276dac43beea21182d82ce2e5a0876552b1
@@ -7077,6 +7431,7 @@ xHlAwd858eqISIxV1VOBYIeLnO0YqIfqJh3XEtFAJP8=
 
 
 Derive=KAS-ECC-CDH_P-224_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=3d60ab6db2b3ffe2d29ccff46d056e54230cf34982e241556ed2920c
@@ -7105,6 +7460,7 @@ k0zzwDoenzinuQtzF9Jrn2MRBjq1iyaM9Imy5QOG1dY=
 
 
 Derive=KAS-ECC-CDH_P-224_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=9116d72786f4db5df7a8b43078c6ab9160d423513d35ea5e2559306d
@@ -7133,6 +7489,7 @@ ME4wEAYHKoZIzj0CAQYFK4EEACEDOgAEJiNjL98L2FaAWmmqGG1BM+9ZBOH2Valy
 
 
 Derive=KAS-ECC-CDH_P-224_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=207c53dcefac789aaa0276d9200b3a940ce5f2296f4cb2e81a185d3d
@@ -7161,6 +7518,7 @@ p3qBUk6/Mj//BOtHcGmgrGizRfaxrhNO/DGUDlE8uZ8=
 
 
 Derive=KAS-ECC-CDH_P-224_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=10e467da34f48ad7072005bccd6da1b2ba3f71eafa1c393842f91d74
@@ -7189,6 +7547,7 @@ u5nmkdrRHdXs6M/Z+XyaUm5KFQbmNVlp7oeCb8OLzSQ=
 
 
 Derive=KAS-ECC-CDH_P-224_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=82fd2f9c60c4f999ac00bbe64bfc11da8ff8cda2e499fced65230bb1
@@ -7217,6 +7576,7 @@ wOU09+ETtvLBZZ0H8nFuZKg8GLvONE3SEh/oUWjq4IU=
 
 
 Derive=KAS-ECC-CDH_P-224_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=530f7e7fc932613b29c981f261cb036cba3f1df3864e0e1cba2685a2
@@ -7245,6 +7605,7 @@ tG5mpVzJsllxixvIsUT95jOolGFv/VmjptXY6ULHy7c=
 
 
 Derive=KAS-ECC-CDH_P-224_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=49f6fd0139248ef4df2db05d1319bd5b1489e249827a45a8a5f12427
@@ -7273,6 +7634,7 @@ vDN0dynua4ScYCXVd9vMVfvRcBj07bwu8QWwBNYle80=
 
 
 Derive=KAS-ECC-CDH_P-224_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=8f7e34e597ae8093b98270a74a8dfcdbed457f42f43df487c5487161
@@ -7301,6 +7663,7 @@ DGqd9PkcNtiB/puAR6NTBxNVShr0wlxajmVNzc9ony4=
 
 
 Derive=KAS-ECC-CDH_P-224_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-224_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=71954e2261e8510be1a060733671d2e9d0a2d012eb4e09556d697d2a
@@ -7329,6 +7692,7 @@ Tfa0LOfMg4gz0ofbceUJ4/2bBg3bILpcUdzFlI1G+/ZA3+BEF4LKuF+krA==
 
 
 Derive=KAS-ECC-CDH_P-256_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=46fc62106420ff012e54a434fbdd2d25ccc5852060561e68040dd7778997bd7b
@@ -7357,6 +7721,7 @@ XKpQGX5Y1DqGp66ynYToERl/Jeuo9RlAkstv9EDibUQhARNyRh9XknHNow==
 
 
 Derive=KAS-ECC-CDH_P-256_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=057d636096cb80b67a8c038c890e887d1adfa4195e9b3ce241c8a778c59cda67
@@ -7385,6 +7750,7 @@ Rk13RDY2RA7n/sPvSKOrJuICILzaLBhRB2g52uiOrpYoaaSXv3PLZvr1Ng==
 
 
 Derive=KAS-ECC-CDH_P-256_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=2d457b78b4614132477618a5b077965ec90730a8c81a1c75d6d4ec68005d67ec
@@ -7413,6 +7779,7 @@ HdUY7/DDz/K3Be1CIpT/RgA0Kdc5ozIGyHUlUsi6VKJw3vwG4iHg/q9qxA==
 
 
 Derive=KAS-ECC-CDH_P-256_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=96441259534b80f6aee3d287a6bb17b5094dd4277d9e294f8fe73e48bf2a0024
@@ -7441,6 +7808,7 @@ MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEQRktKBPnlWHmodb1PIvBpDOhmcg1
 
 
 Derive=KAS-ECC-CDH_P-256_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=19d44c8d63e8e8dd12c22a87b8cd4ece27acdde04dbf47f7f27537a6999a8e62
@@ -7469,6 +7837,7 @@ VXS/jltxAKMFJ5Lyz2tgHgoFlF4zVVC/ZI14L0YYbHcsDyDTzQ1rjKFLLw==
 
 
 Derive=KAS-ECC-CDH_P-256_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=664e45d5bba4ac931cd65d52017e4be9b19a515f669bea4703542a2c525cd3d3
@@ -7497,6 +7866,7 @@ gdNKkLY1O8pu66dA+b6tOcLyvMJgL3W4pz7Hvf/Lzq0VnQF0xsTTxTV/BQ==
 
 
 Derive=KAS-ECC-CDH_P-256_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ca342daa50dc09d61be7c196c85e60a80c5cb04931746820be548cdde055679d
@@ -7525,6 +7895,7 @@ HNDiELBGQSziJLv23gr6IOk+B4RnwFPSQZA+2tc0xrQDunWMK1/wTJ1CKQ==
 
 
 Derive=KAS-ECC-CDH_P-256_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=35aa9b52536a461bfde4e85fc756be928c7de97923f0416c7a3ac8f88b3d4489
@@ -7553,6 +7924,7 @@ MjG9k7fbffNvnrnYBJpDV5z6kLgJOpRBbL77+TOG8Vs/bhkLbjRV/t/mmg==
 
 
 Derive=KAS-ECC-CDH_P-256_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=605c16178a9bc875dcbff54d63fe00df699c03e8a888e9e94dfbab90b25f39b4
@@ -7581,6 +7953,7 @@ MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE4Jm/Kk1VdGC1VEQwu/baEQBNEny1
 
 
 Derive=KAS-ECC-CDH_P-256_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=f96e40a1b72840854bb62bc13c40cc2795e373d4e715980b261476835a092e0b
@@ -7609,6 +7982,7 @@ OHeKZFyCSM/wFlgzu98bF3LYBZ31aLBh8/ESLyio2BkWfJe+RI49w/sMPA==
 
 
 Derive=KAS-ECC-CDH_P-256_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=8388fa79c4babdca02a8e8a34f9e43554976e420a4ad273c81b26e4228e9d3a3
@@ -7637,6 +8011,7 @@ IYPM78rvJ5e3Z01i9X8xTj80ldxOCZAS9eC6cXcPlmCh6tpUEEzf3nckPg==
 
 
 Derive=KAS-ECC-CDH_P-256_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=72877cea33ccc4715038d4bcbdfe0e43f42a9e2c0c3b017fc2370f4b9acbda4a
@@ -7665,6 +8040,7 @@ icR5YQGJcEHRTsvD3vS1/gT67goRkyIp//VjY3v97g55xt7q9En4VAHFxA==
 
 
 Derive=KAS-ECC-CDH_P-256_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=e4e7408d85ff0e0e9c838003f28cdbd5247cdce31f32f62494b70e5f1bc36307
@@ -7693,6 +8069,7 @@ uqOS7Yl4DfzNtHHN9OkXD7kEMCuP2TqCC6jMftTv06by1rBbgLL/Ku5Odw==
 
 
 Derive=KAS-ECC-CDH_P-256_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ed56bcf695b734142c24ecb1fc1bb64d08f175eb243a31f37b3d9bb4407f3b96
@@ -7721,6 +8098,7 @@ MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEScUDumxPpgUYLhhrXoERPwdbwR3P
 
 
 Derive=KAS-ECC-CDH_P-256_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=bc5c7055089fc9d6c89f83c1ea1ada879d9934b2ea28fcf4e4a7e984b28ad2cf
@@ -7749,6 +8127,7 @@ kWLCpFMSQBY2spwJrtcjKyjgYJQXQbaCi836K8ScyETzdzYRUE+Co5Clrg==
 
 
 Derive=KAS-ECC-CDH_P-256_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=9a4e8e657f6b0e097f47954a63c75d74fcba71a30d83651e3e5a91aa7ccd8343
@@ -7777,6 +8156,7 @@ t7tjzsE/r5sJmVRsqzGwZBnlIh/KAU+4TshwYiobErq1rkNoKqfqc+oI0A==
 
 
 Derive=KAS-ECC-CDH_P-256_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=3ca1fc7ad858fb1a6aba232542f3e2a749ffc7203a2374a3f3d3267f1fc97b78
@@ -7805,6 +8185,7 @@ ebCMO/h9/Sgo12ffp7//1MdmuGq+r1yZtuUMuczJ2dALf/x4BLBJG2e8Aw==
 
 
 Derive=KAS-ECC-CDH_P-256_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=1aaabe7ee6e4a6fa732291202433a237df1b49bc53866bfbe00db96a0f58224f
@@ -7833,6 +8214,7 @@ gMiIbs2F/cHtdkRWPEwgQZ8HvBfQU5+t4YVeNIOVFbiSwPXSZWH5f6BNGg==
 
 
 Derive=KAS-ECC-CDH_P-256_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=430e6a4fba4449d700d2733e557f66a3bf3d50517c1271b1ddae1161b7ac798c
@@ -7861,6 +8243,7 @@ aF6V4u69RkUF8B/p3dWDqWNaZnd31bio8xsPeeuhLHUCNBC1S4Vn3dwPOA==
 
 
 Derive=KAS-ECC-CDH_P-256_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=1ce9e6740529499f98d1f1d71329147a33df1d05e4765b539b11cf615d6974d3
@@ -7889,6 +8272,7 @@ gbp0tOnENh9ZXk6/fS8gVuckIe85PwwPKw4AEw48rEq7zAAoYWjoXsVQUQ==
 
 
 Derive=KAS-ECC-CDH_P-256_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=4690e3743c07d643f1bc183636ab2a9cb936a60a802113c49bb1b3f2d0661660
@@ -7917,6 +8301,7 @@ eOBPNbO+7SIqDrYJQgzloZ13xv4e5YfmpJ+6+PKA6N8DPXVAMwLlon2yrg==
 
 
 Derive=KAS-ECC-CDH_P-256_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=30c2261bd0004e61feda2c16aa5e21ffa8d7e7f7dbf6ec379a43b48e4b36aeb0
@@ -7945,6 +8330,7 @@ n5ZAskJkseUk/LFcbo7PH30wI4k7exyh5NF4ly7iojB1fdxWT/439cWjIQ==
 
 
 Derive=KAS-ECC-CDH_P-256_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=2adae4a138a239dcd93c243a3803c3e4cf96e37fe14e6a9b717be9599959b11c
@@ -7973,6 +8359,7 @@ fZYlyNMj1RHJLebpwYTfdclV4C4C5AD/5F948znhr+bQVvsyRfRwDOYG7w==
 
 
 Derive=KAS-ECC-CDH_P-256_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=2e277ec30f5ea07d6ce513149b9479b96e07f4b6913b1b5c11305c1444a1bc0b
@@ -8001,6 +8388,7 @@ MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENWxaREwEmlL+4K3rfl2CrlqoMDC/
 
 
 Derive=KAS-ECC-CDH_P-256_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-256_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=1e51373bd2c6044c129c436e742a55be2a668a85ae08441b6756445df5493857
@@ -8032,6 +8420,7 @@ Hv7fJDRRkV7QkFoysGCZK0aMZHZvyEN6
 
 
 Derive=KAS-ECC-CDH_P-384_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=5f9d29dc5e31a163060356213669c8ce132e22f57c9a04f40ba7fcead493b457e5621e766c40a2e3d4d6a04b25e533f1
@@ -8063,6 +8452,7 @@ hghXpoFTq2LlJewFMNgbWqFYl5gehYdX
 
 
 Derive=KAS-ECC-CDH_P-384_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=a23742a2c267d7425fda94b93f93bbcc24791ac51cd8fd501a238d40812f4cbfc59aac9520d758cf789c76300c69d2ff
@@ -8094,6 +8484,7 @@ l7VdoPYaPt2stKzbFEQcshSwSghEwC+j
 
 
 Derive=KAS-ECC-CDH_P-384_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=3d2e640f350805eed1ff43b40a72b2abed0a518bcebe8f2d15b111b6773223da3c3489121db173d414b5bd5ad7153435
@@ -8125,6 +8516,7 @@ Umqi6Se1syLJWhoDPCKctncMlXzTFI3X
 
 
 Derive=KAS-ECC-CDH_P-384_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=6a42cfc392aba0bfd3d17b7ccf062b91fc09bbf3417612d02a90bdde62ae40c54bb2e56e167d6b70db670097eb8db854
@@ -8156,6 +8548,7 @@ qX84kQBdH7OIWPVgPehA5ZHfpPbn1Inh
 
 
 Derive=KAS-ECC-CDH_P-384_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ce7ba454d4412729a32bb833a2d1fd2ae612d4667c3a900e069214818613447df8c611de66da200db7c375cf913e4405
@@ -8187,6 +8580,7 @@ kkmXfgv+SmJiYi8T1Co8Q9Zr27MEA8NF
 
 
 Derive=KAS-ECC-CDH_P-384_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ba69f0acdf3e1ca95caaac4ecaf475bbe51b54777efce01ca381f45370e486fe87f9f419b150c61e329a286d1aa265ec
@@ -8218,6 +8612,7 @@ Cgf9oJl/SCUEYC9Z4QvFy0drg9Ck915x
 
 
 Derive=KAS-ECC-CDH_P-384_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=1a6688ee1d6e59865d8e3ada37781d36bb0c2717eef92e61964d3927cb765c2965ea80f7f63e58c322ba0397faeaf62b
@@ -8249,6 +8644,7 @@ INQ48k5n5gwusEYyBGefo1avRM6pyev1
 
 
 Derive=KAS-ECC-CDH_P-384_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=d06a568bf2336b90cbac325161be7695eacb2295f599500d787f072612aca313ee5d874f807ddef6c1f023fe2b6e7cd0
@@ -8280,6 +8676,7 @@ UBEsPPDwKEToiKNWnf73goqKiEWJqgVe
 
 
 Derive=KAS-ECC-CDH_P-384_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=bb3b1eda9c6560d82ff5bee403339f1e80342338a991344853b56b24f109a4d94b92f654f0425edd4c205903d7586104
@@ -8311,6 +8708,7 @@ V/jRsSmjvV9j9AyvO9BTPjil9XdwdP+e
 
 
 Derive=KAS-ECC-CDH_P-384_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=1e97b60add7cb35c7403dd884c0a75795b7683fff8b49f9d8672a8206bfdcf0a106b8768f983258c74167422e44e4d14
@@ -8342,6 +8740,7 @@ aja12tM94AR09mcPUiIU3XlSFAqwp+to
 
 
 Derive=KAS-ECC-CDH_P-384_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=1023478840e54775bfc69293a3cf97f5bc914726455c66538eb5623e218feef7df4befa23e09d77145ad577db32b41f9
@@ -8373,6 +8772,7 @@ zUwwkVIwWJhKJdjyHagyYZJFbGoPpfYM
 
 
 Derive=KAS-ECC-CDH_P-384_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=6ad6b9dc8a6cf0d3691c501cbb967867f6e4bbb764b60dbff8fcff3ed42dbba39d63cf325b4b4078858495ddee75f954
@@ -8404,6 +8804,7 @@ D6dJnWoHKDquKvoz/quX3spAvGBsTYdk
 
 
 Derive=KAS-ECC-CDH_P-384_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=cc9e063566d46b357b3fcae21827377331e5e290a36e60cd7c39102b828ae0b918dc5a02216b07fe6f1958d834e42437
@@ -8435,6 +8836,7 @@ Sw9NmzjAaNrvonEUJVuaQdCEzEoa2FRW
 
 
 Derive=KAS-ECC-CDH_P-384_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=deff7f03bd09865baf945e73edff6d5122c03fb561db87dec8662e09bed4340b28a9efe118337bb7d3d4f7f568635ff9
@@ -8466,6 +8868,7 @@ RVDsbDtvAzuW2yrKPWrGqrBSzpKVla6l
 
 
 Derive=KAS-ECC-CDH_P-384_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=c8b1038f735ad3bb3e4637c3e47eab487637911a6b7950a4e461948329d3923b969e5db663675623611a457fcda35a71
@@ -8497,6 +8900,7 @@ TXdlGDGVrtP5E2QbkMgaMG6/DYkThhMW
 
 
 Derive=KAS-ECC-CDH_P-384_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=d337eaa32b9f716b8747b005b97a553c59dab0c51df41a2d49039cdae705aa75c7b9e7bc0b6a0e8c578c902bc4fff23e
@@ -8528,6 +8932,7 @@ MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEkKNHN9RbGqZfdOC9Blm8EY+OS3dLdhlE
 
 
 Derive=KAS-ECC-CDH_P-384_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=32d292b695a4488e42a7b7922e1ae537d76a3d21a0b2e36875f60e9f6d3e8779c2afb3a413b9dd79ae18e70b47d337c1
@@ -8559,6 +8964,7 @@ cMQntO5JYqvfgXO7rYGHR3KSX9MvCxWf
 
 
 Derive=KAS-ECC-CDH_P-384_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=1220e7e6cad7b25df98e5bbdcc6c0b65ca6c2a50c5ff6c41dca71e475646fd489615979ca92fb4389aeadefde79a24f1
@@ -8590,6 +8996,7 @@ gkfwivdSkpFXtYMPHiYGdGa9+otlFFoz
 
 
 Derive=KAS-ECC-CDH_P-384_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=793bb9cd22a93cf468faf804a38d12b78cb12189ec679ddd2e9aa21fa9a5a0b049ab16a23574fe04c1c3c02343b91beb
@@ -8621,6 +9028,7 @@ APTIc4OKQME16zuruSk70QAb8+ze578m1BbbbhuHu7dCd4ijtsenqywWWx42b5YI
 
 
 Derive=KAS-ECC-CDH_P-384_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=012d191cf7404a523678c6fc075de8285b243720a903047708bb33e501e0dbee5bcc40d7c3ef6c6da39ea24d830da1e8
@@ -8652,6 +9060,7 @@ uUmWlSfXmh3FkpXvfSvKZ0PozXewTRtYC6rq3H4Z10qKBEUaE18b4bAv4pn53AC/
 
 
 Derive=KAS-ECC-CDH_P-384_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=ad0fd3ddffe8884b9263f3c15fe1f07f2a5a22ffdc7e967085eea45f0cd959f20f18f522763e28bcc925e496a52dda98
@@ -8683,6 +9092,7 @@ zHIoTpi+lWLjWSb7T0ip++yv5ykwnotv
 
 
 Derive=KAS-ECC-CDH_P-384_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=dc4ca392dc15e20185f2c6a8ea5ec31dfc96f56153a47394b3072b13d0015f5d4ae13beb3bed54d65848f9b8383e6c95
@@ -8714,6 +9124,7 @@ rA0RvbLuIC6dOHLo0CjAiZB0bF4d3pmJ
 
 
 Derive=KAS-ECC-CDH_P-384_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=d765b208112d2b9ed5ad10c4046e2e3b0dbf57c469329519e239ac28b25c7d852bf757d5de0ee271cadd021d86cfd347
@@ -8745,6 +9156,7 @@ YO8G0cqnNoHQYInDO8QkazqjDbzSQ1sS
 
 
 Derive=KAS-ECC-CDH_P-384_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=d3778850aeb58804fbe9dfe6f38b9fa8e20c2ca4e0dec335aafceca0333e3f2490b53c0c1a14a831ba37c4b9d74be0f2
@@ -8776,6 +9188,7 @@ k3LAhzoFjVdUSxAuzOcissyrsaYDd0/V
 
 
 Derive=KAS-ECC-CDH_P-384_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-384_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=81e1e71575bb4505498de097350186430a6242fa6c57b85a5f984a23371123d2d1424eefbf804258392bc723e4ef1e35
@@ -8811,6 +9224,7 @@ SLbD5SJJeVWk88MC9nY=
 
 
 Derive=KAS-ECC-CDH_P-521_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=005fc70477c3e63bc3954bd0df3ea0d1f41ee21746ed95fc5e1fdf90930d5e136672d72cc770742d1711c3c3a4c334a0ad9759436a4d3c5bf6e74b9578fac148c831
@@ -8846,6 +9260,7 @@ ZkAikRLer6DNi7DQibA=
 
 
 Derive=KAS-ECC-CDH_P-521_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=000b3920ac830ade812c8f96805da2236e002acbbf13596a9ab254d44d0e91b6255ebf1229f366fb5a05c5884ef46032c26d42189273ca4efa4c3db6bd12a6853759
@@ -8881,6 +9296,7 @@ zDwI6Rwdjt2Rz2/oRfg=
 
 
 Derive=KAS-ECC-CDH_P-521_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=006b380a6e95679277cfee4e8353bf96ef2a1ebdd060749f2f046fe571053740bbcc9a0b55790bc9ab56c3208aa05ddf746a10a3ad694daae00d980d944aabc6a08f
@@ -8916,6 +9332,7 @@ RbTrfJUcO5yM9SUwuiM=
 
 
 Derive=KAS-ECC-CDH_P-521_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00fbbcd0b8d05331fef6086f22a6cce4d35724ab7a2f49dd8458d0bfd57a0b8b70f246c17c4468c076874b0dff7a0336823b19e98bf1cec05e4beffb0591f97713c6
@@ -8951,6 +9368,7 @@ ecWwa1kSc3KZfUIa3B4=
 
 
 Derive=KAS-ECC-CDH_P-521_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0145cfa38f25943516c96a5fd4bfebb2f645d10520117aa51971eff442808a23b4e23c187e639ff928c3725fbd1c0c2ad0d4aeb207bc1a6fb6cb6d467888dc044b3c
@@ -8986,6 +9404,7 @@ m4Cp0csHlnNlSXfF+pQ=
 
 
 Derive=KAS-ECC-CDH_P-521_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=005c5721e96c273319fd60ecc46b5962f698e974b429f28fe6962f4ac656be2eb8674c4aafc037eab48ece612953b1e8d861016b6ad0c79805784c67f73ada96f351
@@ -9021,6 +9440,7 @@ WAZGkTRBVPOW267RiLY=
 
 
 Derive=KAS-ECC-CDH_P-521_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01736d9717429b4f412e903febe2f9e0fffd81355d6ce2c06ff3f66a3be15ceec6e65e308347593f00d7f33591da4043c30763d72749f72cdceebe825e4b34ecd570
@@ -9056,6 +9476,7 @@ Lrp2kQ/tM8dhgEUVAR+rUOOzd6vYqKBF2IbSI40sJorBtuyIvXG3unjiwzwVLkv3
 
 
 Derive=KAS-ECC-CDH_P-521_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=018f2ae9476c771726a77780208dedfefa205488996b18fecc50bfd4c132753f5766b2cd744afa9918606de2e016effc63622e9029e76dc6e3f0c69f7aeced565c2c
@@ -9091,6 +9512,7 @@ U+FXP/YL4VB0Z9Qx+7I=
 
 
 Derive=KAS-ECC-CDH_P-521_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0105a346988b92ed8c7a25ce4d79d21bc86cfcc7f99c6cd19dbb4a39f48ab943b79e4f0647348da0b80bd864b85c6b8d92536d6aa544dc7537a00c858f8b66319e25
@@ -9126,6 +9548,7 @@ LZcZfZL1hfV0i8JnLus=
 
 
 Derive=KAS-ECC-CDH_P-521_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=004531b3d2c6cd12f21604c8610e6723dbf4daf80b5a459d6ba5814397d1c1f7a21d7c114be964e27376aaebe3a7bc3d6af7a7f8c7befb611afe487ff032921f750f
@@ -9161,6 +9584,7 @@ IMb3g5NPkmw/tptAxAk=
 
 
 Derive=KAS-ECC-CDH_P-521_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0100c8935969077bae0ba89ef0df8161d975ec5870ac811ae7e65ca5394efba4f0633d41bf79ea5e5b9496bbd7aae000b0594baa82ef8f244e6984ae87ae1ed124b7
@@ -9196,6 +9620,7 @@ RIM19pTjzaSuDMcbGy8qIG+oAtcmLxmYPERnT+FTJ6yqwfpAQkw5WmVWy4FnMSUn
 
 
 Derive=KAS-ECC-CDH_P-521_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=017f36af19303841d13a389d95ec0b801c7f9a679a823146c75c17bc44256e9ad422a4f8b31f14647b2c7d317b933f7c2946c4b8abd1d56d620fab1b5ff1a3adc71f
@@ -9231,6 +9656,7 @@ SGvtkgDK3a3f5P+ONWI=
 
 
 Derive=KAS-ECC-CDH_P-521_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00062f9fc29ae1a68b2ee0dcf956cbd38c88ae5f645eaa546b00ebe87a7260bf724be20d34b9d02076655c933d056b21e304c24ddb1dedf1dd76de611fc4a2340336
@@ -9266,6 +9692,7 @@ H2BqRAukvU5aEbi45U8=
 
 
 Derive=KAS-ECC-CDH_P-521_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0128ab09bfec5406799e610f772ba17e892249fa8e0e7b18a04b9197034b250b48294f1867fb9641518f92766066a07a8b917b0e76879e1011e51ccbd9f540c54d4f
@@ -9301,6 +9728,7 @@ pYQjWs6nV9vxPVO1g2Q=
 
 
 Derive=KAS-ECC-CDH_P-521_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0101e462e9d9159968f6440e956f11dcf2227ae4aea81667122b6af9239a291eb5d6cf5a4087f358525fcacfa46bb2db01a75af1ba519b2d31da33eda87a9d565748
@@ -9336,6 +9764,7 @@ eRXDhFnLIKuFrsTkUFI=
 
 
 Derive=KAS-ECC-CDH_P-521_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0141d6a4b719ab67eaf04a92c0a41e2dda78f4354fb90bdc35202cc7699b9b04d49616f82255debf7bbec045ae58f982a66905fcfae69d689785e38c868eb4a27e7b
@@ -9371,6 +9800,7 @@ iLmv4mpPb+7VYLIY5rs=
 
 
 Derive=KAS-ECC-CDH_P-521_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00345e26e0abb1aac12b75f3a9cf41efe1c336396dffa4a067a4c2cfeb878c68b2b045faa4e5b4e6fa4678f5b603c351903b14bf9a6a70c439257199a640890b61d1
@@ -9406,6 +9836,7 @@ aSaCg/UmWGXbV6efe/c=
 
 
 Derive=KAS-ECC-CDH_P-521_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=006fe9de6fb8e672e7fd150fdc5e617fabb0d43906354ccfd224757c7276f7a1010091b17ed072074f8d10a5ec971eb35a5cb7076603b7bc38d432cbc059f80f9488
@@ -9441,6 +9872,7 @@ GbRwzfZz7B/Dk9NCbiA=
 
 
 Derive=KAS-ECC-CDH_P-521_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01e4e759ecedce1013baf73e6fcc0b92451d03bdd50489b78871c333114990c9ba6a9b2fc7b1a2d9a1794c1b60d9279af6f146f0bbfb0683140403bfa4ccdb524a29
@@ -9476,6 +9908,7 @@ chR3tIbp/0A3KXfD9lw=
 
 
 Derive=KAS-ECC-CDH_P-521_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0163c9191d651039a5fe985a0eea1eba018a40ab1937fcd2b61220820ee8f2302e9799f6edfc3f5174f369d672d377ea8954a8d0c8b851e81a56fda95212a6578f0e
@@ -9511,6 +9944,7 @@ YskWKWLn8OveyTaTXQ6qgT6CJtQNf2EZv9lAYCOAyGch5h2xgw9R4TnyEAALzsDY
 
 
 Derive=KAS-ECC-CDH_P-521_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=015d613e267a36342e0d125cdad643d80d97ed0600afb9e6b9545c9e64a98cc6da7c5aaa3a8da0bdd9dd3b97e9788218a80abafc106ef065c8f1c4e1119ef58d298b
@@ -9546,6 +9980,7 @@ N4o05cdLZyTE1ApxmSM=
 
 
 Derive=KAS-ECC-CDH_P-521_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=014d6082a3b5ced1ab8ca265a8106f302146c4acb8c30bb14a4c991e3c82a9731288bdb91e0e85bda313912d06384fc44f2153fb13506fa9cf43c9aab5750988c943
@@ -9581,6 +10016,7 @@ fgiD8MTrfq94J6YiBcw=
 
 
 Derive=KAS-ECC-CDH_P-521_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0020c00747cb8d492fd497e0fec54644bf027d418ab686381f109712a99cabe328b9743d2225836f9ad66e5d7fed1de247e0da92f60d5b31f9e47672e57f710598f4
@@ -9616,6 +10052,7 @@ c7UvBOShb8b1JHGHrss=
 
 
 Derive=KAS-ECC-CDH_P-521_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00c2bfafcd7fbd3e2fd1c750fdea61e70bd4787a7e68468c574ee99ebc47eedef064e8944a73bcb7913dbab5d93dca660d216c553622362794f7a2acc71022bdb16f
@@ -9651,6 +10088,7 @@ jO3E/cFGPadtzUttGkY=
 
 
 Derive=KAS-ECC-CDH_P-521_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_P-521_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01aaf24e5d47e4080c18c55ea35581cd8da30f1a079565045d2008d51b12d0abb4411cda7a0785b15d149ed301a3697062f42da237aa7f07e0af3fd00eb1800d9c41
@@ -9679,6 +10117,7 @@ JRuNoCHLrCgfEj969PrFs9u4
 
 
 Derive=KAS-ECC-CDH_K-163_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=04325bff38f1b0c83c27f554a6c972a80f14bc23bc
@@ -9707,6 +10146,7 @@ Qd+UCNkfDgId+PBSa4BjAxSV
 
 
 Derive=KAS-ECC-CDH_K-163_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=05f9ac3a3dd88429600958386c55bef4b1aa5f0c24
@@ -9735,6 +10175,7 @@ Hpwf6EUmgHaplYA6bUnNB1VU
 
 
 Derive=KAS-ECC-CDH_K-163_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=022e0290eda5d348894129f7455d1c766d32d5c2c2
@@ -9763,6 +10204,7 @@ HSWSovY5O26GxU35Cblf4NWo
 
 
 Derive=KAS-ECC-CDH_K-163_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=037f659f430009fcdae4e9f6e6316b0f5dbb268212
@@ -9791,6 +10233,7 @@ VyZnGDmNivZtKXF5hHji830o
 
 
 Derive=KAS-ECC-CDH_K-163_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00503bbb9b62f50ae7a8dfd74a1741826f09290651
@@ -9819,6 +10262,7 @@ YcvZ2hsjpgA94OX3xKBlpcK4
 
 
 Derive=KAS-ECC-CDH_K-163_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=012cf17799fdefa2940b18d56e80d44414c5b13884
@@ -9847,6 +10291,7 @@ lyq6yRvoWnCeugf10WIVrmAt
 
 
 Derive=KAS-ECC-CDH_K-163_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=062a2f926ab435ac14e05d44c27b46b6820b713aee
@@ -9875,6 +10320,7 @@ gdf8A8qL/fEYac6ijPoOX19k
 
 
 Derive=KAS-ECC-CDH_K-163_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0399b9294e895486bdefbaad7a729353ce09586357
@@ -9903,6 +10349,7 @@ lcOk6Kb+Ic0eTNTKOBLA1pKl
 
 
 Derive=KAS-ECC-CDH_K-163_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=022325a9a769a902c2e64c80a1d35429ced42ae0a4
@@ -9931,6 +10378,7 @@ YAqtyyX9QCTtPoRbK7+AcoDm
 
 
 Derive=KAS-ECC-CDH_K-163_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=051392d5377016358405030b48744003db66440a2d
@@ -9959,6 +10407,7 @@ Is4oyhViD3tAofJrQjTJVr3B
 
 
 Derive=KAS-ECC-CDH_K-163_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=045dac076e79de2fc631315465d3ef6245f26647e5
@@ -9987,6 +10436,7 @@ tFSvlCCoEfHhX3dNpa4aQLRZ
 
 
 Derive=KAS-ECC-CDH_K-163_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=014f7a46847ed6a7ff605b0e52c616e4ad3f0d5029
@@ -10015,6 +10465,7 @@ NABbV4zXp6aSm9P2zimUO17Z
 
 
 Derive=KAS-ECC-CDH_K-163_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00eacabc34555956995623e60482e5c118e34e2094
@@ -10043,6 +10494,7 @@ CQZ8DuLI9Vt+hNp6OR8Ir3UE
 
 
 Derive=KAS-ECC-CDH_K-163_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0414a622645107f115576f51cdf39d1393a2d7851f
@@ -10071,6 +10523,7 @@ d+GZwTLRisVBsRd0jSMZ23/l
 
 
 Derive=KAS-ECC-CDH_K-163_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=056be002daff11c4066e10acd046a85e170fa4c122
@@ -10099,6 +10552,7 @@ MEAwEAYHKoZIzj0CAQYFK4EEAAEDLAAEBD0l0t6Sk7hNNRozyxpS9ZMKTIt2A9JZ
 
 
 Derive=KAS-ECC-CDH_K-163_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=021fef8e473daeda8ef6bf07814d7b9b613e3076a3
@@ -10127,6 +10581,7 @@ PsKrOUL49q1gqVaVW1iQZrhW
 
 
 Derive=KAS-ECC-CDH_K-163_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03a287fd1cca68db47a3c74c12627fc3728568dd66
@@ -10155,6 +10610,7 @@ Z3xGpo6WSBGpzF5OU+px4jEp
 
 
 Derive=KAS-ECC-CDH_K-163_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=029558b41b8b92387bc22c868f51bb7acb6e4ee2e3
@@ -10183,6 +10639,7 @@ MoE5NkGlGNHc7/q+6LKb3hQC
 
 
 Derive=KAS-ECC-CDH_K-163_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0530020c8f6362312bfbe5c1c605b40dc2e032e81c
@@ -10211,6 +10668,7 @@ jZYqv+3uYuq0fDtFeaHlFoM2
 
 
 Derive=KAS-ECC-CDH_K-163_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0521673006a1d9608911d54536e122d809e919d804
@@ -10239,6 +10697,7 @@ ImKyfBhd3iayx31aT01Q3Jko
 
 
 Derive=KAS-ECC-CDH_K-163_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0460579beca16cccce314ff3040de4785336fc358c
@@ -10267,6 +10726,7 @@ ihdcl3aKn3K4JLmakfXPjj2W
 
 
 Derive=KAS-ECC-CDH_K-163_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=05ba66964483fe473ccbd00c37ad3ba40cc5969f62
@@ -10295,6 +10755,7 @@ x3zERImF0XlGNrwdWC89EBoz
 
 
 Derive=KAS-ECC-CDH_K-163_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0277c4a76e1613b2ede699a675c1645a786075009e
@@ -10323,6 +10784,7 @@ HMQYW2iiYOMbSwDAOkQD9lwl
 
 
 Derive=KAS-ECC-CDH_K-163_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03c6481dac387af39e8c09a553068ac496eea03691
@@ -10351,6 +10813,7 @@ jlKMqIewW9JWTfk775v2YNp4
 
 
 Derive=KAS-ECC-CDH_K-163_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-163_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=07b5d096d06d41c3ad6458cc93417e6facc99bc7b8
@@ -10379,6 +10842,7 @@ z3RqDyAvAMEwoavpK8TJd8gAd3mWzMULkN+ZGi6B3VFcGIWZ
 
 
 Derive=KAS-ECC-CDH_K-233_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00a822b141ca1f5ad32899e68c54d1fec3df8100df485ebf1c5868a9ac89
@@ -10407,6 +10871,7 @@ dWdDO9pFAGidTQAG66BU3Gn8wHhngPtfdNOYkhNQTi9uZmmA
 
 
 Derive=KAS-ECC-CDH_K-233_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01662682bec2dfae05e38587c8e6a4d18aef4cb3416989c47c11bbe2810f
@@ -10435,6 +10900,7 @@ U5A/s7+jAMzoMKUV1pCrmBSVea00gThIWeVl0H+mH1Dr1mmi
 
 
 Derive=KAS-ECC-CDH_K-233_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00215d511cb95e0e073ee999908a7a844afd75c9acb7a9d724f7fd322b01
@@ -10463,6 +10929,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABoDPgAEAI2ADTdnq/VzFpV1TuiCm4WP9OtgSkSK
 
 
 Derive=KAS-ECC-CDH_K-233_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01394e02c70104f2a5308b2d101b02c70ef2d13540602b8e8f82dc6d569f
@@ -10491,6 +10958,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABoDPgAEAUo+EhrdelJn9crSBLP0khUIR4ayP42U
 
 
 Derive=KAS-ECC-CDH_K-233_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=008556a4c3a8906ddbcb946099ca5dbe7bdb6cd8f37fbb50c96fcefed32d
@@ -10519,6 +10987,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABoDPgAEAIlmeIj4QlxaYjE0Yi8eqdmvNt+XcsQQ
 
 
 Derive=KAS-ECC-CDH_K-233_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=004ea6e0e34ec7c9bbad47f0f6f8ec0608e736d91e0e56cf3e5cffe8c370
@@ -10547,6 +11016,7 @@ jnpLg5nVAM2Y8nBMdJTm0gN150UoyPVvhn6d12MpgULqAXJL
 
 
 Derive=KAS-ECC-CDH_K-233_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0160d0b9b92a4acd089738fd489ae39734551e888fd05a020ce26498270a
@@ -10575,6 +11045,7 @@ eir11GKYAGxPJ6SbUaifbQlgFguluP7AjdLNS8kJpJCuvk97
 
 
 Derive=KAS-ECC-CDH_K-233_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0038381b342efaa70bb79adb76ceb775de5f45f863559ecaee1ddbbd0313
@@ -10603,6 +11074,7 @@ i7lKCNljAb6/Bn+FEm0RSTIWIWQgGxN0vxhAqhHV4lBjnQYI
 
 
 Derive=KAS-ECC-CDH_K-233_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0122169f1dff445ec663270375dfe914016c38ce6c2d40d0b8098abc60ac
@@ -10631,6 +11103,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABoDPgAEAHY+KGvlB0C3+L14+nC8rIgN89c3HrM/
 
 
 Derive=KAS-ECC-CDH_K-233_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0054d47c9d0a9fee258122326be25daf35f0ba0b8449e16b4623a8c0fd7e
@@ -10659,6 +11132,7 @@ BUyJTaVSAMNlBWNQVTUDPHpsRI1zv6CPuDcCNMf9usGzTaoi
 
 
 Derive=KAS-ECC-CDH_K-233_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0071aed39f5c44a7ff72db3e0f8284da39dfb2d894f278d2006f9d2686e3
@@ -10687,6 +11161,7 @@ l5aJ8f84AYwJY/8Oo3BIyfb0dkTyp8jFA4Y8J88h7m4KMiTq
 
 
 Derive=KAS-ECC-CDH_K-233_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01ca68ead4eddc8847a3a661cc6628e076bdd4b45047ece72245d094dd3b
@@ -10715,6 +11190,7 @@ jFm12Pv6AYG5WpZavRbsJDDCbdBxmE6FSpZ/8RTueDG9MUsq
 
 
 Derive=KAS-ECC-CDH_K-233_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=017a893b2e090780ff8daaf3588f9dfc0ac4dfe1f1e263697a9d1f398ab3
@@ -10743,6 +11219,7 @@ hlk1hdcZAe9lyvFXldFKC+icrHxoAyO8WYA7qHTLKWhnLLip
 
 
 Derive=KAS-ECC-CDH_K-233_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0041fa5fdf495b885699249b7746334b76c59e1c917bfc1ae371b96941f4
@@ -10771,6 +11248,7 @@ newpvIhiAWYiLvpdup6FjCRdu12maCOatbpyhhj7hakN3HYK
 
 
 Derive=KAS-ECC-CDH_K-233_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=015f5adba59d1ee01696cecce4b63e78e68508303ee496ff5abcea25ad3b
@@ -10799,6 +11277,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABoDPgAEAM9AKuvD5CR6mrQ9qXVRdqgQ4BH5/Zd9
 
 
 Derive=KAS-ECC-CDH_K-233_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=003d5c29b3753e89ce5064575393392b377ca657a0b73872c82165fc43ae
@@ -10827,6 +11306,7 @@ qI/wkhNtAV7XaXpLjJnQFHgo9shh/8nPsPM9zp0UsHMeHaJi
 
 
 Derive=KAS-ECC-CDH_K-233_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=007c01f906caa590898a09f46b6f5383658e7fee656aca0f111f22939960
@@ -10855,6 +11335,7 @@ Y4R0Sg8/AZ/0iq4MJS7ajTQLJcTdoBovIaqjXTm68DZpahEB
 
 
 Derive=KAS-ECC-CDH_K-233_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=019eece7d3fafc9274d361c6fafd9efd9ee485cbacb3baaf6834feb4df6a
@@ -10883,6 +11364,7 @@ cLSHPaeFAH8yHivE4pporCPHfO3Tu83gv3uSon/6dklpiJgd
 
 
 Derive=KAS-ECC-CDH_K-233_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01e4b7e89fb1b51179b8792f5cd581c3917e11246d3846f6344ee82eed66
@@ -10911,6 +11393,7 @@ bVhTJwyYABQ8i+21TbB9+PZwg8WaCqfNig76QvQv1i5ELgti
 
 
 Derive=KAS-ECC-CDH_K-233_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0145710c3ab0780ec233424d4e28b38d29f886965bbcac49fa300e1ed886
@@ -10939,6 +11422,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABoDPgAEAJnrkc2phiAQPDIF1kieaK1+V9ClHcUC
 
 
 Derive=KAS-ECC-CDH_K-233_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=006941a2a531083563dd886b06c0860770a4724bb04a4ebb2afb1ba2636b
@@ -10967,6 +11451,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABoDPgAEANzKoitDOR3AUll6470HxuXwIfOemHdW
 
 
 Derive=KAS-ECC-CDH_K-233_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=001d754ee5351d4582974734072abac23376e24348370934e7b864db0f52
@@ -10995,6 +11480,7 @@ cGzU8yy2AHZR4HQsDYPUtoVS6ber7DZEupdVz/5tTlaUOmub
 
 
 Derive=KAS-ECC-CDH_K-233_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=011346b83791e4bea7f6ba6b1265e5050895d84027c106f77353418f75d7
@@ -11023,6 +11509,7 @@ y0VzlmTFAX2P3nu8Vo/cgCo+NFXzzzVgLfcGhMis3aFloCZW
 
 
 Derive=KAS-ECC-CDH_K-233_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00b4938ed1ed012a9a53892ed9949397cdc4e4a612d54dcf80cdb039f47b
@@ -11051,6 +11538,7 @@ ZDKXz2lbAPOnRpVeEt0LcZGe2/I7IyLKsyjdCb34e8r9zSiE
 
 
 Derive=KAS-ECC-CDH_K-233_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-233_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01b3d2578bde3066a253db5322c85cf9487ce77b67ece955e281b0d7d0e7
@@ -11080,6 +11568,7 @@ OhS70JfgErVpTCKgBnWCW0AgLpW+fatagmFH4EuMUaCbADRXfB8x+MFqcMjhyFuJ
 
 
 Derive=KAS-ECC-CDH_K-283_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0745552817b5d729310b7dbebae687648714a9ae695dad20ca1ab6111c3d054670f21132
@@ -11109,6 +11598,7 @@ Iwm5lIe3Qtci6LelAhc2KAH9bS0oblzfN1zQrlabcAAFMS436ONbFZLvubXq9Hs6
 
 
 Derive=KAS-ECC-CDH_K-283_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=02eb0c1ceb6179232e91cff91fc8a30553c6ed7e0a71deb1bda0a10735a84593dd903636
@@ -11138,6 +11628,7 @@ XB1qKd6IYsTJntU6AyLllgafkWVoyiSM7Vfv6QU0r0qfkKT0D3l+RSlnAxcmv0HX
 
 
 Derive=KAS-ECC-CDH_K-283_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=04a9dd2cf5076814e5329c518c4f27b429dbe01d46682d476e7e78880de368b064236ba9
@@ -11167,6 +11658,7 @@ XK6pOb4z0WrJREXHB3EmMHkLBa4E2NfZ8jZdrprSTExhs+sgwKeYfmpMSw9ZjDcf
 
 
 Derive=KAS-ECC-CDH_K-283_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=044e2cd2bc164d21cf4b9833c0aa62ed059282e62b82f4500aeb422d17e1f6e7e8bbd500
@@ -11196,6 +11688,7 @@ tYjWo4XaZPWi9Gg4ArTLFYH54rN463pPZPWn1DILLKPTR0cm9nDDiDu42kfz10W+
 
 
 Derive=KAS-ECC-CDH_K-283_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=04d4f04d2fcf1bcd8150eaded90e467d3d38f753b6fb54eed8f9d29cd3dcc7be2c83de11
@@ -11225,6 +11718,7 @@ tUDyLJB2E/3MsMjaB9QGX5kMj8N9EA7OOPv1dM5ETcNzVeBwK4DR6xvdZwmX6PJx
 
 
 Derive=KAS-ECC-CDH_K-283_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01c343540541604f68ddbd63c483760d824ded5c18be7e56e6d36a9ac6d25772afb0a90a
@@ -11254,6 +11748,7 @@ TR5+MamuNlohgUFfBK+fLPklQuH/j/KPjnyOgJWE4kOkkClJp2WihJhsdQsbBsia
 
 
 Derive=KAS-ECC-CDH_K-283_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=05e38079815477b8a79096ce339c4a255f8b213be74715ea61ef7dd0c0b5f161d9de7521
@@ -11283,6 +11778,7 @@ MF4wEAYHKoZIzj0CAQYFK4EEABADSgAEBb/SiVouZjZtt6g3iMcrzkj3m1yVJKCK
 
 
 Derive=KAS-ECC-CDH_K-283_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0531ccf51d1096982f7c2ec513a92bf51c7ac5069cb15c5e2a053ceae7e5550908a19101
@@ -11312,6 +11808,7 @@ UdxS7U6MGk6gb4cCASLTdzsJNOkA+6fr/hrV7VvsD7Gp3c9O62HL7QQAdDE8CzFw
 
 
 Derive=KAS-ECC-CDH_K-283_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=06ffe79d2b7664ee2d8303ffe0ceca8c49a581fcdb49c4af6a060ff204eea74f4cf39cef
@@ -11341,6 +11838,7 @@ gXnpN6yGys2sUQlQAHzYdRZ/BqL7moGeLL2s78Fsrg7vLLsLLUm+rhCdt1PJUGFw
 
 
 Derive=KAS-ECC-CDH_K-283_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0311c430db78b6203e27b52988e1e9dae890c655dac4acefa7ee9612bec32e3e5f52be55
@@ -11370,6 +11868,7 @@ A6XikJ3jwzO9BqXhAapPQIRPJBPx/L3tADsdFcnx33VI3iorv3G1FmV62NjHfPct
 
 
 Derive=KAS-ECC-CDH_K-283_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0701d92ed8687138014b4379f1c34677e1744f6ae8c89958a5962f14408d587b95472db3
@@ -11399,6 +11898,7 @@ GYmyzNmTkbbGs6E9BU6pWiNPZYlxlbyXsD+m0kbqWrX0HaIsCO2BeqfASt83KYKz
 
 
 Derive=KAS-ECC-CDH_K-283_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=04f2301ed85a5c91c31a7fd125854904340a55e34976a20743bd33d95e476450f301ee62
@@ -11428,6 +11928,7 @@ mHJSmI2grJYnV3y+BCFehxUSnMdjAXkXAdxf4avNZytqoZukx+Uy7nqRPupg28nQ
 
 
 Derive=KAS-ECC-CDH_K-283_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0643900f337ed362815f181e0628ed5184dad3e66a1f030e947f116696312d835f7f6e7b
@@ -11457,6 +11958,7 @@ MF4wEAYHKoZIzj0CAQYFK4EEABADSgAEBbsgvqT9hdAWJonFUAVAAUCbbHEtNWpS
 
 
 Derive=KAS-ECC-CDH_K-283_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=063b1a3db331f91abd0af837db9d5f040620d1ddd7fccf8b58e0df43698351ea1942548e
@@ -11486,6 +11988,7 @@ MF4wEAYHKoZIzj0CAQYFK4EEABADSgAEAQo8okNbE1/+oIeSt/GbTuGBIHwpvhzh
 
 
 Derive=KAS-ECC-CDH_K-283_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0516da1d64bc4b25ce4763e6438257d62fb1ffdeae16d68701d63b603ad53e8587927669
@@ -11515,6 +12018,7 @@ AGtEaTXiN7/Mw5TYA7Zs5s8BUH1GLu7/9iEb1MVgcBFsaQdGj3x2/gEUC/DV+3t5
 
 
 Derive=KAS-ECC-CDH_K-283_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=049c68c333b96705eee4a3def0d568b0d4faf24df2fc2f1bf40da0af0946240c38e97f74
@@ -11544,6 +12048,7 @@ DMZcyAwShFCPSXibApY7NW8kNOwkm8tlie3k3jbOzTRQ5vXkd7/NwpraSu8PRaxT
 
 
 Derive=KAS-ECC-CDH_K-283_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=04dd44c1a30edac2e39a5bc9902625880a18516385c90a9cc6b94c4f111e0260863ccab2
@@ -11573,6 +12078,7 @@ j4rCbPswYp+M+wk+BrOiSypLB3dw05a78VSvQe7jUDVzpt6a/g9tGLAvyXYcoWQ9
 
 
 Derive=KAS-ECC-CDH_K-283_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0049c165339e9aeb2b516684b442921f1fef3091cf781e03fb3f56e93af1f3d6e500c81f
@@ -11602,6 +12108,7 @@ TXBJFTZ5C4dBzdNyAywP/72i+oY8udFcNlRQINW7JNkw2vL+pFVffCTWrvuywB2S
 
 
 Derive=KAS-ECC-CDH_K-283_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0645d7f4c5479baff5bc0cba654a3dcfda56c0e9d19f50f9d8d8c6357c09a140effbf223
@@ -11631,6 +12138,7 @@ MF4wEAYHKoZIzj0CAQYFK4EEABADSgAEAkq7FV5JEkKC6jLltURiGum1E6oEdto7
 
 
 Derive=KAS-ECC-CDH_K-283_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=028017c2a0240fd746ee72a0bcae1e53e05b7af254298094c381e735523854ea5fdd4f5c
@@ -11660,6 +12168,7 @@ H5FCBQZ9ZLGkyFMUAqq9uB/+0sABrLtNC3vlOTBOMuQx4C34sZKtdO0bSwYGv8kL
 
 
 Derive=KAS-ECC-CDH_K-283_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=02603c00998deba52db12814b1f77b2120cbc1dca59009c0d6ea40dcbcabca32c50380d8
@@ -11689,6 +12198,7 @@ HcDhLMOPdouD2v/uARLH1KN/7IQicaCoItN2N+btVRkHEwAa7+EbBvfh004A/N7L
 
 
 Derive=KAS-ECC-CDH_K-283_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=026a719bff31da4b4ebaed7bd043064f9c3930b5774c4a99809332c808aacba4b9e3733a
@@ -11718,6 +12228,7 @@ vlJetaagOxlmVxmpApaG+Ed/tcdp77CCyz8aDHnbVcsmTiESwOd557VY9wBFgWoQ
 
 
 Derive=KAS-ECC-CDH_K-283_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=048c48c993040619536f45482c494a39b32e75fe69e478ba06e376228b79eb83d3ff9168
@@ -11747,6 +12258,7 @@ Q94L62h3pUfD7dRYBCGzBR3TY5bSD/zXzzT8oCJRbdS/+sc/yZWunqgUzg5AJ/fG
 
 
 Derive=KAS-ECC-CDH_K-283_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=05d85b16bb2a0d32c73d1402838bdfa512d744fa88c74d3d90cf714c2480e03363d5c6ec
@@ -11776,6 +12288,7 @@ WgXdlCYrYDWW+L/xA+jjngjM5V4b7S3+DS+MFBsGQB26A37LOEdEkwyBeNFGQWMk
 
 
 Derive=KAS-ECC-CDH_K-283_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-283_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=066abb838b5f12b6fc15ceb745600686bc2d5773e53469c2ee920cfba5459a1cab20d153
@@ -11808,6 +12321,7 @@ iFQAfUsMS0zNaNUfr6dji75VXWC3Te8hfGpjxbQGj7c=
 
 
 Derive=KAS-ECC-CDH_K-409_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0176bc5c4036ce5125493a58dd265f04d190f028366f7799f70aedf29ac67b5b37c37238593377a47944f5b639f43856dbd560ec
@@ -11840,6 +12354,7 @@ PICqUQpu3/hSxinmBk3118YA/Zjljo6MZiu0uWyLqQU=
 
 
 Derive=KAS-ECC-CDH_K-409_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00575d9e7f70a4a1c5c807b6b5d6b7330bdd764db2aa60f3bfe497e6bfe90f038fb4f6acf7ac06efc3d157c3dc907b2ae093c6a2
@@ -11872,6 +12387,7 @@ ll2gsdKjzBbDHSVdzpiGk3styUHqsNi+i7zRWqbtltY=
 
 
 Derive=KAS-ECC-CDH_K-409_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00ce87aa5e7700384df59d3f1075d282c1aa511391c42ef609b8de1264eca8f7737df91565c73ee884ea882d47c56d979141f0f2
@@ -11904,6 +12420,7 @@ DUf9QE8S1XhJ2Dl81NLG0rS5D4ZEA9Ss0Woyt/9Id7Q=
 
 
 Derive=KAS-ECC-CDH_K-409_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00691dd6b5177702d6a0b1f8b07f3b018478680de7ee079272ff75659335c96afcea7650caa01f996aa37946b78e14a83e579fb4
@@ -11936,6 +12453,7 @@ GLx2g9IkC6aEds55AieAsvpU4PfHZSi3f6Yx/lq7W5U=
 
 
 Derive=KAS-ECC-CDH_K-409_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0136f5c04cf9a56db24ad99bd286feb800aea38d44f819be1c2a9dba15c635c4e122893570233a4c5754a41499eafa39a35aa57e
@@ -11968,6 +12486,7 @@ ad6OgYf6nD0bXdom8QtGnNSSXKN+CZRBV1fmiV5YgUU=
 
 
 Derive=KAS-ECC-CDH_K-409_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=004f684f9d559d16485f0023bf012006265ed81f06fbc1441334a559e5500a3f77603565013694023e0d8f44fd12dcf69eb8d654
@@ -12000,6 +12519,7 @@ lkY21QIWh8KFxH1A55/38LtWqTrFYL6Ny5cPWLI7EKc=
 
 
 Derive=KAS-ECC-CDH_K-409_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00137894f637460a63576824536944cddb42dfe63169c84040a0345ad7516ec4f1ad00bb4de20ea6ea43824b9b0f74dfa6881cfc
@@ -12032,6 +12552,7 @@ RW6UQWV0lccq12D7NIMl+Jt6VASiwhwqoHcRvPXzBBI=
 
 
 Derive=KAS-ECC-CDH_K-409_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00f03b0b43a351311689eb1d3fc457013f294a7d02ad850c72e4ff9b64ce68a47beb49bc5bcbdc828534f8c8a5e13de5fe522eb0
@@ -12064,6 +12585,7 @@ ndWRwC4gLKBAS7yfY5HXOuAR2smWUVXSZQE5/i5U7Gc=
 
 
 Derive=KAS-ECC-CDH_K-409_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=018f55b81f15f862aed042f37433050ac61718c9939d432b2a20e12d647f99753b8dd5127cf8963247fe7e1d5ade1442229bc646
@@ -12096,6 +12618,7 @@ dvgXiqYAaed6lIrPp00sd6doUWWamBlwVNqNRAC5jhNJf3dgcnEcQsGNv8jrjIUj
 
 
 Derive=KAS-ECC-CDH_K-409_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=002b560d1949297dc7e1bbe8ce49a595762924afcf0271e9c493c18ad5cbfcea5f3900c7b793ae5dd44f48884b0bc3b52c66e05a
@@ -12128,6 +12651,7 @@ GXkjZAlQXYz1jYHf08eT5ZVDp4AxTzzY7hdmTcLkY54=
 
 
 Derive=KAS-ECC-CDH_K-409_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=000b43cb539bb4bb42f195ffdbcdeb482b69301c0155a840cd381f55c465a8e57ec51d6555871537b56bf84a1544cae2b2b8eb38
@@ -12160,6 +12684,7 @@ ufmQNNAswPl3ap9sL5t9UB91vhhZmwiMTFiBxmFG5bk=
 
 
 Derive=KAS-ECC-CDH_K-409_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0113dd2cf8732ceb8a893e149f13d52026e5d829322d0f1233a624fd6b74d56e7e6374d70942a25152ce5073831660333fb3e070
@@ -12192,6 +12717,7 @@ MH4wEAYHKoZIzj0CAQYFK4EEACQDagAEAPVJxH3I6S/s04tXUIlYgORJ8eMavgux
 
 
 Derive=KAS-ECC-CDH_K-409_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00c8e62ac25c11e86b98642e4ec7adde9d9436f9337369fb065abc9ea784f90b8b8bebae35da92185486191dd9f49370b1148ce6
@@ -12224,6 +12750,7 @@ MH4wEAYHKoZIzj0CAQYFK4EEACQDagAEAEEeXUyW413ptUHaX6xpEzZGLIgtjozk
 
 
 Derive=KAS-ECC-CDH_K-409_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=012505746f1a40ef75f950595211ce04f87f1daffffdf8c12600a9e2994c8c1d8b19c0e0559adf9a94762cb983569de6d0d8baca
@@ -12256,6 +12783,7 @@ I4mwhm2zuH5cgCXnm7T0+Zb6Y1KrnLIBcu941v/KkG8=
 
 
 Derive=KAS-ECC-CDH_K-409_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=019a71ab576546e2351aa92b6075e8229813e6a2cb3647147b192b4597f1217223e7197d846c0d65ea0d4aa4c503bd000ba312ba
@@ -12288,6 +12816,7 @@ zmBHvZ+9QNiVMBlqRpOuWV1plWUDudKrSqvnyVihTGk=
 
 
 Derive=KAS-ECC-CDH_K-409_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=014f4b7ea93c9dd846d2228c2b6a8dfe616057232b7af845a570cb6cacf9feef2d8ef4fafb285b38e63cce0a09b4d82dbe43a390
@@ -12320,6 +12849,7 @@ QGlHgcDYsnweSUQrmbq5Pvlmb+oU1IQ+5LxbBFrFDBE=
 
 
 Derive=KAS-ECC-CDH_K-409_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=001fe2ed30ad4143c5eeb0b7622e6aa49e4e4d51c1ddc467b3fc54215dae931be0b6b6443e716895acb6570cdc21fcbdae46e5d6
@@ -12352,6 +12882,7 @@ yrV4G+CijScznpRw4WbH9oXy6pFDMQ3KGzq44cjmBZI=
 
 
 Derive=KAS-ECC-CDH_K-409_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01610efb48fd22261921f7484ed6382fceb6bdf28f3bc2340a175b7971b93ed5ff357ed55e5307bbf42e40a5b3fabdaed0ce19a2
@@ -12384,6 +12915,7 @@ lGzd/jfoVkO40XnKi5UpEG+cXzqVqIGSJfnX1Kcw/SI=
 
 
 Derive=KAS-ECC-CDH_K-409_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=008d990982aac8d5371b867de21e09064fef30e73321337dc24f19ad5ddb6c4ad217136b7c61e360a73fa7571d526c8f514a06d4
@@ -12416,6 +12948,7 @@ YuqNd3uc30Zcu1kQfnCZJxToy/rHYpbV7emcSNOKiXM=
 
 
 Derive=KAS-ECC-CDH_K-409_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0155dc98729c8c1bc65eb8a3ec09135f46bfa313bf56aa3169e312db8991abda338f8ac7a75bce42884068efb7e6e625939d2b88
@@ -12448,6 +12981,7 @@ zOgyxNZeJrrnq45fnHSz1CGlKOVZd4qye1mq4akW1Os=
 
 
 Derive=KAS-ECC-CDH_K-409_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0109e85c684d027a625ec5e6df952e2f20a14ed5b092d1b1b38435251303844d230fffc53d84b923555e1e1cbebe20b5d68c3bc6
@@ -12480,6 +13014,7 @@ wIsVwLSKesOe7QPg7pfhZM+qWrx3RBLL//lKnqKpY2o=
 
 
 Derive=KAS-ECC-CDH_K-409_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01ae814e02c4684c21dd7e58a65ec51ec68c37e59e299ce65608186c0acce08e41c8320b1941a611fe66b1921b558d7f402d0eb0
@@ -12512,6 +13047,7 @@ twrJXFjmIUa+tiu2aP1X+SA45Fhc3h+R7oxSUmr+sbU=
 
 
 Derive=KAS-ECC-CDH_K-409_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0140e7db3f6415d884822ccc7316a329dfed177b76c0117abd722feca889bee4e14e65d26c6cc935c0e94205f05fc1a7abfb0348
@@ -12544,6 +13080,7 @@ SpCaIX+zXeZliCM9re9wNv+dnyTro3cuL6MDe7rmPP4=
 
 
 Derive=KAS-ECC-CDH_K-409_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=002ec4deac3e83d60ad39969f2f93b49f31875831ecd51ea5c37ca48de081c0c8cc660edc53a222f3043447f9cb752763be7494a
@@ -12576,6 +13113,7 @@ hJleBotyRwOuCO1xoyszSYensx1sJjcVKRcyfTeszTM=
 
 
 Derive=KAS-ECC-CDH_K-409_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-409_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01c9cc05d19f96c4d233039cfbc43ab68d657bb507f46a353091fe98fc0f422a8e7593c195d326977a2be6bbd2cb44eb1fe81650
@@ -12611,6 +13149,7 @@ EReH5X0JAsDLEyoZCm5i85hRHAwsTNUNRXA=
 
 
 Derive=KAS-ECC-CDH_K-571_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=003198a6b5d6cce847e24348a6a6ceff7a89ed3794d7acedc4e858c80ad04a74dbc02c7038e05ab26b2a299ec92ee0d2c7e66a81872a5157fbc5d4d37ad598d6ddee995ed28a2d74
@@ -12646,6 +13185,7 @@ JmMCsewubiwjdbRksKUCxQU7WzSL0IF4xyxgMQXQRoGWpGldwmfW4QnxsSdEU7bv
 
 
 Derive=KAS-ECC-CDH_K-571_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00577147459262e5ad42f222827f20ed574b2118924205bcdbd339ce20cfb085d072fd70f4ca1f5768fafaeb5710f7ccbea4fc2ae5377b0cff20a889a2201739139bf788a9bf2d7d
@@ -12681,6 +13221,7 @@ IcoGLPca8KL441xNf5MSvTSoRqOA9j8NxylMGIdxAzV+INHw7v8xKpk96yoez8gK
 
 
 Derive=KAS-ECC-CDH_K-571_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=014662b261d0bc2168642bfa4f80c4b3fe8176f604ad3703f443ec7aaa3dcf3c5465b869a8fcea60b8f55ce7118806c5d28a04848bd961db0061209b59bc02979acce9324d7c0c31
@@ -12716,6 +13257,7 @@ OO+VPHT7KP19ik7Fo2MZzMRKGaqIIB3ay/g=
 
 
 Derive=KAS-ECC-CDH_K-571_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=051ec4db0622b7b1c798366453c70f959376ea3942aed2e931ff62a4019eb12ba5ff119214c8bfd8bdb66e62b562400f2d3d48a84b1b3baad3667f735ad4d0f183bdb91aaedcf1f1
@@ -12751,6 +13293,7 @@ uhWA3HTidR18zZGMRrS+aHWk5MKQ2VnCPBI=
 
 
 Derive=KAS-ECC-CDH_K-571_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=05b355eb5c47d8027b6c5301d2463b99c636db207792e2975ab1a53c1cbb131280288432a79a3b47271d6a2bd777298baf8a675f66be9dc72c3588d299df8b52e7840322b43c2071
@@ -12786,6 +13329,7 @@ MrZc/0enma9PfIY44tf4WUjEPxBTTJgMy2I=
 
 
 Derive=KAS-ECC-CDH_K-571_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=052bd78bf1326c6d91840a351d4874d36b147139882356c595b8607f9998773092a99adf70adeed19e122d4d2fec16285f000161145135d96355cba039a96335e7716724c249f88b
@@ -12821,6 +13365,7 @@ ns11isTQhNTI14IZ9vrZTTQa132szau1Sis=
 
 
 Derive=KAS-ECC-CDH_K-571_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0226c28e5a6bc735935f9df2c1b02d096d4dee41ffb95a67905aab8de1b2d8c66e2bb471293091438d3f05df7e48003e58a958b72f839f7f2e2c54287fa3cadcd41a2542ae4ec03a
@@ -12856,6 +13401,7 @@ JGNdrMvX/DDSByB5e8KRNixVsCSssr3PPVk=
 
 
 Derive=KAS-ECC-CDH_K-571_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=051a3deb052d3e99bb6ab6c6b284db2c998e9bee543e02e57f1b13fe9fafbfe53a89658c58eb947dbd178aea2f6cb28e305c9867bd65bb26f71793f90c984ca11113e1a8dbc8f7d1
@@ -12891,6 +13437,7 @@ tgpuU3qHU4DSW8R8e/I2TdaKZvIdD1eGakI=
 
 
 Derive=KAS-ECC-CDH_K-571_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00697c751ddbca7034fb4d3fc1b2618daf78cdae464e8332d1215020c8f896f4864c7a6f2c61a363f730f58fd3bdb4f78a90b40aeb83b4fbc1d8d37cf6a27a6f722c68a82979fa16
@@ -12926,6 +13473,7 @@ ITS8BB9mki/MTjk44MbTAutCIAZ4qXE58pE=
 
 
 Derive=KAS-ECC-CDH_K-571_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0322517da30e010aeaa2ec9bad2745d8e67f906294ecd6b1d16808be3837f79070d0e1bbbd617f4b8b031d3b51ea2acc59de408a130138c78571f8800fa907caf550d23323d1c818
@@ -12961,6 +13509,7 @@ M3jOO8grAH9t5PfLltrfVaTIc0o385pcLyU=
 
 
 Derive=KAS-ECC-CDH_K-571_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=000911ec1cf82a22c849b401dfe56453a06f4af32644ea8b63135b68a979236d05968eeadca7f0cd339d295cc58967a7f38cfad6e947a71295733e42ca3c1ba9b4ff6195607bb530
@@ -12996,6 +13545,7 @@ SnQHPh/t9i6MgSg2IrU+ss2ye2TDwd142gyQ3Ww8d2rRRjAuQ6ulQTebyPO93C4Z
 
 
 Derive=KAS-ECC-CDH_K-571_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0724c979affb3ab8d307529759bae5fa67319d441851e5817fef014350e3014e068428c9dac395c5e7b9e5b8877457b3e4625ef49ede4ae3626755eefc3fb3cf09c23e8a5a9f8c25
@@ -13031,6 +13581,7 @@ g+v443loVzY6jgT4dCoJ1+yhY4bWD9fIWN8=
 
 
 Derive=KAS-ECC-CDH_K-571_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=005a526588a3a2ce08b20925e83987eb0a1e68f997102df7f9af83823ac8e06abbd29c04cb1f974ba9c9ac49b48b5af37679a39b532d359cdec3d41b3f80a1ee12c80276256b738d
@@ -13066,6 +13617,7 @@ j7pN9nq2ojm335lyJjBLcxZdli9OHS0Y3p8=
 
 
 Derive=KAS-ECC-CDH_K-571_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=049db68dc9fb4cfbad8247ca4fe7c573c0640abead8f319194d665ecaf4f04b61f84f5df0d8a6386f6df04ca1a685a7394567eba5deb9f739b1e623ed6507021593f0e22e2dfc3f6
@@ -13101,6 +13653,7 @@ m5IFcRkIW8fLICPSP4gQFCD59Qjw25T4377dXL6IzsgKnccI32zM34FddbFGKA18
 
 
 Derive=KAS-ECC-CDH_K-571_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0343c45daab4f91e02ef9bd6e1cd157b00ab0ab0a3e0d9734918a1d896cdf7cc1212bf74d7bb9bf96bd4abf42df325756c407217f44a5950c2b66af820692742ed7ebe14e48d2d88
@@ -13136,6 +13689,7 @@ tIy98S65gm1o/SzxcdTWHD8nXUSUfU30x1I=
 
 
 Derive=KAS-ECC-CDH_K-571_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=04a565cb3e15236a7f6c413afeb419c082427b10a6d07ff87e81740716433c06b3254414381e4ff9860340dd6201ab6621d162cd12047a5515ab1d65f20c97eb3d7132642f8ad58a
@@ -13171,6 +13725,7 @@ HgFAevSrmJ/B0Sc7qKGCxGGFbV7/5wXX3+U=
 
 
 Derive=KAS-ECC-CDH_K-571_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=047265831f1f589b5f30806e2fb80aa7844cbf32b6993384beaac7d992b327b97dfd0bb89ca09e711507e846ed4ad003e7115fa8843b23d38f320e43b5eb506bde48fbd7af4983b9
@@ -13206,6 +13761,7 @@ LSvddaH7TFeWpMVpZKo+Q/PaJsc37dnLCRA=
 
 
 Derive=KAS-ECC-CDH_K-571_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=059b62c25c96955b8fb4deddcf90ebe6845ee71ea357739273d6d67f21a0c47d154add9d5d4d2b657fe1988ad614b0b4902faa92fe999abd754ad33cd6b92fe2f6a68a6f2c1eeb27
@@ -13241,6 +13797,7 @@ KykFJchoJYO1X37OxZuSCEb3XRHQIen/sgAYY59quTAiRywZLTmOFQzcYwoR/PlC
 
 
 Derive=KAS-ECC-CDH_K-571_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=02777c72853b76b29f69d3aa27a1659789a025af0633d833b22b57bf328d231ebd128bf96a4c8a7ffd2ee7a51e5ebb7a8e5bca20e4ad49671a2123dfbc0d6c40594e04765186de06
@@ -13276,6 +13833,7 @@ InIH1mSfPZHnv1+N5hG9lxgYEG3y43k1u0ZM2edGlinGrn5/KyJAJ2yw7tt6JtDH
 
 
 Derive=KAS-ECC-CDH_K-571_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=02c2ec1632e83416182a9a438f7360b88061bab84f5bded3dd8a0c87baf44507df94fdcf99353b107e61cfcfc8af071b3aa8cec7b34a542bf2ab8ea0bd9db67d66b428c9a6c14458
@@ -13311,6 +13869,7 @@ T7TQh6gWuFRE2IK+wqwl5C/eeOvMp5pv3fA=
 
 
 Derive=KAS-ECC-CDH_K-571_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=07e1d202a54d34020939f7aed56931f21b206761e4fc79b9a7b320f81077be322ae7809446b5b3ea701618ecdb0a1796ab80407a281bdbcb4d580131b61f8743bfef7a4d9c5941f1
@@ -13346,6 +13905,7 @@ yqRtIhB/1t9TEItT/gu5a8l0wDqMZSj5eS0=
 
 
 Derive=KAS-ECC-CDH_K-571_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=07f49ee5d822b17e3f1ec9946fad8d0a0a6b327242afe675806b3e6b7541745e21cd1b70df926af057a9f8deae4cb9a1edc782014426152e8aa4cf6a4080dad4678dc8ff0d9e1af9
@@ -13381,6 +13941,7 @@ a6gSNaTcZzgjf879OBK3q0NskmxQxgDm6Qc=
 
 
 Derive=KAS-ECC-CDH_K-571_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=058cd5608dd9d64d4d822baeca123358a4d7e56d3777ecdf569a149c2f85ed35479eaeaababd0b026dc3b56aedafedfc8491040413f85b669d8512a3ef7bc8fe8706b5c7585370aa
@@ -13416,6 +13977,7 @@ Anh7FosfofS2dJZFQGxDj40xbWcPHg2LAwE=
 
 
 Derive=KAS-ECC-CDH_K-571_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03bf7a59bbdd688682c45664d20c19cb2d24fcca6772120cbeed1cde762d449ebf22855627eb6b2be6e7f7c0f0034d02686f2a4488549f8cb198e02b46972bcb88914bea66dd6400
@@ -13451,6 +14013,7 @@ doXKrRXTvCcOQ0Iq2HTnHkCKcabIqQ0q2Xg=
 
 
 Derive=KAS-ECC-CDH_K-571_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_K-571_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=06d410e9ba6b8b87b00d0f676de8ba27f6afe7e308c2e992f318fc14cba0a447316ad86e8e6c1d3345d8e4035735232c2c597e760b8800a89a521567b09408f9c7be279c137c963f
@@ -13479,6 +14042,7 @@ lhVBhEpKozdpp7znEPZkClYM
 
 
 Derive=KAS-ECC-CDH_B-163_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0100fb42d177ffe6c31378e2e04e0da7376ffe8765
@@ -13507,6 +14071,7 @@ i7dJm/iV93+PyDAdbhx6n2GR
 
 
 Derive=KAS-ECC-CDH_B-163_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0681c9e59eb7eba769f5b6f2b06ddf1efd12997995
@@ -13535,6 +14100,7 @@ P07ccUsNC6pb/F2LxqwECJ3k
 
 
 Derive=KAS-ECC-CDH_B-163_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01e0749a21fc508f76dade85435bbbe12c448bd8c4
@@ -13563,6 +14129,7 @@ knq1eWlhIwlVdayUmwen0dS8
 
 
 Derive=KAS-ECC-CDH_B-163_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0320398f7acf791e0d602d7b94742cce58e9fddbac
@@ -13591,6 +14158,7 @@ MEAwEAYHKoZIzj0CAQYFK4EEAA8DLAAEA4DbPfKxwBVKjoyzBK7NWB018xXNBxU0
 
 
 Derive=KAS-ECC-CDH_B-163_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03e4de43de85223d818e5be6549c29cdfa1afe1782
@@ -13619,6 +14187,7 @@ TOwQVyhS4fYZIi4vXsTg+lqm
 
 
 Derive=KAS-ECC-CDH_B-163_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=037b178aab014d5abab305e37deed7f4798cdb862c
@@ -13647,6 +14216,7 @@ yPJknC3c2cJLZDQzsU2QfFkD
 
 
 Derive=KAS-ECC-CDH_B-163_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00958b2aaa6061222dd248a6b9700fb6839dacdc99
@@ -13675,6 +14245,7 @@ EHqJpzYM0uIXU01t8pjMS8RY
 
 
 Derive=KAS-ECC-CDH_B-163_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0393387e1dab35748f20d506a0e2b4dc0ee6c3ff39
@@ -13703,6 +14274,7 @@ vbfBMnyZszgg2+GK4RT7Q1lJ
 
 
 Derive=KAS-ECC-CDH_B-163_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0212358d3f8bce69b662447333b3edbbc9b2f7e805
@@ -13731,6 +14303,7 @@ YrbdHTFt7b0PHVML7W5VazrY
 
 
 Derive=KAS-ECC-CDH_B-163_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=023472fa59846f7be07cf060cdd69a9fbb27d4fe44
@@ -13759,6 +14332,7 @@ MEAwEAYHKoZIzj0CAQYFK4EEAA8DLAAEB5P0sxFy7uZvJ2nrMF0DtcP3z/+LAfPs
 
 
 Derive=KAS-ECC-CDH_B-163_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0173a056c4c9ef6707cd23928999c4680f42b71f7c
@@ -13787,6 +14361,7 @@ adFKzIMzUzqIwuiCSGOkeuAn
 
 
 Derive=KAS-ECC-CDH_B-163_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03d34f411a297d7c990fa4a83b5f54759607f9d33f
@@ -13815,6 +14390,7 @@ t79Aie8CzQpd0Phr2HmKRMVs
 
 
 Derive=KAS-ECC-CDH_B-163_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=06120aed8d4c1e506710e2cfb98ca2022e642ca89f
@@ -13871,6 +14447,7 @@ f1Qmo0Eacn7dwpo+wilVg2jR
 
 
 Derive=KAS-ECC-CDH_B-163_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03da9c0879219e48c3df56174898fab9ee5b0a6bcd
@@ -13899,6 +14476,7 @@ H2kTkU/+FVnHwRTGMbtrKWF+
 
 
 Derive=KAS-ECC-CDH_B-163_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=05b33fe3874d32aed99919265cc0074902e538fe54
@@ -13927,6 +14505,7 @@ MEAwEAYHKoZIzj0CAQYFK4EEAA8DLAAEA1Pi2kWrfEkwKAw+20upABLVbfYvAmkx
 
 
 Derive=KAS-ECC-CDH_B-163_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=053dbce9826af4d290036feb46875e975b7848a9c4
@@ -13955,6 +14534,7 @@ mDvsayiJyCEb8jEUm1vrzHXg
 
 
 Derive=KAS-ECC-CDH_B-163_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00d49b971cab937f40908913fe259849679ca076d9
@@ -13983,6 +14563,7 @@ lT982scdBS5VhVdGtD1EGBuR
 
 
 Derive=KAS-ECC-CDH_B-163_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0483ad0b7f8a716273f624b8979c19126705266e4b
@@ -14011,6 +14592,7 @@ tlFDgyuc79XZzmnsTbLt0Geq
 
 
 Derive=KAS-ECC-CDH_B-163_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00f69dcb547119fc9b8c454335aab184c3ada5f1c6
@@ -14039,6 +14621,7 @@ VoalOMJaAr6pL0IYQCG16iWT
 
 
 Derive=KAS-ECC-CDH_B-163_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01bc5ee5261b2bba55b10cbaa6cc3c97b98d00ffea
@@ -14067,6 +14650,7 @@ MEAwEAYHKoZIzj0CAQYFK4EEAA8DLAAEB3L0LScqBX3g/5Jsn5RgXGZ10hUmBgLn
 
 
 Derive=KAS-ECC-CDH_B-163_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=008574d838d3de87965fc1b4343fe4f078588c4ea1
@@ -14095,6 +14679,7 @@ LT9jjUl45MpYylpO8ZxezOqN
 
 
 Derive=KAS-ECC-CDH_B-163_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=04579b477a92ed961cfdb2014407e88e7716452a4b
@@ -14123,6 +14708,7 @@ K92ZC9eeY+c1shKCrhtepmZI
 
 
 Derive=KAS-ECC-CDH_B-163_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=035a8c10e64403c52ef8d17c5f4dead0df81fb1f21
@@ -14151,6 +14737,7 @@ L7KsJETpKHVONlX9YuOkJWTo
 
 
 Derive=KAS-ECC-CDH_B-163_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-163_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=000142615e3607ac148c4de8f334be849235d01cdb
@@ -14179,6 +14766,7 @@ DpDw9oaiASp59lIyMIohyYwBVVzK/H3OFcj+0wJadgy9bCMn
 
 
 Derive=KAS-ECC-CDH_B-233_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00e9f3d8c4f1bec0f920e763ea1bb7415899f01734609e7547dc425ec946
@@ -14207,6 +14795,7 @@ vGTkeiKtAMvYuV+J5CESi8c6Q8XMJU44ZwlquJ14iy7TuQqW
 
 
 Derive=KAS-ECC-CDH_B-233_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00f1fbecfadb158d62eb1109c085124fad67a8795b58815eb396c95db4b9
@@ -14235,6 +14824,7 @@ HT0bI1KWAISXFSGHqLOylYodCi7s/0SSJRgHy/0D1fJoW8o3
 
 
 Derive=KAS-ECC-CDH_B-233_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=019ea831c51d88a7cf754495a1c474082ed481c8eb83190a77defb09d479
@@ -14263,6 +14853,7 @@ MmXz65ZXAbCUtIAvOXZj0OaC+r8clMTiFOSDJ7le78uSt3H9
 
 
 Derive=KAS-ECC-CDH_B-233_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00088425fb04c2ce408f08d81385a322703a077bf00ba0791e4e79b80419
@@ -14291,6 +14882,7 @@ L9CdtAJ+AHA5Htqnbw45cDlMrAM4BhBYhYw8c9XLUS5TJjBP
 
 
 Derive=KAS-ECC-CDH_B-233_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=019b5efb23bc18a4f18c22fe2fd5cdbd02372cabde5e5c9f4b4f9a49438f
@@ -14319,6 +14911,7 @@ S2BkJTmpAFGO48GuVGQE3x7M1pqmhWQx0ciIHPBXjP9OuMEb
 
 
 Derive=KAS-ECC-CDH_B-233_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01f36d9519c3d47f030eeac3338db583b96fefa551a4b56cc5567f2d9d7a
@@ -14347,6 +14940,7 @@ YqDue8V0Aa6jysID+MeAR1omCbKXDMhvlupAEcNI2oJiszSq
 
 
 Derive=KAS-ECC-CDH_B-233_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00e54b1c916ff3ba1aa0b2b99f0ebde4f1a4cc6a10d959bb2f7f4c777b84
@@ -14375,6 +14969,7 @@ ApqdO5QpALdnF0opILYvHwL6eQl4RdUdk+DIEEQQgxot1Vw8
 
 
 Derive=KAS-ECC-CDH_B-233_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00bc0dcf7585753cc79aa412d2740b4b2d1c644fc9755cb0550286bcf68e
@@ -14403,6 +14998,7 @@ UkhvCVWGAHNx4ogUX8JaWpy18qOGA08vMoxuqiTIsJboqx8M
 
 
 Derive=KAS-ECC-CDH_B-233_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01b7ef3148be331115321b1c2a68832fdfb991b26224a60dddce3e060d27
@@ -14431,6 +15027,7 @@ tgofelHlAC4vtnLXK/ePfP7cQNNybGtPtYVBfHR2tlXjK707
 
 
 Derive=KAS-ECC-CDH_B-233_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0041249865c913b287a253150b207e2682efd96057cb0709e9bbb48c0fc9
@@ -14459,6 +15056,7 @@ CTFiC6mWASjQC3dYmaWKWbyyq3nWCeLc2pjmUju2cWhVT4Tm
 
 
 Derive=KAS-ECC-CDH_B-233_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01cf480fbc2be2c2c4448c88890972c7ff9cbe08a75e26c3809596b8b5c0
@@ -14487,6 +15085,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABsDPgAEATV25wDzY2f7dBhC8jGInzaCKqspM8JF
 
 
 Derive=KAS-ECC-CDH_B-233_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01ce8abf3c8ccfa30e5f35ddb75f5e106aab1e67086156a1ededa1717b77
@@ -14515,6 +15114,7 @@ wb89+ZpTAZrxExvkfeCIcINdoUlG/tcwNBefgJKY0BSbFt02
 
 
 Derive=KAS-ECC-CDH_B-233_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0025df759a20312361b9f6767efe8e8d69979e34639469a91fed9fce04f8
@@ -14543,6 +15143,7 @@ dHD8zHkfAV3piINdaBLwvdcAeolZceGgb00izhMDyfVe/mR8
 
 
 Derive=KAS-ECC-CDH_B-233_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00437ab4a53756ff678a1f580c0fd1f33b23021d62060808453b4aabe627
@@ -14571,6 +15172,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABsDPgAEAQUTYgruDQR4hyQ46Zsj6kkAFT+TZusX
 
 
 Derive=KAS-ECC-CDH_B-233_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01ebd55823c57d1fc7b36cf1ed2051ead64db6d114014d3407186f50d957
@@ -14599,6 +15201,7 @@ HT1Emy/vAZMXVM5c9Vehwazt/l6aewuR+BZD2oWGpoZYhfBC
 
 
 Derive=KAS-ECC-CDH_B-233_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=006d07f6e08b11a060ccec43b07ca7d9eaf6c3ece06f4785519284bf6f0a
@@ -14627,6 +15230,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABsDPgAEAEhFzmYbHq40wWmfG/443IfvKLiwp3cf
 
 
 Derive=KAS-ECC-CDH_B-233_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00aea594f092b4052f7564b2e5651bcf43ef7e336a064d6bfb1a89cf5e51
@@ -14655,6 +15259,7 @@ GqgDoDKiAezfw5QLfQYYzWMVRBdR9mPfdNNWSS75NLS6KyrR
 
 
 Derive=KAS-ECC-CDH_B-233_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0099d6d076e14ccfee15ed7e7ef384bfee12deba8c9ae8f6cca3486a1494
@@ -14683,6 +15288,7 @@ XqfSXIZ8ANligeB1benapV0u9lc7sv4t0Jtx2RGRpaBDuuDz
 
 
 Derive=KAS-ECC-CDH_B-233_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01b1e977c43afd203132c085b95db0e2046a4b6ac2c046ee9ad665050578
@@ -14711,6 +15317,7 @@ DHG8n089AV/sgQzbF5/NHOjk3BokmeQN6KSkmpQg8A5WEQz0
 
 
 Derive=KAS-ECC-CDH_B-233_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=000e4cb704355cba1b40cee3da102cb048519a91b4c789b3757cfdd933aa
@@ -14739,6 +15346,7 @@ BYldeRr8AU9haYOtCOdFMVxHZ7CuIab9imKcJYznrvpMF6jg
 
 
 Derive=KAS-ECC-CDH_B-233_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00d8c13bc5e819c6101daef3f6fb5be6bccecf233c4b7fc65054e8e8d3bc
@@ -14767,6 +15375,7 @@ qWvD6ellANGz0ONdYX4J4HjFcaX0HqIt/REtZ6lNjfu6Zump
 
 
 Derive=KAS-ECC-CDH_B-233_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0129af50fa085133771753f297a313bba0d2f5882e7634b7ef5adce760ff
@@ -14795,6 +15404,7 @@ QIFZLdb2AWJ3rrPhysASGwfZN4o6DLxlZ7SEI5KeNtyFXp0a
 
 
 Derive=KAS-ECC-CDH_B-233_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0077c4ea1095fadc4cb4190a3fd530c7d15325e5d79b8e8a2b708e2344cf
@@ -14823,6 +15433,7 @@ MFIwEAYHKoZIzj0CAQYFK4EEABsDPgAEAV9yPamjjC2lBiwX0Lg3Ui98aceT95wX
 
 
 Derive=KAS-ECC-CDH_B-233_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00d9eb3c79cf442595dad03ed4a38daf358b97d5dfc01cb61ff200a47958
@@ -14851,6 +15462,7 @@ ll0n0qxwAMd4Tu+InEccnSaz4N4krStL+Lu6b+GPUaQSGIBY
 
 
 Derive=KAS-ECC-CDH_B-233_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-233_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0124c19cffc0b9549bfa378a548e8ce11ee7fca28d2d898de49ae1f2ff61
@@ -14880,6 +15492,7 @@ fRpiyck+pNH/MA4TAmUTL3tMZLdLkXntDy4hH0Mo1iVAUCL1VBcNqTK4D998GqsS
 
 
 Derive=KAS-ECC-CDH_B-283_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=065194e26090e74047ee75f13f9769d20e1b52189650011e283daa090732cc53755dc366
@@ -14909,6 +15522,7 @@ ZEgW3LhEOCyUTMIfAp0oD01MDF/XD34kCVlQEovqPK48pG9qX3C3Of4amQJogE44
 
 
 Derive=KAS-ECC-CDH_B-283_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=075c535cc70de19c92d7314afa2f33200903431f6990ad40ac31dadaf4e492a799b75b05
@@ -14938,6 +15552,7 @@ dC7g8CfMtBV6KKIjBZhut/EJqh+FVuuivciOSRO2Xv+5ROrmOWNsun4B3DcYvLNh
 
 
 Derive=KAS-ECC-CDH_B-283_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=02956f63d48a49a330e2068955cc2886dbfd5bf72a81b10ed83f2d758dd315eca172927d
@@ -14967,6 +15582,7 @@ MF4wEAYHKoZIzj0CAQYFK4EEABEDSgAEBzsJKipNfJoXu4jnW0Cp5OQ7mYE89haC
 
 
 Derive=KAS-ECC-CDH_B-283_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=068a3f6938c44b797524377508585842c6a7f1af5ffe9131dd3ff786ae56e1739345d3d7
@@ -14996,6 +15612,7 @@ c/v0sclX+Mu9kRO8Ah/79i+yUx2znvLQvc4NnBQckunNymJ8qjm1k/xKAhDo7kgf
 
 
 Derive=KAS-ECC-CDH_B-283_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=019b48d5eeaeb05b58801ae8f345ad9bacb91daac885e506949b849ebc67bcbfa308aab7
@@ -15025,6 +15642,7 @@ E0w94BTNx2A1NHzAAzQdgHSfGl7J96xiUjhP79OLbyu83Bj+vobBYPXnjAA/Bm4G
 
 
 Derive=KAS-ECC-CDH_B-283_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=061b3bef1766460f6296ed47d39ebf5a710d202d2b7e7cac0f0d3b235405eece99aa30d7
@@ -15054,6 +15672,7 @@ vnSeIXr8ThunnnYPAr9RxE+DYcMFTK1kD5JEb+OCCwY89LsiyhfAonT9RvUFBPvs
 
 
 Derive=KAS-ECC-CDH_B-283_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=055d579458860a3dd92ac6570847632f04460755c22a4c432cf4dde9611d2ce1608ca185
@@ -15083,6 +15702,7 @@ JrcbMqwGwLrmtMuiAelzP6nSmWEmlCDbJO3A1a4oXXjJrhSzixAZ8TZS8ZAnfcR/
 
 
 Derive=KAS-ECC-CDH_B-283_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=054fa7c6c84fb89e5892d9194540860ea31ae2b6e37a86971344230ea512a3f6c0569216
@@ -15112,6 +15732,7 @@ ch81gOBiZf9TihlLBrdkwf92mFSWuURRt1bE8w/fxjjYmQMSu+zL+9c+jFqFWtt1
 
 
 Derive=KAS-ECC-CDH_B-283_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0353ff03afda3772984aadc4000e1275656607154b06c3a59c664945fa6fde1c255ffa86
@@ -15141,6 +15762,7 @@ awijCIvMUO4yA+JjBYFbV5/13sb6yXe6cIizM79MAjHaAhh07gDXH+JdP01QpXrD
 
 
 Derive=KAS-ECC-CDH_B-283_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=050795ba093d2e02398c358951f20c9e3b4f60628a96a4d0c46cb8fc0005e5331b38a09a
@@ -15170,6 +15792,7 @@ dU0LFRNhFX+BJFkwBzA02kFnl9qVo4Nu7yex+icfWaQ0hI6YC60v3VP/0eNm/2kX
 
 
 Derive=KAS-ECC-CDH_B-283_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=02ab08d63cdb4be2502558e67eab27570f2d029e7f981d153b973080585d01e42f7187d9
@@ -15199,6 +15822,7 @@ l7wf63zKMQAi4iE9B767bA4EbVr9v6h+qYyn9V6c27BV0MxUm0RY1pmL27NFF3OI
 
 
 Derive=KAS-ECC-CDH_B-283_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0599757e3ffeb484b32d3b47828b6823d46786d35477082ceacf3a5a11552394fe58f53b
@@ -15228,6 +15852,7 @@ r16vB1MoCWaraTeQABs50dhytl4xJRwfWE5P4+111TrZDoNv6QyNuU/nfO8LynIE
 
 
 Derive=KAS-ECC-CDH_B-283_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=005e331af55e96153d8a7b906a4a19016a26381977b49f80b9d70db099053c6a3b8e80d5
@@ -15257,6 +15882,7 @@ O53qDozv2garwyyPBY3Ezxv5hdG1ZpcIR8umuKT0DH5ipYCLByC7uM3ztFMeOAvn
 
 
 Derive=KAS-ECC-CDH_B-283_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=07e132ea71a16c7cc261b9d6ff6fc52cc490da616b07d92f9e591fc1e630d3442572338f
@@ -15286,6 +15912,7 @@ QsDGUmO0dpgeXzFXBEvKaT6dOxp/pq1C2382saZXEtCe87txXiZAoYL0NmIGhsCk
 
 
 Derive=KAS-ECC-CDH_B-283_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=010f26817098ce1bbd6743784d6fb65e60699c14933a2c8d854027aa58b58db9e66a53a7
@@ -15315,6 +15942,7 @@ MF4wEAYHKoZIzj0CAQYFK4EEABEDSgAEAW60u7PDhuD0L7A3vuR4xMDb++Vcxo4z
 
 
 Derive=KAS-ECC-CDH_B-283_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00bdd8ccd1b40c5bc2efc1c105999350fefaf784710914ff639582f1277678699491140c
@@ -15344,6 +15972,7 @@ hhDi1dfdozdaYH+bBRM5ONyZFE0W6nUlw/5OMuMg7QdbllJ+E7KpnJ8nrenvnty2
 
 
 Derive=KAS-ECC-CDH_B-283_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=014a83e747c90aec6101c0a752d92eef7475b00051ecad3d7c2e50cf4eba1ef3c80b8c94
@@ -15373,6 +16002,7 @@ vh3SBd+TCrHJG7H4AMLiHhIGzUu1tiKr6Xyj8lLLxo0FSnf466utWT+xhjMGkov3
 
 
 Derive=KAS-ECC-CDH_B-283_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00afd29e352779a39021536ea50c24fa264c599f8f8fe8f2ccf0615a6547a064d7c1a150
@@ -15402,6 +16032,7 @@ Ho9YV6EgvonXdlPpBzfMBJaQ+XCCSnsMICJDloLJ2C9PI+SOXwf+qWJnyjvU1zCl
 
 
 Derive=KAS-ECC-CDH_B-283_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0477990f17d65589289c28e54a56a83bc05ef4ea6863c5ebe840925c9fbef64ccd6e69a4
@@ -15431,6 +16062,7 @@ Fb+ySySCgedaPGWUBE7unHArxMHiEMfMIUUkWSVorA+f1n1uoCtNw++0LPuyJj2s
 
 
 Derive=KAS-ECC-CDH_B-283_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=067a661346fe052ca27f3f03e75bbdfc8fe6d0d85c62c8f79525252aa241ae9de97d56c3
@@ -15460,6 +16092,7 @@ CnN/BxiWCG2gsUzZB9HLDOGcmKY6r3sxTx9XIOMohwUzhKwPXrabbEcajj09Fudv
 
 
 Derive=KAS-ECC-CDH_B-283_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=06476b0620eef165941a4507e6d798d6f150ab29333c0552281b629170d3291b2f9b3f41
@@ -15489,6 +16122,7 @@ UtWY/h0o/IkbMbSHAbjcZxPKRT6RsuxOTR+DSwjuvH6IhsOkWOcJJSQsSyK/CyBT
 
 
 Derive=KAS-ECC-CDH_B-283_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0746719f2ad08f8a8d6d6fbf15723f336285ce75d3a2fcbd5a0c54c577517a22bc264161
@@ -15518,6 +16152,7 @@ lejerX+ga1eDl/HxAX6iL2tUdPD18PTq1UFyBkBRU40+IypTDfyl8qDcZ3Rsi7Ha
 
 
 Derive=KAS-ECC-CDH_B-283_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03cda4b5f44b5d3dc248310f994419fbcbd665115d1876046652251ad4aeeb1dcf184288
@@ -15547,6 +16182,7 @@ yuN63YTaeuctwweOAN1ji/kFP61qpP8tMwuKSiC/4wIPQLlpIwLQsKPC2HeFbsRq
 
 
 Derive=KAS-ECC-CDH_B-283_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=015c892f95768a96ab5a4f9523b7fd466e101f63b88ad8f1fecb3027cd70aa00735dcc90
@@ -15576,6 +16212,7 @@ MF4wEAYHKoZIzj0CAQYFK4EEABEDSgAEANCO04VqvvfUpiJDyS1uZwzrOvMjV/25
 
 
 Derive=KAS-ECC-CDH_B-283_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-283_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01adf5a96358e18d69fd383b4dc7b20dd646b68a5c9f1417bcf426240ca22b8f32bdf1a4
@@ -15608,6 +16245,7 @@ KNCO02/mQKr4WqAPte3VkFo4s8eWG3cit3uNy0S7JfU=
 
 
 Derive=KAS-ECC-CDH_B-409_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01d48a586be9285fa38dd3e70b0330b0ffebd327ceefef88fdc1521ef2fd61cbc9124e03b0c926e70fa56acb3edb54c3c48fab2b
@@ -15640,6 +16278,7 @@ CO1IL9auEDdDExynFgJrFqHkliMfmRzcj220R/X5X44=
 
 
 Derive=KAS-ECC-CDH_B-409_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01856c92b46d671d8a7f6cc468efb60a61093d006c95bb931c1fccc336d4a8490fe17fe163c972bac39fe728f24534a0c34d2d21
@@ -15672,6 +16311,7 @@ UO1oA88FRkt0paHeIhE+I8AYxc7ZGG3bmBxini6ds+4=
 
 
 Derive=KAS-ECC-CDH_B-409_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01972e225e08b47512e92c0da9a1bdddb1802be402222cac5788b322e101feeb06b66b2fe726c1cd8aec92e02f37d15f4c97e64d
@@ -15704,6 +16344,7 @@ oX5bmbLZCWG1Spn+1Tq6S9oaQHStPSP5yREgV5W1RQs=
 
 
 Derive=KAS-ECC-CDH_B-409_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00b6661a866abbf1843dea8f220e360fe7cd7d9e85c316138fd2532a57d7d2a6bfe6e5518019c603a2d0e338ac6a8690093c2883
@@ -15736,6 +16377,7 @@ qkOAX7UoAfc74+mzKAiYSq677Xvl455RM1sN/zR4KUg=
 
 
 Derive=KAS-ECC-CDH_B-409_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=010889037c707d90b833d03256ff2e8a5ffce16fb3613486221494a4fee82e74625a93d966c2028d0930115494f9456cec4d2b6d
@@ -15768,6 +16410,7 @@ K6yPGjYujG1jWN+VkwYAQn38HrFBGP0SObZ7aQFbqH+YEUzsiyy0W7o9zwBrKH4H
 
 
 Derive=KAS-ECC-CDH_B-409_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=010a8aafbb243fc9466bf381eae173c01be95d88a9c131b07ed54d2f117cd3af4019ffb196ebe8290b1269622f9df26763ffa211
@@ -15800,6 +16443,7 @@ n+jQUVug8NPc0Z8Ywi2jkJ8C14c1qhGy/roPjTMMVwM=
 
 
 Derive=KAS-ECC-CDH_B-409_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01e17b8844c4c757553a628d6f4c48f3a337ed2bbb6e4047dbfcfbfd02bb81c6e096f8ccbb7f2e5d10ee9cbcc960e3a99e79bd09
@@ -15832,6 +16476,7 @@ Qlf+cDviUp9u/7bymaGiUcAeONQ8pspXbvHgvrbJEh4=
 
 
 Derive=KAS-ECC-CDH_B-409_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01167edf7a3c50e13be126eb2caf6b5f8f761cc8dba413246423b877df74a3aa3f48144b44cd133ad9f2d05ef97a08f7ca511d7f
@@ -15864,6 +16509,7 @@ yxhAfcQvY5EvomZyCAA6stKBAq3PuT3cBTdg5Twtqng=
 
 
 Derive=KAS-ECC-CDH_B-409_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=015c0d202bfdee2dfbd4be91625171992e6c6b1a1d06cc1b2b66ed64c9d928bd4f062912900d3f89045c7190f513d3b019a634f5
@@ -15896,6 +16542,7 @@ MH4wEAYHKoZIzj0CAQYFK4EEACUDagAEAQwnNTD1T+F0u71cJ3GlWkLmQFDDvyUj
 
 
 Derive=KAS-ECC-CDH_B-409_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=007c32383aae80e1111207894c8cc5be66fe538af4a19195742a94a4c3f5c765d9776a56177c485ddb53c038b70478959d374627
@@ -15928,6 +16575,7 @@ PF1bJj/wNvAj8P9fci0FbCSkEfU7NH0HhthPe+h5EFo=
 
 
 Derive=KAS-ECC-CDH_B-409_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01166107ab98db1dbe22c5888a70c992af4faf4623ef593802aedfe433809c53ef4ab0b2dc4dc2546488b356ef3265356055d8f5
@@ -15960,6 +16608,7 @@ sCdwKZTHT1uBgSTTShkJh/1liJL8meesuYd71v6UaRk=
 
 
 Derive=KAS-ECC-CDH_B-409_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=007e7a249094eb52bee0115b8bd5545f81bf0b7d66998fe124c9a3dd3c5715d03b2f973d47c19af5108a2ae005fcca65e61f337d
@@ -15992,6 +16641,7 @@ EZxXPD90FBC7fBytEHbDukKu0c5p1WIosIL7beDu+2g=
 
 
 Derive=KAS-ECC-CDH_B-409_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00b9d8b68642b2729340d8b7c5ed3b3a8913c4a3f6b947473017c0e105bc7edc60daa9b0732772220f93eca4878085f756e3adad
@@ -16024,6 +16674,7 @@ pF20LuC5JkoFTBaoe+2tRcDZoPNbvGqnoSlWIug+vos=
 
 
 Derive=KAS-ECC-CDH_B-409_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=017d60394c7ee64ba73db91484713370daa821255807349c237e5849411bf0bab3a1b353be3cd07eeddc5c2ffc74336225dae6f7
@@ -16056,6 +16707,7 @@ gyzysmHfrVhWEoBC+0phqRo3s0HeQpbUv2O/Z6NFinQ=
 
 
 Derive=KAS-ECC-CDH_B-409_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=00b19e052edd44421ee2f5ba845911fed9183d885da85d51dc819ca565ce574f7db257509876377b40c5a08349019563b60e13e9
@@ -16088,6 +16740,7 @@ uHGXAFlpaynvkN2EYXdrNDoJyFOlOOTyL9+FT8vztzQ=
 
 
 Derive=KAS-ECC-CDH_B-409_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01697512676ae56ff5ab778c411042d217ad24a24ea05bbc253e4395fecc8a07fe77ae0ca4ed977459f1a14d9b83931bccf46107
@@ -16120,6 +16773,7 @@ H9CH2vwH3WcOLOclVH4aJhxD+8VOFMNHPr27Mf2oRzo=
 
 
 Derive=KAS-ECC-CDH_B-409_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=015960ea8b92bd77d52874e3ea82ed1763440189d68728d3974d4c01d6aafdbb5274648f6f3eaa4faf3fc72d09892ab038cb2fb7
@@ -16152,6 +16806,7 @@ sjpNHXnSfI08RECyyEK8HiH2kk4U3IMbCr+4RQAMc9VoewSQzMB/ZUEBrN2zbNDC
 
 
 Derive=KAS-ECC-CDH_B-409_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01127491ff33a67ffc4757416cd02a081cafb723aff52af35b069b89963e8e3ef5bc19c5a093ccf511e3c3c19be789280e986809
@@ -16184,6 +16839,7 @@ izvo5XqxE3cPX+DGIwD0oJ+iiZ5zu8mCMmX1XVz0rhg=
 
 
 Derive=KAS-ECC-CDH_B-409_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=01254508553eab09fbc2fafe13fa9b324d9217d7d0ba4cedbe5dc869ad68de4f87774dd17d6428ed242c71956f252969e6bd5837
@@ -16216,6 +16872,7 @@ jUIuyQ+Uwr3ShM2/i+5kL3C9e+LakGue27ws0QBDB4+RIRApChPZAWDw5xWC+jnA
 
 
 Derive=KAS-ECC-CDH_B-409_C19
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C19-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=004b9accc21d7122835fc21410ed1d83767c47a54ffee5f0c180fc55f3d0e8484af3ad38020294be92f02f0ba7e2b4f4eb1db07f
@@ -16248,6 +16905,7 @@ g9TopOyPhZLvUjlfJMES1ZQtOuCP/o2Znv3jmYiKfPM=
 
 
 Derive=KAS-ECC-CDH_B-409_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0093e2581c159d74d11f8667ee03399208b5c1a4ee5b20070ce8d97d251ef1236dc81dd688b2f07a730e6b8aeca0c193a28b178f
@@ -16280,6 +16938,7 @@ y8PhL5cG86sFQpktjbbI2Lsl+gYU1Ib20ayfPZi57f4=
 
 
 Derive=KAS-ECC-CDH_B-409_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=008e2f1c4bad19c46a5134afccf7f4ec14ab591c8b8ea48d9c3d1e7354ab43ba20aa39a65fd92cdc176cf3dedecbf9da49a8d855
@@ -16312,6 +16971,7 @@ FmfEFWA0Ann84JYqIb2LtS+iPbcahPNaV5TvXgdZct0=
 
 
 Derive=KAS-ECC-CDH_B-409_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0190a1693eebe287ec980236d8762804d23fdb6f222763a0efc364f9280fdd53394c2badcc51ff09557f3b97cae7f70d790bf9df
@@ -16344,6 +17004,7 @@ NDZUJGo3/jpg196YfmqaEKrwY9lrEBhGEszSZAfX4D4=
 
 
 Derive=KAS-ECC-CDH_B-409_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=001469dabcf2210aa7de0040b201221eb4d1a4725431fb5a93212a66ddea4187e078f5e3d82606f6cdfc0ffe6b69574d1d0ba643
@@ -16376,6 +17037,7 @@ Nr7Fa8a0T5KGv56Z+sl/NWcIzQMQ2/Yzj5r417E1kQI=
 
 
 Derive=KAS-ECC-CDH_B-409_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-409_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=005c701a93d7790322aa7c67440fdd9ee8057a0dae86d1e856ae89e7893da178bd67777f86db2be5c8e31dc50ed8a440aabc342d
@@ -16411,6 +17073,7 @@ WotRa8UDgoFjcJ1NrLWU0nehWpLAZOV3DRs=
 
 
 Derive=KAS-ECC-CDH_B-571_C0
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C0-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=06775e1b99a236e02b020bc73666e5751c1210dcb6e9b02a69f4075376e49f7a1476d2209e861abb73f5e3ad189d268e035b1de93d47b3a64de5783c9a09bc223e1cc612f26dcdf1
@@ -16446,6 +17109,7 @@ MIGnMBAGByqGSM49AgEGBSuBBAAnA4GSAAQFdcuwWfQjMJ+ZO2wGrHHXvMXR5qGa
 
 
 Derive=KAS-ECC-CDH_B-571_C1
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C1-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03a80ea8cfecb858f9b77bdb46b6cda26320ee8c561a2fd6b7e0a2b62201fbfe60f577780c75a98a11a69de4c4ee911930d2200b6972bc3123d7f278615ecc65984a59fe352a1cec
@@ -16481,6 +17145,7 @@ li1lq8VNXeot1yxVRZB0AHT3xmxLjf0wdWE=
 
 
 Derive=KAS-ECC-CDH_B-571_C2
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C2-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03edea7e47ded7c2ab1115f4ebcbb42677c7fba6e0cfd811602896251ada1d5a0b461aaf4e000f4d4231b96d8dee7630d9f1b7860e6418dac8c3b07b66af6fd1acdb44b2683b29b4
@@ -16516,6 +17181,7 @@ w9ttmC9FtpK+oRzyXRiso8g77IQMdYKnBi0=
 
 
 Derive=KAS-ECC-CDH_B-571_C3
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C3-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=005b640015330f8416f2bbbf8b5660e01a7abba8b0197a29e52bb535d62f89ad0443e08b6e0d1d15f4eb03c0fe35e3e43bd7739cb692092698a2cd13126cee4432831ec7423b3434
@@ -16551,6 +17217,7 @@ hjtvzEifk3oFpf2UbWKCUyign4Ony6J/6l4=
 
 
 Derive=KAS-ECC-CDH_B-571_C4
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C4-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=027af05ecd0332784d64b0b1bdb45c310fd445c5a6d6b34f35f4eaa3fa3e171ab98763d243a1dedf46aa29864620a47d05eeaefd748186bcbcf187c01e7ce36e2a53ded071036b59
@@ -16586,6 +17253,7 @@ YkrK2yGbIHGI0OlFy8Z8mCBo0yYT/CH4sPQ=
 
 
 Derive=KAS-ECC-CDH_B-571_C5
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C5-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0763c0d659a7c080912005a2afd60ce57e610619b388ef3d5dd3c9386ab12069c6ef3a8e72eb741cba2da5c6f9267f6c09fada6459690ed4e432445d6f0f72dbcb059c87df36f665
@@ -16621,6 +17289,7 @@ rnOkibt/gc3KaxuxZ8eUwm1iOKDSVq/DuiE=
 
 
 Derive=KAS-ECC-CDH_B-571_C6
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C6-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0428413f2d2aad4d5288885c2edc8b976321ae1dd4fc6b41275fb88b8c5e7776165effce79025163538a0e83c919220a407ead6cefd616b4b05294488c2ef5d30ab8caa55ccbd1b1
@@ -16656,6 +17325,7 @@ ruF4vW/hXsGW+x9ifYcHk5T294VOBTIo3uU=
 
 
 Derive=KAS-ECC-CDH_B-571_C7
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C7-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=031bd2a84369e93dfa00581446d52762100d985cc7bb91c4fa8be7472e2e8e9781c52b19a54330442441bacae23f4bdc76486eb475d51f26aafbfb272a5ab5db184a4d3c3006e5d1
@@ -16691,6 +17361,7 @@ ENtDeYGiqhJuuarzx74FqA+sFJXhxAyhwQY=
 
 
 Derive=KAS-ECC-CDH_B-571_C8
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C8-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=04df20154fa49a1d6e04dc2ba6e55a7f2ae575de5e2c6e4091a4d2c36aa93ca9699b890f0ee4df53aa75d0d9babad68605bc027ec67c187a6826aac0f4bc596baae788b376110216
@@ -16726,6 +17397,7 @@ Tms887kScYsWks2YMBl0GiVBgkI0vcjDI/k=
 
 
 Derive=KAS-ECC-CDH_B-571_C9
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C9-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=037a380f525590582658e2dd272a32de67fc0cf5390b37f4d33c1359f075d4461ea38a55027317892a3d1d22f5ea333ad437667d2f3eb8781c39504036ae33e4b0a26b6894722f0b
@@ -16761,6 +17433,7 @@ mnCYgqU3KvVuoLNoFzhfu/6sS5BgaeU/v7o=
 
 
 Derive=KAS-ECC-CDH_B-571_C10
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C10-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0420de313bddce87d07321e3f0af404d9d13e5369b79506e807178711153c9b1837cd055562eff3aadfc5954a221eeebb1bec1696d3df1cccfb8b61172a50d83cee95f4140ba070b
@@ -16796,6 +17469,7 @@ jHAFS5fZUrGfdChW2s9OUN8MMQO68lP03mWj2crOY/6CkG0sjoozEvtTXgD5tcpp
 
 
 Derive=KAS-ECC-CDH_B-571_C11
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C11-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=0606228f5a05077aeefbefac23c0d5bac7a6062bfc2b02ce8bba6698ea96b456b1f0d32c6e05dbb9be61a83090428eedea18c74f41238edede9e3a12e28722d2f314613c2e84d6db
@@ -16831,6 +17505,7 @@ XYZLnKxGvqbpbfKxvkSTrPlQIk1xc3+ZBlg=
 
 
 Derive=KAS-ECC-CDH_B-571_C12
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C12-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=052669336019db5eddef5eab2336abeb60bbc7295e4bb663ab43e373fb6d888d7433ec89a487a91d4a59c289a9509ddd1bab33cd02a7bf37aaad78dbedf0b4ae5f2f35d15cb4e628
@@ -16866,6 +17541,7 @@ N+eEnyKP3BoHqimL4myncfR6xP6ycj1aZmY=
 
 
 Derive=KAS-ECC-CDH_B-571_C13
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C13-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=062de5aa98b440c6cb7a1428f6b5e47452b30454eec4d651982b531121febbd5a3833b180017f7ddb5ce38d7bb1c842de1a8a8fc7fc981e24733b7662813fd010a4e757ca4ea5c28
@@ -16901,6 +17577,7 @@ VjlKZi7xHIIU6K2oXfGxewuXQUzdZi0Yi10=
 
 
 Derive=KAS-ECC-CDH_B-571_C14
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C14-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=07c7eb4892816cc3388ebcdfb412984e05910c112dd15b8e5481719401701aceba22fcf35aab0c3b040096161011f6177097c505395d9d6d8a713f6a5100fb476adbe7b9cdf4b68b
@@ -16936,6 +17613,7 @@ mtlTxxHjMNx79V7fKfCVyuRVV7fI1YQ9ib0=
 
 
 Derive=KAS-ECC-CDH_B-571_C15
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C15-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=05c638349000ec30881cd190c067e7f12b6b42d5842a8285a8ff0dc7e9c9eaf483309e48314fdc2ce7f9da6a468e549c8e70a50b68d07aee29708a98172209e5cd2e8c09cb66d982
@@ -16971,6 +17649,7 @@ iELVyPWQN1pDZWkYqoDlWwKFNHzOj/4fFeg=
 
 
 Derive=KAS-ECC-CDH_B-571_C16
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C16-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=007a40a59b6632156a43158565a4eeaf80618e501c5ac5afdab4ce3cb76ac99a0bcd17e9eec549373ace8c96aac78e2af6600483a2c49ec81298a083d5237118de96a953999beb26
@@ -17006,6 +17685,7 @@ aMwklYrcUuKkxAc1ZRTz6nFmBW3Gfk0Rj6g=
 
 
 Derive=KAS-ECC-CDH_B-571_C17
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C17-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=021fd2726973405fc30d2a1f2115907cbd0de90bb6bcb0496452e389b1b10ccf38e2400617040cf0dbb188f345337678b0ad8603dcfe926582d4321f384daec0943e2cd267f48343
@@ -17041,6 +17721,7 @@ WImpWg8v3DXTD8YcxVYKKRQjLWKtNjhrkXk=
 
 
 Derive=KAS-ECC-CDH_B-571_C18
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C18-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=07a47bdc7d54ecd391672f131b3214d0efc4d40195db1ec993a62fe9da875efff5403bd708fa491a01a94f4bddc7d516baffff9fbdd213ca1a4905f9aa679d65da25c0f1fd2afb0a
@@ -17111,6 +17792,7 @@ faiyk8aENZPdIhyJv5eWNna9BE6MirjnF60=
 
 
 Derive=KAS-ECC-CDH_B-571_C20
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C20-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=059052d3e1c66efa4b7dd39e74299e886367d8fe49d7cab90e4f051bec10316438fb29b1290dfdaec169decd622a1010cf0a0275008814f4861b4d83ba78515a8768d978be430011
@@ -17146,6 +17828,7 @@ i+kBdzRtdsp7xxM9DsKArPBmAFxcwQtSqmVDNf6CCmYX5WDicJA/8cLMivE5jyTf
 
 
 Derive=KAS-ECC-CDH_B-571_C21
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C21-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=03acfa4b3d1c2a6b62af23bdff6a215a416d4437ce6cc114d17dc4201195987a5d7301da11b913254702d7172e31d64e59b24deaa3270f20445e51dc484f7a2b8c3cbeb0bb9efb28
@@ -17181,6 +17864,7 @@ tdubCxjYPPnrwbGq8k9DZ+xTNoTOnVZYLUM=
 
 
 Derive=KAS-ECC-CDH_B-571_C22
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C22-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=067a58e5b3287bb9aa83ed9ca2d718cf7165fb574b6a446c3019849cd1584673d561b574bc8f68419437c5e8113e060847cad3b5ddc2f67ad75bc1e3f04554e63a5e4945cfcb65f5
@@ -17216,6 +17900,7 @@ QrqIcXicgujzrTz2AG9DvEx9QQIDLEP495c=
 
 
 Derive=KAS-ECC-CDH_B-571_C23
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C23-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=06b272ca3330c0cdfbe60a1746bc0ddea6257536cdd8e976f2517eb541460a3f0e6ea7fec2b495e0f57712c8cac35e8a7d64d876c29851bbfeb6fe726d57e0be43dc76a584ef9c93
@@ -17251,6 +17936,7 @@ nzq7jSys1bLuK2g5nqxOj2XOvdZjAP0Em1s=
 
 
 Derive=KAS-ECC-CDH_B-571_C24
+Availablein = default
 PeerKey=KAS-ECC-CDH_B-571_C24-Peer-PUBLIC
 Ctrl=ecdh_cofactor_mode:1
 SharedSecret=02da266a269bdc8d8b2a0c6bb5762f102fc801c8d5394a9271539136bd81d4b69cfbb7525cd0a983fb7f7e9deec583b8f8e574c6184b2d79831ec770649e484dc006fa35b0bffd0b
@@ -17281,6 +17967,7 @@ PrivPubKeyPair = ALICE_cf_sect283k1:ALICE_cf_sect283k1_PUB
 
 # ECDH Alice with Bob peer
 Derive=ALICE_cf_sect283k1
+Availablein = default
 PeerKey=BOB_cf_sect283k1_PUB
 Ctrl=ecdh_cofactor_mode:1
 Result = DERIVE_ERROR
@@ -17396,22 +18083,26 @@ Result = KEYPAIR_MISMATCH
 Title = DigestSign and DigestVerify
 
 DigestSign = SHA1
+Availablein = default
 Key = RSA-2048
 Input = "Hello World"
 Output = 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
 
 DigestSign = SHA256
+Availablein = default
 Key = RSA-2048
 Input = "Hello World"
 Output = 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
 
 DigestSign = SHA256
+Availablein = default
 Key = RSA-2048
 Input = "Hello "
 Input = "World"
 Output = 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
 
 DigestSign = SHA256
+Availablein = default
 Key = RSA-2048
 Input = "Hello "
 Input = "World"
@@ -17420,12 +18111,14 @@ Ctrl = rsa_pss_saltlen:0
 Output = 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
 
 DigestVerify = SHA256
+Availablein = default
 Key = RSA-2048-PUBLIC
 Input = "Hello "
 Input = "World"
 Output = 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
 
 DigestVerify = SHA256
+Availablein = default
 Key = RSA-2048-PUBLIC
 Input = "Hello"
 Input = "World"
@@ -17433,22 +18126,26 @@ Output = ba8c24b86f18633767ed1778ef12d283a508d0bef32dd50b4a67cbd6b75df0f4ef6e69b
 Result = VERIFY_ERROR
 
 DigestVerify = SHA256
+Availablein = default
 Key = P-256-PUBLIC
 Input = "Hello World"
 Output = 3046022100e7515177ec3817b77a4a94066ab3070817b7aa9d44a8a09f040da250116e8972022100ba59b0f631258e59a9026be5d84f60685f4cf22b9165a0c2736d5c21c8ec1862
 
 # Invalid digest
 DigestVerify = MD5
+Availablein = default
 Key = P-256-PUBLIC
 Result = DIGESTVERIFYINIT_ERROR
 
 # Oneshot tests
 OneShotDigestVerify = SHA256
+Availablein = default
 Key = P-256-PUBLIC
 Input = "Hello World"
 Output = 3046022100e7515177ec3817b77a4a94066ab3070817b7aa9d44a8a09f040da250116e8972022100ba59b0f631258e59a9026be5d84f60685f4cf22b9165a0c2736d5c21c8ec1862
 
 OneShotDigestSign = SHA1
+Availablein = default
 Key = RSA-2048
 Input = "Hello World"
 Output = 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
@@ -17515,6 +18212,7 @@ PrivPubKeyPair = ED25519-1:ED25519-1-PUBLIC
 PrivPubKeyPair = ED25519-1-Raw:ED25519-1-PUBLIC-Raw
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED25519-1
 Input = ""
 Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821590a33bacc61e39701cf9b46bd25bf5f0595bbe24655141438e7a100b
@@ -17522,6 +18220,7 @@ Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821
 PrivPubKeyPair = ED25519-2:ED25519-2-PUBLIC
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED25519-2
 Input = 72
 Output = 92a009a9f0d4cab8720e820b5f642540a2b27b5416503f8fb3762223ebdb69da085ac1e43e15996e458f3613d0f11d8c387b2eaeb4302aeeb00d291612bb0c00
@@ -17536,6 +18235,7 @@ Output = 6291d657deec24024827e69c3abe01a30ce548a284743a445e3680d7db5ac3ac18ff9b5
 PrivPubKeyPair = ED25519-4:ED25519-4-PUBLIC
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED25519-4
 Input = 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
 Output = 0aab4c900501b3e24d7cdf4663326a3a87df5e4843b2cbdb67cbf6e460fec350aa5371b1508f9f4528ecea23c436d94b5e8fcd4f681e30a6ac00a9704a188a03
@@ -17543,18 +18243,21 @@ Output = 0aab4c900501b3e24d7cdf4663326a3a87df5e4843b2cbdb67cbf6e460fec350aa5371b
 PrivPubKeyPair = ED25519-5:ED25519-5-PUBLIC
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED25519-5
 Input = ddaf35a193617abacc417349ae20413112e6fa4e89a97ea20a9eeee64b55d39a2192992a274fc1a836ba3c23a3feebbd454d4423643ce80e2a9ac94fa54ca49f
 Output = dc2a4459e7369633a52b1bf277839a00201009a3efbf3ecb69bea2186c26b58909351fc9ac90b3ecfdfbc7c66431e0303dca179c138ac17ad9bef1177331a704
 
 # Verify test
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED25519-1-PUBLIC
 Input = ""
 Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821590a33bacc61e39701cf9b46bd25bf5f0595bbe24655141438e7a100b
 
 # Corrupted input
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED25519-1-PUBLIC
 Input = "bad"
 Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821590a33bacc61e39701cf9b46bd25bf5f0595bbe24655141438e7a100b
@@ -17562,6 +18265,7 @@ Result = VERIFY_ERROR
 
 # Corrupted signature
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED25519-1-PUBLIC
 Input = ""
 Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821590a33bacc61e39701cf9b46bd25bf5f0595bbe24655141438e7a100c
@@ -17572,28 +18276,33 @@ Result = KEYPAIR_MISMATCH
 
 # Make sure update calls return an error
 DigestSign = NULL
+Availablein = default
 Key = ED25519-1
 Input = "Test"
 Result = DIGESTUPDATE_ERROR
 
 DigestVerify = NULL
+Availablein = default
 Key = ED25519-1-PUBLIC
 Input = "Test"
 Result = DIGESTUPDATE_ERROR
 
 # Attempt to set invalid digest
 DigestSign = SHA256
+Availablein = default
 Key = ED25519-1
 Result = DIGESTSIGNINIT_ERROR
 
 # Raw tests
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED25519-1-Raw
 Input = ""
 Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821590a33bacc61e39701cf9b46bd25bf5f0595bbe24655141438e7a100b
 
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED25519-1-PUBLIC-Raw
 Input = ""
 Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821590a33bacc61e39701cf9b46bd25bf5f0595bbe24655141438e7a100b
@@ -17601,6 +18310,7 @@ Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901555fb8821
 #Signature maleability test.
 #Same as the verify operation above but with the order added to s
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED25519-1-PUBLIC-Raw
 Input = ""
 Output = e5564300c360ac729086e2cc806e828a84877f1eb8e5d974d873e065224901554c8c7872aa064e049dbb3013fbf29380d25bf5f0595bbe24655141438e7a101b
@@ -17710,71 +18420,90 @@ PrivateKeyRaw=ED448-1-Raw:ED448:6c82a562cb808d10d632be89c8513ebf6c929f34ddfa8c9f
 PublicKeyRaw=ED448-1-PUBLIC-Raw:ED448:5fd7449b59b461fd2ce787ec616ad46a1da1342485a70e1f8a0ea75d80e96778edf124769b46c7061bd6783df1e50f6cd1fa1abeafe8256180
 
 PrivPubKeyPair = ED448-1:ED448-1-PUBLIC
+Availablein = default
 
 PrivPubKeyPair = ED448-2:ED448-2-PUBLIC
+Availablein = default
 
 PrivPubKeyPair = ED448-3:ED448-3-PUBLIC
+Availablein = default
 
 PrivPubKeyPair = ED448-4:ED448-4-PUBLIC
+Availablein = default
 
 PrivPubKeyPair = ED448-5:ED448-5-PUBLIC
+Availablein = default
 
 PrivPubKeyPair = ED448-6:ED448-6-PUBLIC
+Availablein = default
 
 PrivPubKeyPair = ED448-7:ED448-7-PUBLIC
+Availablein = default
 
 PrivPubKeyPair = ED448-8:ED448-8-PUBLIC
+Availablein = default
 
 PrivPubKeyPair = ED448-1-Raw:ED448-1-PUBLIC-Raw
+Availablein = default
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-1
 Input = ""
 Output = 533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f034f628281f2fd7a22ddd47d7828c59bd0a21bfd3980ff0d2028d4b18a9df63e006c5d1c2d345b925d8dc00b4104852db99ac5c7cdda8530a113a0f4dbb61149f05a7363268c71d95808ff2e652600
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-2
 Input = 03
 Output = 26b8f91727bd62897af15e41eb43c377efb9c610d48f2335cb0bd0087810f4352541b143c4b981b7e18f62de8ccdf633fc1bf037ab7cd779805e0dbcc0aae1cbcee1afb2e027df36bc04dcecbf154336c19f0af7e0a6472905e799f1953d2a0ff3348ab21aa4adafd1d234441cf807c03a00
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-3
 Input = 0c3e544074ec63b0265e0c
 Output = 1f0a8888ce25e8d458a21130879b840a9089d999aaba039eaf3e3afa090a09d389dba82c4ff2ae8ac5cdfb7c55e94d5d961a29fe0109941e00b8dbdeea6d3b051068df7254c0cdc129cbe62db2dc957dbb47b51fd3f213fb8698f064774250a5028961c9bf8ffd973fe5d5c206492b140e00
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-4
 Input = 64a65f3cdedcdd66811e2915
 Output = 7eeeab7c4e50fb799b418ee5e3197ff6bf15d43a14c34389b59dd1a7b1b85b4ae90438aca634bea45e3a2695f1270f07fdcdf7c62b8efeaf00b45c2c96ba457eb1a8bf075a3db28e5c24f6b923ed4ad747c3c9e03c7079efb87cb110d3a99861e72003cbae6d6b8b827e4e6c143064ff3c00
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-5
 Input = 64a65f3cdedcdd66811e2915e7
 Output = 6a12066f55331b6c22acd5d5bfc5d71228fbda80ae8dec26bdd306743c5027cb4890810c162c027468675ecf645a83176c0d7323a2ccde2d80efe5a1268e8aca1d6fbc194d3f77c44986eb4ab4177919ad8bec33eb47bbb5fc6e28196fd1caf56b4e7e0ba5519234d047155ac727a1053100
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-6
 Input = bd0f6a3747cd561bdddf4640a332461a4a30a12a434cd0bf40d766d9c6d458e5512204a30c17d1f50b5079631f64eb3112182da3005835461113718d1a5ef944
 Output = 554bc2480860b49eab8532d2a533b7d578ef473eeb58c98bb2d0e1ce488a98b18dfde9b9b90775e67f47d4a1c3482058efc9f40d2ca033a0801b63d45b3b722ef552bad3b4ccb667da350192b61c508cf7b6b5adadc2c8d9a446ef003fb05cba5f30e88e36ec2703b349ca229c2670833900
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-7
 Input = 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
 Output = c650ddbb0601c19ca11439e1640dd931f43c518ea5bea70d3dcde5f4191fe53f00cf966546b72bcc7d58be2b9badef28743954e3a44a23f880e8d4f1cfce2d7a61452d26da05896f0a50da66a239a8a188b6d825b3305ad77b73fbac0836ecc60987fd08527c1a8e80d5823e65cafe2a3d00
 
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-8
 Input = 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
 Output = e301345a41a39a4d72fff8df69c98075a0cc082b802fc9b2b6bc503f926b65bddf7f4c8f1cb49f6396afc8a70abe6d8aef0db478d4c6b2970076c6a0484fe76d76b3a97625d79f1ce240e7c576750d295528286f719b413de9ada3e8eb78ed573603ce30d8bb761785dc30dbc320869e1a00
 
 # Verify test
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED448-1-PUBLIC
 Input = ""
 Output = 533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f034f628281f2fd7a22ddd47d7828c59bd0a21bfd3980ff0d2028d4b18a9df63e006c5d1c2d345b925d8dc00b4104852db99ac5c7cdda8530a113a0f4dbb61149f05a7363268c71d95808ff2e652600
 
 # Corrupted input
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED448-1-PUBLIC
 Input = "bad"
 Output = 533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f034f628281f2fd7a22ddd47d7828c59bd0a21bfd3980ff0d2028d4b18a9df63e006c5d1c2d345b925d8dc00b4104852db99ac5c7cdda8530a113a0f4dbb61149f05a7363268c71d95808ff2e652600
@@ -17782,6 +18511,7 @@ Result = VERIFY_ERROR
 
 # Corrupted signature
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED448-1-PUBLIC
 Input = ""
 Output = 533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f034f628281f2fd7a22ddd47d7828c59bd0a21bfd3980ff0d2028d4b18a9df63e006c5d1c2d345b925d8dc00b4104852db99ac5c7cdda8530a113a0f4dbb61149f05a7363268c71d95808ff2e652601
@@ -17789,27 +18519,32 @@ Result = VERIFY_ERROR
 
 # Make sure update calls return an error
 DigestSign = NULL
+Availablein = default
 Key = ED448-1
 Input = "Test"
 Result = DIGESTUPDATE_ERROR
 
 DigestVerify = NULL
+Availablein = default
 Key = ED448-1-PUBLIC
 Input = "Test"
 Result = DIGESTUPDATE_ERROR
 
 # Attempt to set invalid digest
 DigestSign = SHA256
+Availablein = default
 Key = ED448-1
 Result = DIGESTSIGNINIT_ERROR
 
 # Raw keys
 OneShotDigestSign = NULL
+Availablein = default
 Key = ED448-1-Raw
 Input = ""
 Output = 533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f034f628281f2fd7a22ddd47d7828c59bd0a21bfd3980ff0d2028d4b18a9df63e006c5d1c2d345b925d8dc00b4104852db99ac5c7cdda8530a113a0f4dbb61149f05a7363268c71d95808ff2e652600
 
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED448-1-PUBLIC-Raw
 Input = ""
 Output = 533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f034f628281f2fd7a22ddd47d7828c59bd0a21bfd3980ff0d2028d4b18a9df63e006c5d1c2d345b925d8dc00b4104852db99ac5c7cdda8530a113a0f4dbb61149f05a7363268c71d95808ff2e652600
@@ -17817,6 +18552,7 @@ Output = 533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f0
 #Signature malelability test.
 #Same as the verify operation above but with the order added to s
 OneShotDigestVerify = NULL
+Availablein = default
 Key = ED448-1-PUBLIC-Raw
 Input = ""
 Output = 533a37f6bbe457251f023c0d88f976ae2dfb504a843e34d2074fd823d41a591f2b233f034f628281f2fd7a22ddd47d7828c59bd0a21bfd3980f25278d3667403c14bcec5f9cfde9955ebc8333c0ae78fc86e518317c5c7cdda8530a113a0f4dbb61149f05a7363268c71d95808ff2e656600
@@ -17824,6 +18560,7 @@ Result = VERIFY_ERROR
 
 # Key generation tests
 KeyGen = rsaEncryption
+Availablein = default
 Ctrl = rsa_keygen_bits:128
 KeyName = tmprsa
 Result = PKEY_CTRL_INVALID
@@ -17831,18 +18568,21 @@ Reason = key size too small
 
 # RSA-PSS with restrictions, should succeed.
 KeyGen = RSASSA-PSS
+Availablein = default
 KeyName = tmppss
 Ctrl = rsa_pss_keygen_md:sha256
 Ctrl = rsa_pss_keygen_mgf1_md:sha512
 
 # Check MGF1 restrictions
 DigestVerify = SHA256
+Availablein = default
 Key = tmppss
 Ctrl = rsa_mgf1_md:sha256
 Result = PKEY_CTRL_ERROR
 
 # Test valid digest and MGF1 parameters. Verify will fail
 DigestVerify = SHA256
+Availablein = default
 Key = tmppss
 Ctrl = rsa_mgf1_md:sha512
 Input = ""
@@ -17851,6 +18591,7 @@ Result = VERIFY_ERROR
 
 # Check caching of key MGF1 digest restriction
 DigestVerify = SHA256
+Availablein = default
 Key = tmppss
 Ctrl = rsa_mgf1_md:sha1
 Result = PKEY_CTRL_ERROR
@@ -17859,6 +18600,7 @@ Title = RFC7919 DH tests
 
 # Key generation test
 KeyGen = dhKeyAgreement
+Availablein = default
 Ctrl = dh_param:ffdhe2048
 KeyName = tmpdh
 
@@ -17924,14 +18666,17 @@ PrivPubKeyPair=ffdhe2048-1:ffdhe2048-1-pub
 PrivPubKeyPair=ffdhe2048-2:ffdhe2048-2-pub
 
 Derive=ffdhe2048-1
+Availablein = default
 PeerKey=ffdhe2048-2-pub
 SharedSecret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
 
 Derive=ffdhe2048-2
+Availablein = default
 PeerKey=ffdhe2048-1-pub
 SharedSecret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
 
 Derive=ffdhe2048-1
+Availablein = default
 PeerKey=ffdhe2048-2-pub
 Ctrl = dh_pad:1
 SharedSecret=00006620DD85B56EE8540C8040CAC46B7385344A164E4DBDF521F7D99F88FA68EDD295A45E36E0BBD5FF5DE84598824E2CA52ED82ACA918CAECC6B22846D0FC6F0203E8B6963964D11E9E704F83AF1D60E9B1931139E9E9967C4665A831A75D99359A8BA80DD5921E74379AF4CA8DB453EDBC5E669AB17A5254CA6C96794CD5196BE90AF37742C8F6812515FFCC45B08F4158EFF9559F1AEF3665B3D91519DCBC6DF22CD6DA521B86613558602E73D2CA4666972F7D2CB6B46299B1DF2DA29A2A2D99D105E10CB553D6738A9B1DB2A0314C3CF30642D5C44695623D8B95C4426BEA830FB51816B4F086945E9B12A445F42DD68610E3F378A6E69A383D13D85BF
@@ -18011,10 +18756,12 @@ PrivPubKeyPair=ffdhe3072-1:ffdhe3072-1-pub
 PrivPubKeyPair=ffdhe3072-2:ffdhe3072-2-pub
 
 Derive=ffdhe3072-1
+Availablein = default
 PeerKey=ffdhe3072-2-pub
 SharedSecret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
 
 Derive=ffdhe3072-2
+Availablein = default
 PeerKey=ffdhe3072-1-pub
 SharedSecret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
 
@@ -18111,10 +18858,12 @@ PrivPubKeyPair=ffdhe4096-1:ffdhe4096-1-pub
 PrivPubKeyPair=ffdhe4096-2:ffdhe4096-2-pub
 
 Derive=ffdhe4096-1
+Availablein = default
 PeerKey=ffdhe4096-2-pub
 SharedSecret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
 
 Derive=ffdhe4096-2
+Availablein = default
 PeerKey=ffdhe4096-1-pub
 SharedSecret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
 
@@ -18241,10 +18990,12 @@ PrivPubKeyPair=ffdhe6144-1:ffdhe6144-1-pub
 PrivPubKeyPair=ffdhe6144-2:ffdhe6144-2-pub
 
 Derive=ffdhe6144-1
+Availablein = default
 PeerKey=ffdhe6144-2-pub
 SharedSecret=02B4252E4F0F659E78A58223DE9044AD90A0CC22DB5DE4F4815BF7226B7E663AE1B548A1ADB4ED81E9AF0B62FF985BF1E9893E39BA56FD843B6A134923156DD7D51DE9811B14ABA4494EAA95DA2AF8ACAD6AB2480A96A5DB99B46456FDEBDF1083220566F5DD3EC52DD06E72558B4701B528C989C06CE245EEF6215F487CFD1580615E6FE7D036985782E9BCC7ED62D2AA5A869FBF668391A0E601C2EC7A9A2E0DB57736C54ACA751E1085ABD4A55D506EFAB6FFC51AEEA33DD5EA651AA613E5F77BC81D2489FABABC8AEEF1DE5B65C3584F4080E4324EF3722AB4BF67A8FCABAE430996E454CA985B886D1B6BB5FF2C5246A8C001D953751EB59C47DAC678EE890DE817D9A06877E86516291A170ABE2273C4ADCF638713D98283F90DA17478759537C58A5D7D6AAC54C0485CAC2407A76079625ED285444ECA18127FF42419FADBDA2EDD5300CCB5F69543BCB74005BECE1FED763B06766B05EF2E20B685B92910C16B70165D111B2F8C59C6C79E5BCAC96FD2A6A969061C6D8626E605DA70E247630CF8A1D419C0E4910A72C164117B92B651CA8C8842E79C06E0E12BF8B67C218FB7FEB0F787EBBD2562E5C88A38013133753AECA5B03ECB54328765F61A6D3B901C38EC8F6582D717C688049893129DCAE597F3888E8E8BBCD9AAC9BDBD087926EAA63592DA66C085CBC408A5EC787CF0E3CE3070918B65B089A23457D0408B626B449221B460D1FD8DCCB280744B322760A53945DCD8FAA03DB4844F27496DA00B30ACC8619679D0AD28CE4464094C6DB2F68332BAD17348637E4D72B0C1EBCBBDDE514691C744F709083A76044AC85AF1B18ACD0B1716773DDB82ED94E02B0DB26205BD683A1F4E390881D556AAC305FCEB7E00AF0E3EC80AF2CD46769ED4F471DC71B60BEF36F6361B4A82C7A7F473F61C566D5206C9EFDC112A48BDDC58691830F64C91F4FB150DC61A334B7D5C3770BDBDC91A5E14C6FB02A369A0A7D2D7B008070289EFBDBB2AFD4D62BCC095E9FF81CB8E0B4F139EFD3CF5EDF243FCC08A8FA7577AEF0548436B589C4A221BE1FCE223024619F99DC66557598F
 
 Derive=ffdhe6144-2
+Availablein = default
 PeerKey=ffdhe6144-1-pub
 SharedSecret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
 
@@ -18405,10 +19156,12 @@ PrivPubKeyPair=ffdhe8192-1:ffdhe8192-1-pub
 PrivPubKeyPair=ffdhe8192-2:ffdhe8192-2-pub
 
 Derive=ffdhe8192-1
+Availablein = default
 PeerKey=ffdhe8192-2-pub
 SharedSecret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
 
 Derive=ffdhe8192-2
+Availablein = default
 PeerKey=ffdhe8192-1-pub
 SharedSecret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
 
@@ -18422,21 +19175,25 @@ Wt3Te/d/8Mr57Tf886i09VwDhSMmH8pmNq/mp6+ioUgqYG9cs6GLLioe
 -----END PRIVATE KEY-----
 
 Verify = SM2_key1
+Availablein = default
 Ctrl = digest:SM3
 Input = D7AD397F6FFA5D4F7F11E7217F241607DC30618C236D2C09C1B9EA8FDADEE2E8
 Output = 3046022100AB1DB64DE7C40EDBDE6651C9B8EBDB804673DB836E5D5C7FE15DCF9ED2725037022100EBA714451FF69B0BB930B379E192E7CD5FA6E3C41C7FBD8303B799AB54A54621
 
 Verify = SM2_key1
+Availablein = default
 Ctrl = digest:SM3
 Input = B1139602C6ECC9E15E2F3F9C635A1AFE737058BC15387479C1EA0D0B3D90E9E5
 Output = 3045022100E6E0414EBD3A656C35602AF14AB20287DBF30D57AF75C49A188ED4B42391F22402202F54F277C606F4605E1CE9514947FFDDF94C67A539804A4ED17F852288BDBE2E
 
 Verify = SM2_key1
+Availablein = default
 Ctrl = digest:SHA512
 Input = 40AA1B203C9D8EE150B21C3C7CDA8261492E5420C5F2B9F7380700E094C303B48E62F319C1DA0E32EB40D113C5F1749CC61AEB499167890AB82F2CC9BB706971
 Output = 3046022100AE018933B9BA041784380069F2DDF609694DCD299FDBF23D09F4B711FBC103EC0221008440BB1A48C132DE4FB91BE9F43B958142FDD29FB9DABE01B17514023A2F638C
 
 Decrypt = SM2_key1
+Availablein = default
 Input = 30818A0220466BE2EF5C11782EC77864A0055417F407A5AFC11D653C6BCE69E417BB1D05B6022062B572E21FF0DDF5C726BD3F9FF2EAE56E6294713A607E9B9525628965F62CC804203C1B5713B5DB2728EB7BF775E44F4689FC32668BDC564F52EA45B09E8DF2A5F40422084A9D0CC2997092B7D3C404FCE95956EB604D732B2307A8E5B8900ED6608CA5B197
 Output = "The floofy bunnies hop at midnight"
 
@@ -18445,6 +19202,7 @@ Output = "The floofy bunnies hop at midnight"
 # anything about the generated signature being valid, nor does it test the
 # correct implementation of the cryptosystem.
 Sign = SM2_key1
+Availablein = default
 Ctrl = digest:SM3
 Input = D7AD397F6FFA5D4F7F11E7217F241607DC30618C236D2C09C1B9EA8FDADEE2E8
 Output = 3045022100f11bf36e75bb304f094fb42a4ca22377d0cc768637c5011cd59fb9ed4b130c98022035545ffe2c2efb3abee4fee661468946d886004fae8ea5311593e48f7fe21b91
@@ -18457,6 +19215,7 @@ PrivateKeyRaw = WychePRIVATE0:X25519:288796bc5aff4b81a37501757bc0753a3c21964790d
 PublicKeyRaw = WychePUBLIC0:X25519:f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7f
 
 Derive=WychePRIVATE0
+Availablein = default
 PeerKey=WychePUBLIC0
 SharedSecret=b4e0dd76da7b071728b61f856771aa356e57eda78a5b1655cc3820fb5f854c5c
 
@@ -18465,6 +19224,7 @@ PrivateKeyRaw = WychePRIVATE1:X25519:60887b3dc72443026ebedbbbb70665f42b87add1440
 PublicKeyRaw = WychePUBLIC1:X25519:f0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
 
 Derive=WychePRIVATE1
+Availablein = default
 PeerKey=WychePUBLIC1
 SharedSecret=38d6304c4a7e6d9f7959334fb5245bd2c754525d4c91db950206926234c1f633
 
@@ -18473,17 +19233,20 @@ PrivateKeyRaw = WychePRIVATE2:X25519:a0a4f130b98a5be4b1cedb7cb85584a3520e142d474
 PublicKeyRaw = WychePUBLIC2:X25519:0ab4e76380d84dde4f6833c58f2a9fb8f83bb0169b172be4b6e0592887741a36
 
 Derive=WychePRIVATE2
+Availablein = default
 PeerKey=WychePUBLIC2
 SharedSecret=0200000000000000000000000000000000000000000000000000000000000000
 
 PublicKeyRaw = WychePUBLIC3:X25519:89e10d5701b4337d2d032181538b1064bd4084401ceca1fd12663a1959388000
 
 Derive=WychePRIVATE2
+Availablein = default
 PeerKey=WychePUBLIC3
 SharedSecret=0900000000000000000000000000000000000000000000000000000000000000
 
 PublicKeyRaw = WychePUBLIC4:X25519:2b55d3aa4a8f80c8c0b2ae5f933e85af49beac36c2fa7394bab76c8933f8f81d
 
 Derive=WychePRIVATE2
+Availablein = default
 PeerKey=WychePUBLIC4
 SharedSecret=1000000000000000000000000000000000000000000000000000000000000000


More information about the openssl-commits mailing list