Beispiel #1
0
/* static char cbc_data[40]="7654321 Now is the time for \0001"; */
static unsigned char cbc_data[40] = {
	0x37, 0x36, 0x35, 0x34, 0x33, 0x32, 0x31, 0x20,
	0x4E, 0x6F, 0x77, 0x20, 0x69, 0x73, 0x20, 0x74,
	0x68, 0x65, 0x20, 0x74, 0x69, 0x6D, 0x65, 0x20,
	0x66, 0x6F, 0x72, 0x20, 0x00, 0x31, 0x00, 0x00,
	0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
};

static unsigned char cbc_ok[32] = {
	0xcc, 0xd1, 0x73, 0xff, 0xab, 0x20, 0x39, 0xf4,
	0xac, 0xd8, 0xae, 0xfd, 0xdf, 0xd8, 0xa1, 0xeb,
	0x46, 0x8e, 0x91, 0x15, 0x78, 0x88, 0xba, 0x68,
	0x1d, 0x26, 0x93, 0x97, 0xf7, 0xfe, 0x62, 0xb4,
};

#ifdef SCREW_THE_PARITY
#error "SCREW_THE_PARITY is not ment to be defined."
#error "Original vectors are preserved for reference only."
static unsigned char cbc2_key[8] = {
	0xf0, 0xe1, 0xd2, 0xc3, 0xb4, 0xa5, 0x96, 0x87,
};
static unsigned char xcbc_ok[32] = {
	0x86, 0x74, 0x81, 0x0D, 0x61, 0xA4, 0xA5, 0x48,
	0xB9, 0x93, 0x03, 0xE1, 0xB8, 0xBB, 0xBD, 0xBD,
	0x64, 0x30, 0x0B, 0xB9, 0x06, 0x65, 0x81, 0x76,
	0x04, 0x1D, 0x77, 0x62, 0x17, 0xCA, 0x2B, 0xD2,
};
#else
static unsigned char xcbc_ok[32] = {
	0x84, 0x6B, 0x29, 0x14, 0x85, 0x1E, 0x9A, 0x29,
	0x54, 0x73, 0x2F, 0x8A, 0xA0, 0xA6, 0x11, 0xC1,
	0x15, 0xCD, 0xC2, 0xD7, 0x95, 0x1B, 0x10, 0x53,
	0xA6, 0x3C, 0x5E, 0x03, 0xB2, 0x1A, 0xA3, 0xC4,
};
#endif

static unsigned char cbc3_ok[32] = {
	0x3F, 0xE3, 0x01, 0xC9, 0x62, 0xAC, 0x01, 0xD0,
	0x22, 0x13, 0x76, 0x3C, 0x1C, 0xBD, 0x4C, 0xDC,
	0x79, 0x96, 0x57, 0xC0, 0x64, 0xEC, 0xF5, 0xD4,
	0x1C, 0x67, 0x38, 0x12, 0xCF, 0xDE, 0x96, 0x75
};

static unsigned char pcbc_ok[32] = {
	0xcc, 0xd1, 0x73, 0xff, 0xab, 0x20, 0x39, 0xf4,
	0x6d, 0xec, 0xb4, 0x70, 0xa0, 0xe5, 0x6b, 0x15,
	0xae, 0xa6, 0xbf, 0x61, 0xed, 0x7d, 0x9c, 0x9f,
	0xf7, 0x17, 0x46, 0x3b, 0x8a, 0xb3, 0xcc, 0x88
};

static unsigned char cfb_key[8] = {
	0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
};
static unsigned char cfb_iv[8] = {
	0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef,
};
static unsigned char cfb_buf1[40], cfb_buf2[40], cfb_tmp[8];
static unsigned char plain[24] =
{
	0x4e, 0x6f, 0x77, 0x20, 0x69, 0x73,
	0x20, 0x74, 0x68, 0x65, 0x20, 0x74,
	0x69, 0x6d, 0x65, 0x20, 0x66, 0x6f,
	0x72, 0x20, 0x61, 0x6c, 0x6c, 0x20,
};
static unsigned char cfb_cipher8[24] = {
	0xf3, 0x1f, 0xda, 0x07, 0x01, 0x14,
	0x62, 0xee, 0x18, 0x7f, 0x43, 0xd8,
	0x0a, 0x7c, 0xd9, 0xb5, 0xb0, 0xd2,
	0x90, 0xda, 0x6e, 0x5b, 0x9a, 0x87,
};
static unsigned char cfb_cipher16[24] = {
	0xF3, 0x09, 0x87, 0x87, 0x7F, 0x57,
	0xF7, 0x3C, 0x36, 0xB6, 0xDB, 0x70,
	0xD8, 0xD5, 0x34, 0x19, 0xD3, 0x86,
	0xB2, 0x23, 0xB7, 0xB2, 0xAD, 0x1B,
};
static unsigned char cfb_cipher32[24] = {
	0xF3, 0x09, 0x62, 0x49, 0xA4, 0xDF,
	0xA4, 0x9F, 0x33, 0xDC, 0x7B, 0xAD,
	0x4C, 0xC8, 0x9F, 0x64, 0xE4, 0x53,
	0xE5, 0xEC, 0x67, 0x20, 0xDA, 0xB6,
};
static unsigned char cfb_cipher48[24] = {
	0xF3, 0x09, 0x62, 0x49, 0xC7, 0xF4,
	0x30, 0xB5, 0x15, 0xEC, 0xBB, 0x85,
	0x97, 0x5A, 0x13, 0x8C, 0x68, 0x60,
	0xE2, 0x38, 0x34, 0x3C, 0xDC, 0x1F,
};
static unsigned char cfb_cipher64[24] = {
	0xF3, 0x09, 0x62, 0x49, 0xC7, 0xF4,
	0x6E, 0x51, 0xA6, 0x9E, 0x83, 0x9B,
	0x1A, 0x92, 0xF7, 0x84, 0x03, 0x46,
	0x71, 0x33, 0x89, 0x8E, 0xA6, 0x22,
};

static unsigned char ofb_key[8] = {
	0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef,
};
static unsigned char ofb_iv[8] = {
	0x12, 0x34, 0x56, 0x78, 0x90, 0xab, 0xcd, 0xef,
};
static unsigned char ofb_buf1[24], ofb_buf2[24], ofb_tmp[8];
static unsigned char ofb_cipher[24] =
{
	0xf3, 0x09, 0x62, 0x49, 0xc7, 0xf4, 0x6e, 0x51,
	0x35, 0xf2, 0x4a, 0x24, 0x2e, 0xeb, 0x3d, 0x3f,
	0x3d, 0x6d, 0x5b, 0xe3, 0x25, 0x5a, 0xf8, 0xc3
};

static DES_LONG cbc_cksum_ret = 0xB462FEF7L;
static unsigned char cbc_cksum_data[8] = {
	0x1D, 0x26, 0x93, 0x97, 0xf7, 0xfe, 0x62, 0xb4,
};

static char *
pt(unsigned char *p)
{
	static char bufs[10][20];
	static int bnum = 0;
	char *ret;
	int i;
	static const char *f = "0123456789ABCDEF";

	ret = &(bufs[bnum++][0]);
	bnum %= 10;
	for (i = 0; i < 8; i++) {
		ret[i * 2] = f[(p[i] >> 4) & 0xf];
		ret[i * 2 + 1] = f[p[i] & 0xf];
	}
	ret[16] = '\0';
	return (ret);
}

static void
fail_cfb_buf(const char *msg, unsigned char *ptr)
{
	char buf[1024];
	int i;

	*buf = '\0';
	for (i = 0; i < 24; i += 8) {
		char buf2[128];
		snprintf(buf2, sizeof(buf2), "%s /", pt(&(cfb_buf1[i])));
		strlcat(buf, buf2, sizeof(buf));
	}

	atf_tc_fail_nonfatal("%s: %s", msg, buf);
}

#if !defined(LIBDES_LIT)
static void
cfb_test(int bits, unsigned char *cfb_cipher)
{
	des_key_schedule ks;

	des_set_key_checked(&cfb_key, ks);
	memcpy(cfb_tmp, cfb_iv, sizeof(cfb_iv));
	des_cfb_encrypt(plain, cfb_buf1, bits, sizeof(plain), ks, &cfb_tmp,
			DES_ENCRYPT);
	if (memcmp(cfb_cipher, cfb_buf1, sizeof(plain)) != 0)
		fail_cfb_buf("cfb_encrypt encrypt error", cfb_buf1);
	memcpy(cfb_tmp, cfb_iv, sizeof(cfb_iv));
	des_cfb_encrypt(cfb_buf1, cfb_buf2, bits, sizeof(plain), ks, &cfb_tmp,
			DES_DECRYPT);
	if (memcmp(plain, cfb_buf2, sizeof(plain)) != 0)
		fail_cfb_buf("cfb_encrypt decrypt error", cfb_buf2);
}
#endif /* !defined(LIBDES_LIT) */

#if !defined(LIBDES_LIT)
static void
cfb64_test(unsigned char *cfb_cipher)
{
	int n;
	des_key_schedule ks;

	des_set_key_checked(&cfb_key, ks);
	memcpy(cfb_tmp, cfb_iv, sizeof(cfb_iv));
	n = 0;
	des_cfb64_encrypt(plain, cfb_buf1, 12, ks, &cfb_tmp, &n, DES_ENCRYPT);
	des_cfb64_encrypt(&(plain[12]), &(cfb_buf1[12]), sizeof(plain) - 12, ks,
			  &cfb_tmp, &n, DES_ENCRYPT);
	if (memcmp(cfb_cipher, cfb_buf1, sizeof(plain)) != 0)
		fail_cfb_buf("cfb_encrypt encrypt error", cfb_buf1);
	memcpy(cfb_tmp, cfb_iv, sizeof(cfb_iv));
	n = 0;
	des_cfb64_encrypt(cfb_buf1, cfb_buf2, 17, ks, &cfb_tmp, &n, DES_DECRYPT);
	des_cfb64_encrypt(&(cfb_buf1[17]), &(cfb_buf2[17]),
			  sizeof(plain) - 17, ks, &cfb_tmp, &n, DES_DECRYPT);
	if (memcmp(plain, cfb_buf2, sizeof(plain)) != 0)
		fail_cfb_buf("cfb_encrypt decrypt error", cfb_buf2);
}
#endif /* !defined(LIBDES_LIT) */

#if !defined(LIBDES_LIT)
static void
ede_cfb64_test(unsigned char *cfb_cipher)
{
	int n;
	des_key_schedule ks;

	des_set_key_checked(&cfb_key, ks);
	memcpy(cfb_tmp, cfb_iv, sizeof(cfb_iv));
	n = 0;
	des_ede3_cfb64_encrypt(plain, cfb_buf1, 12, ks, ks, ks, &cfb_tmp, &n,
			       DES_ENCRYPT);
	des_ede3_cfb64_encrypt(&(plain[12]), &(cfb_buf1[12]),
			       sizeof(plain) - 12, ks, ks, ks,
			       &cfb_tmp, &n, DES_ENCRYPT);
	if (memcmp(cfb_cipher, cfb_buf1, sizeof(plain)) != 0)
		fail_cfb_buf("ede_cfb_encrypt encrypt error", cfb_buf1);
	memcpy(cfb_tmp, cfb_iv, sizeof(cfb_iv));
	n = 0;
	des_ede3_cfb64_encrypt(cfb_buf1, cfb_buf2, (long) 17, ks, ks, ks,
			       &cfb_tmp, &n, DES_DECRYPT);
	des_ede3_cfb64_encrypt(&(cfb_buf1[17]), &(cfb_buf2[17]),
			       sizeof(plain) - 17, ks, ks, ks,
			       &cfb_tmp, &n, DES_DECRYPT);
	if (memcmp(plain, cfb_buf2, sizeof(plain)) != 0)
		fail_cfb_buf("ede_cfb_encrypt decrypt error", cfb_buf2);
}
#endif /* !defined(LIBDES_LIT) */

ATF_TC_WITHOUT_HEAD(cbcm);
#if defined(NO_DESCBCM)
ATF_TC_BODY(cbcm, tc)
{
	atf_tc_skip("Test program built with NO_DESCBCM");
}
#else /* defined(NO_DESCBM) */
ATF_TC_BODY(cbcm, tc)
{
	int i, j;
	des_cblock iv3, iv2;
	unsigned char cbc_in[40], cbc_out[40];
	des_key_schedule ks, ks2, ks3;

	if ((j = des_set_key_checked(&cbc_key, ks)) != 0) {
		atf_tc_fail_nonfatal("Key error %d\n", j);
	}
	if ((j = des_set_key_checked(&cbc2_key, ks2)) != 0) {
		atf_tc_fail_nonfatal("Key error %d\n", j);
	}
	if ((j = des_set_key_checked(&cbc3_key, ks3)) != 0) {
		atf_tc_fail_nonfatal("Key error %d\n", j);
	}
	memset(cbc_out, 0, 40);
	memset(cbc_in, 0, 40);
	i = strlen((char *) cbc_data) + 1;
	/* i=((i+7)/8)*8; */
	memcpy(iv3, cbc_iv, sizeof(cbc_iv));
	memset(iv2, '\0', sizeof iv2);

	des_ede3_cbcm_encrypt(cbc_data, cbc_out, 16L, ks, ks2, ks3, &iv3, &iv2,
			      DES_ENCRYPT);
	des_ede3_cbcm_encrypt(&cbc_data[16], &cbc_out[16], i - 16, ks, ks2, ks3,
			      &iv3, &iv2, DES_ENCRYPT);
	/*
	 * if (memcmp(cbc_out,cbc3_ok, (unsigned int)(strlen((char
	 * *)cbc_data)+1+7)/8*8) != 0) { printf("des_ede3_cbc_encrypt encrypt
	 * error\n"); err=1; }
	 */
	memcpy(iv3, cbc_iv, sizeof(cbc_iv));
	memset(iv2, '\0', sizeof iv2);
	des_ede3_cbcm_encrypt(cbc_out, cbc_in, i, ks, ks2, ks3, &iv3, &iv2,
			      DES_DECRYPT);
	if (memcmp(cbc_in, cbc_data, strlen((char *) cbc_data) + 1) != 0) {
		char buf[1024];
		int n;

		*buf = '\0';
		for (n = 0; n < i; ++n) {
			char buf2[16];
			snprintf(buf2, sizeof(buf2), " %02x", cbc_data[n]);
			strlcat(buf, buf2, sizeof(buf));
		}
		strlcat(buf, ", ", sizeof(buf));
		for (n = 0; n < i; ++n) {
			char buf2[16];
			snprintf(buf2, sizeof(buf2), " %02x", cbc_in[n]);
			strlcat(buf, buf2, sizeof(buf));
		}

		atf_tc_fail_nonfatal("des_ede3_cbcm_encrypt decrypt error: %s",
				     buf);
	}
}
Beispiel #2
0
int main(int argc, char *argv[])
	{
	int i,j,err=0;
	des_cblock in,out,outin,iv3,iv2;
	des_key_schedule ks,ks2,ks3;
	unsigned char cbc_in[40];
	unsigned char cbc_out[40];
	DES_LONG cs;
	unsigned char cret[8];
#ifdef _CRAY
        struct {
            int a:32;
            int b:32;
        } lqret[2];
#else
        DES_LONG lqret[4];
#endif
	int num;
	char *str;

#ifndef NO_DESCBCM
	printf("Doing cbcm\n");
	if ((j=des_set_key_checked(&cbc_key,ks)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	if ((j=des_set_key_checked(&cbc2_key,ks2)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	if ((j=des_set_key_checked(&cbc3_key,ks3)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	i=strlen((char *)cbc_data)+1;
	/* i=((i+7)/8)*8; */
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	memset(iv2,'\0',sizeof iv2);

	des_ede3_cbcm_encrypt(cbc_data,cbc_out,16L,ks,ks2,ks3,&iv3,&iv2,
			      DES_ENCRYPT);
	des_ede3_cbcm_encrypt(&cbc_data[16],&cbc_out[16],i-16,ks,ks2,ks3,
			      &iv3,&iv2,DES_ENCRYPT);
	/*	if (memcmp(cbc_out,cbc3_ok,
		(unsigned int)(strlen((char *)cbc_data)+1+7)/8*8) != 0)
		{
		printf("des_ede3_cbc_encrypt encrypt error\n");
		err=1;
		}
	*/
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	memset(iv2,'\0',sizeof iv2);
	des_ede3_cbcm_encrypt(cbc_out,cbc_in,i,ks,ks2,ks3,&iv3,&iv2,DES_DECRYPT);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0)
		{
		int n;

		printf("des_ede3_cbcm_encrypt decrypt error\n");
		for(n=0 ; n < i ; ++n)
		    printf(" %02x",cbc_data[n]);
		printf("\n");
		for(n=0 ; n < i ; ++n)
		    printf(" %02x",cbc_in[n]);
		printf("\n");
		err=1;
		}
#endif

	printf("Doing ecb\n");
	for (i=0; i<NUM_TESTS; i++)
		{
		des_set_key_unchecked(&key_data[i],ks);
		memcpy(in,plain_data[i],8);
		memset(out,0,8);
		memset(outin,0,8);
		des_ecb_encrypt(&in,&out,ks,DES_ENCRYPT);
		des_ecb_encrypt(&out,&outin,ks,DES_DECRYPT);

		if (memcmp(out,cipher_data[i],8) != 0)
			{
			printf("Encryption error %2d\nk=%s p=%s o=%s act=%s\n",
				i+1,pt(key_data[i]),pt(in),pt(cipher_data[i]),
				pt(out));
			err=1;
			}
		if (memcmp(in,outin,8) != 0)
			{
			printf("Decryption error %2d\nk=%s p=%s o=%s act=%s\n",
				i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
			err=1;
			}
		}

#ifndef LIBDES_LIT
	printf("Doing ede ecb\n");
	for (i=0; i<(NUM_TESTS-1); i++)
		{
		des_set_key_unchecked(&key_data[i],ks);
		des_set_key_unchecked(&key_data[i+1],ks2);
		des_set_key_unchecked(&key_data[i+2],ks3);
		memcpy(in,plain_data[i],8);
		memset(out,0,8);
		memset(outin,0,8);
		des_ecb2_encrypt(&in,&out,ks,ks2,DES_ENCRYPT);
		des_ecb2_encrypt(&out,&outin,ks,ks2,DES_DECRYPT);

		if (memcmp(out,cipher_ecb2[i],8) != 0)
			{
			printf("Encryption error %2d\nk=%s p=%s o=%s act=%s\n",
				i+1,pt(key_data[i]),pt(in),pt(cipher_ecb2[i]),
				pt(out));
			err=1;
			}
		if (memcmp(in,outin,8) != 0)
			{
			printf("Decryption error %2d\nk=%s p=%s o=%s act=%s\n",
				i+1,pt(key_data[i]),pt(out),pt(in),pt(outin));
			err=1;
			}
		}
#endif

	printf("Doing cbc\n");
	if ((j=des_set_key_checked(&cbc_key,ks)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_ncbc_encrypt(cbc_data,cbc_out,strlen((char *)cbc_data)+1,ks,
			 &iv3,DES_ENCRYPT);
	if (memcmp(cbc_out,cbc_ok,32) != 0)
		{
		printf("cbc_encrypt encrypt error\n");
		err=1;
		}

	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_ncbc_encrypt(cbc_out,cbc_in,strlen((char *)cbc_data)+1,ks,
			 &iv3,DES_DECRYPT);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)) != 0)
		{
		printf("cbc_encrypt decrypt error\n");
		err=1;
		}

#ifndef LIBDES_LIT
	printf("Doing desx cbc\n");
	if ((j=des_set_key_checked(&cbc_key,ks)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_xcbc_encrypt(cbc_data,cbc_out,strlen((char *)cbc_data)+1,ks,
			 &iv3,&cbc2_key,&cbc3_key, DES_ENCRYPT);
	if (memcmp(cbc_out,xcbc_ok,32) != 0)
		{
		printf("des_xcbc_encrypt encrypt error\n");
		err=1;
		}
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_xcbc_encrypt(cbc_out,cbc_in,strlen((char *)cbc_data)+1,ks,
			 &iv3,&cbc2_key,&cbc3_key, DES_DECRYPT);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0)
		{
		printf("des_xcbc_encrypt decrypt error\n");
		err=1;
		}
#endif

	printf("Doing ede cbc\n");
	if ((j=des_set_key_checked(&cbc_key,ks)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	if ((j=des_set_key_checked(&cbc2_key,ks2)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	if ((j=des_set_key_checked(&cbc3_key,ks3)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	i=strlen((char *)cbc_data)+1;
	/* i=((i+7)/8)*8; */
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));

	des_ede3_cbc_encrypt(cbc_data,cbc_out,16L,ks,ks2,ks3,&iv3,DES_ENCRYPT);
	des_ede3_cbc_encrypt(&(cbc_data[16]),&(cbc_out[16]),i-16,ks,ks2,ks3,
			     &iv3,DES_ENCRYPT);
	if (memcmp(cbc_out,cbc3_ok,
		(unsigned int)(strlen((char *)cbc_data)+1+7)/8*8) != 0)
		{
		printf("des_ede3_cbc_encrypt encrypt error\n");
		err=1;
		}

	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_ede3_cbc_encrypt(cbc_out,cbc_in,i,ks,ks2,ks3,&iv3,DES_DECRYPT);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0)
		{
		printf("des_ede3_cbc_encrypt decrypt error\n");
		err=1;
		}

#ifndef LIBDES_LIT
	printf("Doing pcbc\n");
	if ((j=des_set_key_checked(&cbc_key,ks)) != 0)
		{
		printf("Key error %d\n",j);
		err=1;
		}
	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	des_pcbc_encrypt(cbc_data,cbc_out,strlen((char *)cbc_data)+1,ks,
			 &cbc_iv,DES_ENCRYPT);
	if (memcmp(cbc_out,pcbc_ok,32) != 0)
		{
		printf("pcbc_encrypt encrypt error\n");
		err=1;
		}
	des_pcbc_encrypt(cbc_out,cbc_in,strlen((char *)cbc_data)+1,ks,&cbc_iv,
			 DES_DECRYPT);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0)
		{
		printf("pcbc_encrypt decrypt error\n");
		err=1;
		}

	printf("Doing ");
	printf("cfb8 ");
	err+=cfb_test(8,cfb_cipher8);
	printf("cfb16 ");
	err+=cfb_test(16,cfb_cipher16);
	printf("cfb32 ");
	err+=cfb_test(32,cfb_cipher32);
	printf("cfb48 ");
	err+=cfb_test(48,cfb_cipher48);
	printf("cfb64 ");
	err+=cfb_test(64,cfb_cipher64);

	printf("cfb64() ");
	err+=cfb64_test(cfb_cipher64);

	memcpy(cfb_tmp,cfb_iv,sizeof(cfb_iv));
	for (i=0; i<sizeof(plain); i++)
		des_cfb_encrypt(&(plain[i]),&(cfb_buf1[i]),
			8,1,ks,&cfb_tmp,DES_ENCRYPT);
	if (memcmp(cfb_cipher8,cfb_buf1,sizeof(plain)) != 0)
		{
		printf("cfb_encrypt small encrypt error\n");
		err=1;
		}

	memcpy(cfb_tmp,cfb_iv,sizeof(cfb_iv));
	for (i=0; i<sizeof(plain); i++)
		des_cfb_encrypt(&(cfb_buf1[i]),&(cfb_buf2[i]),
			8,1,ks,&cfb_tmp,DES_DECRYPT);
	if (memcmp(plain,cfb_buf2,sizeof(plain)) != 0)
		{
		printf("cfb_encrypt small decrypt error\n");
		err=1;
		}

	printf("ede_cfb64() ");
	err+=ede_cfb64_test(cfb_cipher64);

	printf("done\n");

	printf("Doing ofb\n");
	des_set_key_checked(&ofb_key,ks);
	memcpy(ofb_tmp,ofb_iv,sizeof(ofb_iv));
	des_ofb_encrypt(plain,ofb_buf1,64,sizeof(plain)/8,ks,&ofb_tmp);
	if (memcmp(ofb_cipher,ofb_buf1,sizeof(ofb_buf1)) != 0)
		{
		printf("ofb_encrypt encrypt error\n");
printf("%02X %02X %02X %02X %02X %02X %02X %02X\n",
ofb_buf1[8+0], ofb_buf1[8+1], ofb_buf1[8+2], ofb_buf1[8+3],
ofb_buf1[8+4], ofb_buf1[8+5], ofb_buf1[8+6], ofb_buf1[8+7]);
printf("%02X %02X %02X %02X %02X %02X %02X %02X\n",
ofb_buf1[8+0], ofb_cipher[8+1], ofb_cipher[8+2], ofb_cipher[8+3],
ofb_buf1[8+4], ofb_cipher[8+5], ofb_cipher[8+6], ofb_cipher[8+7]);
		err=1;
		}
	memcpy(ofb_tmp,ofb_iv,sizeof(ofb_iv));
	des_ofb_encrypt(ofb_buf1,ofb_buf2,64,sizeof(ofb_buf1)/8,ks,&ofb_tmp);
	if (memcmp(plain,ofb_buf2,sizeof(ofb_buf2)) != 0)
		{
		printf("ofb_encrypt decrypt error\n");
printf("%02X %02X %02X %02X %02X %02X %02X %02X\n",
ofb_buf2[8+0], ofb_buf2[8+1], ofb_buf2[8+2], ofb_buf2[8+3],
ofb_buf2[8+4], ofb_buf2[8+5], ofb_buf2[8+6], ofb_buf2[8+7]);
printf("%02X %02X %02X %02X %02X %02X %02X %02X\n",
plain[8+0], plain[8+1], plain[8+2], plain[8+3],
plain[8+4], plain[8+5], plain[8+6], plain[8+7]);
		err=1;
		}

	printf("Doing ofb64\n");
	des_set_key_checked(&ofb_key,ks);
	memcpy(ofb_tmp,ofb_iv,sizeof(ofb_iv));
	memset(ofb_buf1,0,sizeof(ofb_buf1));
	memset(ofb_buf2,0,sizeof(ofb_buf1));
	num=0;
	for (i=0; i<sizeof(plain); i++)
		{
		des_ofb64_encrypt(&(plain[i]),&(ofb_buf1[i]),1,ks,&ofb_tmp,
				  &num);
		}
	if (memcmp(ofb_cipher,ofb_buf1,sizeof(ofb_buf1)) != 0)
		{
		printf("ofb64_encrypt encrypt error\n");
		err=1;
		}
	memcpy(ofb_tmp,ofb_iv,sizeof(ofb_iv));
	num=0;
	des_ofb64_encrypt(ofb_buf1,ofb_buf2,sizeof(ofb_buf1),ks,&ofb_tmp,&num);
	if (memcmp(plain,ofb_buf2,sizeof(ofb_buf2)) != 0)
		{
		printf("ofb64_encrypt decrypt error\n");
		err=1;
		}

	printf("Doing ede_ofb64\n");
	des_set_key_checked(&ofb_key,ks);
	memcpy(ofb_tmp,ofb_iv,sizeof(ofb_iv));
	memset(ofb_buf1,0,sizeof(ofb_buf1));
	memset(ofb_buf2,0,sizeof(ofb_buf1));
	num=0;
	for (i=0; i<sizeof(plain); i++)
		{
		des_ede3_ofb64_encrypt(&(plain[i]),&(ofb_buf1[i]),1,ks,ks,ks,
				       &ofb_tmp,&num);
		}
	if (memcmp(ofb_cipher,ofb_buf1,sizeof(ofb_buf1)) != 0)
		{
		printf("ede_ofb64_encrypt encrypt error\n");
		err=1;
		}
	memcpy(ofb_tmp,ofb_iv,sizeof(ofb_iv));
	num=0;
	des_ede3_ofb64_encrypt(ofb_buf1,ofb_buf2,sizeof(ofb_buf1),ks,
			       ks,ks,&ofb_tmp,&num);
	if (memcmp(plain,ofb_buf2,sizeof(ofb_buf2)) != 0)
		{
		printf("ede_ofb64_encrypt decrypt error\n");
		err=1;
		}

	printf("Doing cbc_cksum\n");
	des_set_key_checked(&cbc_key,ks);
	cs=des_cbc_cksum(cbc_data,&cret,strlen((char *)cbc_data),ks,&cbc_iv);
	if (cs != cbc_cksum_ret)
		{
		printf("bad return value (%08lX), should be %08lX\n",
			(unsigned long)cs,(unsigned long)cbc_cksum_ret);
		err=1;
		}
	if (memcmp(cret,cbc_cksum_data,8) != 0)
		{
		printf("bad cbc_cksum block returned\n");
		err=1;
		}

	printf("Doing quad_cksum\n");
	cs=quad_cksum(cbc_data,(des_cblock *)lqret,
		(long)strlen((char *)cbc_data),2,(des_cblock *)cbc_iv);
	if (cs != 0x70d7a63aL)
		{
		printf("quad_cksum error, ret %08lx should be 70d7a63a\n",
			(unsigned long)cs);
		err=1;
		}
#ifdef _CRAY
	if (lqret[0].a != 0x327eba8dL)
		{
		printf("quad_cksum error, out[0] %08lx is not %08lx\n",
			(unsigned long)lqret[0].a,0x327eba8dUL);
		err=1;
		}
	if (lqret[0].b != 0x201a49ccL)
		{
		printf("quad_cksum error, out[1] %08lx is not %08lx\n",
			(unsigned long)lqret[0].b,0x201a49ccUL);
		err=1;
		}
	if (lqret[1].a != 0x70d7a63aL)
		{
		printf("quad_cksum error, out[2] %08lx is not %08lx\n",
			(unsigned long)lqret[1].a,0x70d7a63aUL);
		err=1;
		}
	if (lqret[1].b != 0x501c2c26L)
		{
		printf("quad_cksum error, out[3] %08lx is not %08lx\n",
			(unsigned long)lqret[1].b,0x501c2c26UL);
		err=1;
		}
#else
	if (lqret[0] != 0x327eba8dL)
		{
		printf("quad_cksum error, out[0] %08lx is not %08lx\n",
			(unsigned long)lqret[0],0x327eba8dUL);
		err=1;
		}
	if (lqret[1] != 0x201a49ccL)
		{
		printf("quad_cksum error, out[1] %08lx is not %08lx\n",
			(unsigned long)lqret[1],0x201a49ccUL);
		err=1;
		}
	if (lqret[2] != 0x70d7a63aL)
		{
		printf("quad_cksum error, out[2] %08lx is not %08lx\n",
			(unsigned long)lqret[2],0x70d7a63aUL);
		err=1;
		}
	if (lqret[3] != 0x501c2c26L)
		{
		printf("quad_cksum error, out[3] %08lx is not %08lx\n",
			(unsigned long)lqret[3],0x501c2c26UL);
		err=1;
		}
#endif
#endif

	printf("input word alignment test");
	for (i=0; i<4; i++)
		{
		printf(" %d",i);
		des_ncbc_encrypt(&(cbc_out[i]),cbc_in,
				 strlen((char *)cbc_data)+1,ks,
				 &cbc_iv,DES_ENCRYPT);
		}
	printf("\noutput word alignment test");
	for (i=0; i<4; i++)
		{
		printf(" %d",i);
		des_ncbc_encrypt(cbc_out,&(cbc_in[i]),
				 strlen((char *)cbc_data)+1,ks,
				 &cbc_iv,DES_ENCRYPT);
		}
	printf("\n");
	printf("fast crypt test ");
	str=crypt("testing","ef");
	if (strcmp("efGnQx2725bI2",str) != 0)
		{
		printf("fast crypt error, %s should be efGnQx2725bI2\n",str);
		err=1;
		}
	str=crypt("bca76;23","yA");
	if (strcmp("yA1Rp/1hZXIJk",str) != 0)
		{
		printf("fast crypt error, %s should be yA1Rp/1hZXIJk\n",str);
		err=1;
		}
	printf("\n");
	return(err);
	}
Beispiel #3
0
int32 destest(void) {
	int i,j,err=0;
	des_cblock in,out,outin,iv3,iv2;
	des_key_schedule ks,ks2,ks3;
	char cbc_in[40], simCbc_in[40], simEmbIVCbc_in[64];
	char cbc_out[40], simCbc_out[40], simEmbIVCbc_out[64];
	int8 desSimCipherData[8], desSimPlainData[8], key[24];

	rtlglue_printf("Doing ecb\n");
	for (i=0; i<NUM_TESTS; i++) {
		int8 desSimCipherData[8], desSimPlainData[8];
		
		des_set_key(key_data[i], ks);
		memcpy(in, plain_data[i],8);
		memset(out,0,8);
		memset(outin,0,8);
		des_ecb_encrypt(&in,&out,ks,DES_ENCRYPT);
		des_ecb_encrypt(&out,&outin,ks,DES_DECRYPT);
		
		if(desSim_ecb_encrypt(plain_data[i], &desSimCipherData[0], 8, key_data[i], TRUE) != SUCCESS)
			rtlglue_printf("desSimulator ecb encrypt failed\n");
		if(desSim_ecb_encrypt(cipher_data[i], &desSimPlainData[0], 8, key_data[i], FALSE) != SUCCESS)
			rtlglue_printf("desSimulator ecb decrypt failed\n");
			
		if (memcmp(out,cipher_data[i],8) != 0) {
			rtlglue_printf("Encryption error %2d\nk=%s p=%s o=%s act=%s\n",
				i+1,pt(key_data[i]),pt((char *)in),pt(cipher_data[i]),
				pt((char *)out));
			err=1;
		}
		
		if (memcmp(in,outin,8) != 0) {
			rtlglue_printf("Decryption error %2d\nk=%s p=%s o=%s act=%s\n",
				i+1,pt(key_data[i]),pt((char *)out),pt((char *)in),pt((char *)outin));
			err=1;
		}

		if(memcmp(&desSimCipherData[0], &cipher_data[i], 8) != 0) {
			rtlglue_printf("desSim ecb Encryption error %2d\nk=%s plain=%s Expect cipher=%s crypt result=%s\n",
				i+1,pt(key_data[i]),pt(plain_data[8]),pt(cipher_data[i]), pt(&desSimCipherData[0]));
			err=1;
		}

		if(memcmp(&desSimPlainData[0], plain_data[i], 8) != 0) {
			rtlglue_printf("desSim ecb Decryption error %2d\nk=%s Crypted data=%s Expect plain=%s decrypt result=%s\n",
				i+1,pt(key_data[i]),pt(cipher_data[i]),pt(plain_data[i]), pt(&desSimPlainData[0]));
			err=1;
		}
	}

	rtlglue_printf("Doing ede ecb\n");
	for (i=0; i<(NUM_TESTS-1); i++)	{

		des_set_key((int8*)&key_data[i], ks);
		des_set_key((int8*)&key_data[i+1], ks2);
//		des_set_key(&key_data[i+2], ks3);	//This code is useless...legacy?
		memcpy(in,plain_data[i],8);
		memset(out,0,8);
		memset(outin,0,8);
		des_ecb2_encrypt(&in,&out,ks,ks2,DES_ENCRYPT);
		des_ecb2_encrypt(&out,&outin,ks,ks2,DES_DECRYPT);

		memcpy(&key[0], &key_data[i], 8);
		memcpy(&key[8], &key_data[i+1], 8);
		memcpy(&key[16], &key_data[i], 8);
		if(desSim_ede_ecb_encrypt(plain_data[i], &desSimCipherData[0], 8, &key[0], TRUE) != SUCCESS)
			rtlglue_printf("desSimulator ede ecb encrypt failed\n");
		if(desSim_ede_ecb_encrypt(cipher_ecb2[i], &desSimPlainData[0], 8, &key[0], FALSE) != SUCCESS)
			rtlglue_printf("desSimulator ede ecb decrypt failed\n");
			
		if (memcmp(out,cipher_ecb2[i],8) != 0)
			{
			rtlglue_printf("Encryption error %2d\nk=%s %s p=%s o=%s act=%s\n",
				i+1,pt(key_data[i]),pt(key_data[i+1]),pt(in),pt(cipher_ecb2[i]),
				pt(out));
			err=1;
			}
		if (memcmp(in,outin,8) != 0)
			{
			rtlglue_printf("Decryption error %2d\nk=%s %s p=%s o=%s act=%s\n",
				i+1,pt(key_data[i]),pt(key_data[i+1]),pt(out),pt(in),pt(outin));
			err=1;
			}
		if(memcmp(&desSimCipherData[0], &cipher_ecb2[i], 8) != 0) {
			rtlglue_printf("desSim cbc ecb encryption error %2d\nk=%s plain=%s Expect cipher=%s crypt result=%s\n",
				i+1,pt(key_data[i]),pt(plain_data[8]),pt(cipher_ecb2[i]), pt(&desSimCipherData[0]));
			err=1;
		}

		if(memcmp(&desSimPlainData[0], plain_data[i], 8) != 0) {
			rtlglue_printf("desSim cbc ecb decryption error %2d\nk=%s Crypted data=%s Expect plain=%s decrypt result=%s\n",
				i+1,pt(key_data[i]),pt(cipher_ecb2[i]),pt(plain_data[i]), pt(&desSimPlainData[0]));
			err=1;
		}
	}

	rtlglue_printf("Doing cbc\n");
	if ((j=des_set_key(&cbc_key, ks)) != 0)
		rtlglue_printf("Key error %d\n",j);

	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_ncbc_encrypt(cbc_data,cbc_out,strlen((char *)cbc_data)+1,ks, &iv3, TRUE);
	if (memcmp(cbc_out,cbc_ok,32) != 0)
		rtlglue_printf("cbc_encrypt encrypt error\n");

	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_ncbc_encrypt(cbc_out,cbc_in,strlen((char *)cbc_data)+1,ks, &iv3, FALSE);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)) != 0)
		rtlglue_printf("cbc_encrypt decrypt error\n");

	if(desSim_cbc_encrypt(cbc_data, simCbc_out, strlen((char *)cbc_data)+1, &cbc_key[0], &cbc_iv[0], TRUE) != SUCCESS)
		rtlglue_printf("desSim cbc encryption error\n");
	if (memcmp(simCbc_out,cbc_ok,32) != 0)
		rtlglue_printf("desSim cbc encrypt result error\n");

	memcpy(&simEmbIVCbc_in[0], &cbc_iv[0], 8);
	memcpy(&simEmbIVCbc_in[8], &cbc_data[0], 40);
	if(desSim_cbc_encryptEmbIV(&simEmbIVCbc_in[0], &simEmbIVCbc_out[0], strlen((char *)cbc_data)+9, &cbc_key[0], TRUE) != SUCCESS)
		rtlglue_printf("desSim cbc embed IV encrypt failed\n");
	if (memcmp(&simEmbIVCbc_out[8], cbc_ok,32) != 0)
		rtlglue_printf("desSim cbc embed IV encrypt result error\n");
	
	//CBC Decrypt
	if(desSim_cbc_encrypt(simCbc_out, simCbc_in, strlen((char *)cbc_data)+1, &cbc_key[0], &cbc_iv[0], FALSE) != SUCCESS) 
		rtlglue_printf("desSim cbc decryption error\n");
	if (memcmp(simCbc_in,cbc_data,strlen((char *)cbc_data)) != 0)
		rtlglue_printf("desSim cbc decrypt error\n");

	memcpy(&simEmbIVCbc_out[0], &cbc_iv[0], 8);
	if(desSim_cbc_encryptEmbIV(&simEmbIVCbc_out[0], &simEmbIVCbc_in[0], strlen((char *)cbc_data)+9, &cbc_key[0], FALSE) != SUCCESS)
		rtlglue_printf("desSim cbc embed IV decrypt failed\n");
	if (memcmp(&simEmbIVCbc_in[8], cbc_data,strlen((char *)cbc_data)) != 0)
		rtlglue_printf("desSim cbc embed IV decrypt error\n");
	
	
	rtlglue_printf("Doing ede cbc\n");
	if ((j=des_set_key(&cbc_key, ks)) != 0)
		rtlglue_printf("Key1 error %d\n",j);
	if ((j=des_set_key(&cbc2_key, ks2)) != 0)
		rtlglue_printf("Key2 error %d\n",j);
	if ((j=des_set_key(&cbc3_key, ks3)) != 0)
		rtlglue_printf("Key3 error %d\n",j);
	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	i=strlen((char *)cbc_data)+1;
	/* i=((i+7)/8)*8; */
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));

	des_ede3_cbc_encrypt(cbc_data,cbc_out,i,ks,ks2,ks3,&iv3, DES_ENCRYPT);
//	des_ede3_cbc_encrypt(cbc_data,cbc_out,16L,ks,ks2,ks3,&iv3, DES_ENCRYPT);
//	des_ede3_cbc_encrypt(&(cbc_data[16]),&(cbc_out[16]),i-16,ks,ks2,ks3, &iv3,DES_ENCRYPT);
	if (memcmp(cbc_out,cbc3_ok,
		(unsigned int)(strlen((char *)cbc_data)+1+7)/8*8) != 0)
		{
		int n;

		rtlglue_printf("des_ede3_cbc_encrypt encrypt error\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",cbc_out[n]);
		rtlglue_printf("\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",cbc3_ok[n]);
		rtlglue_printf("\n");
		err=1;
		}

	memcpy(&key[0], &cbc_key[0], 8);
	memcpy(&key[8], &cbc2_key[0], 8);
	memcpy(&key[16], &cbc3_key[0], 8);
	if(desSim_ede_cbc_encrypt(&cbc_data[0], &simCbc_out[0], strlen((char *)cbc_data)+1, &key[0], &cbc_iv[0], TRUE) != SUCCESS)
		rtlglue_printf("desSim ede cbc encrypt failed\n");
	if(memcmp(simCbc_out, cbc3_ok, (unsigned int)(strlen((char *)cbc_data)+1+7)/8*8) != 0)
		rtlglue_printf("desSim ede cbc encrypt result error\n");

	memcpy(&simEmbIVCbc_in[0], &cbc_iv[0], 8);
	memcpy(&simEmbIVCbc_in[8], &cbc_data[0], 40);
	if(desSim_ede_cbc_encryptEmbIV(&simEmbIVCbc_in[0], &simEmbIVCbc_out[0], strlen((char *)cbc_data)+1+8, &key[0], TRUE) != SUCCESS)
		rtlglue_printf("desSim ede cbc embed IV encrypt failed\n");
	if(memcmp(&simEmbIVCbc_out[8], cbc3_ok, (unsigned int)(strlen((char *)cbc_data)+1+7)/8*8) != 0)
		rtlglue_printf("desSim ede cbc embed IV encrypt result error\n");
	
	
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_ede3_cbc_encrypt(cbc_out,cbc_in,i,ks,ks2,ks3,&iv3,FALSE);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0) {
		int n;

		rtlglue_printf("des_ede3_cbc_encrypt decrypt error\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",cbc_data[n]);
		rtlglue_printf("\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",cbc_in[n]);
		rtlglue_printf("\n");
		err=1;
	}

	if(desSim_ede_cbc_encrypt(&simCbc_out[0], &simCbc_in[0], i, &key[0], &cbc_iv[0], FALSE) != SUCCESS)
		rtlglue_printf("desSim ede cbc decrypt failed\n");
	if(memcmp(simCbc_in, cbc_data, strlen((char *)cbc_data)+1) != 0) {
		int n;
		rtlglue_printf("desSim ede cbc decrypt result error\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",cbc_data[n]);
		rtlglue_printf("\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",simCbc_in[n]);
		rtlglue_printf("\n");
	}

	memcpy(&simEmbIVCbc_out[0], &cbc_iv[0], 8);
	if(desSim_ede_cbc_encryptEmbIV(&simEmbIVCbc_out[0], &simEmbIVCbc_in[0], i+8, &key[0], FALSE) != SUCCESS)
		rtlglue_printf("desSim ede cbc embed IV decrypt failed\n");
	if(memcmp(&simEmbIVCbc_in[8], cbc_data, strlen((char *)cbc_data)+1) != 0) {
		int n;
		rtlglue_printf("desSim ede cbc embed IV decrypt result error\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",cbc_data[n]);
		rtlglue_printf("\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",simEmbIVCbc_in[n+8]);
		rtlglue_printf("\n");
	}

	//Crypto engine not implemented part
	rtlglue_printf("No crypto engine verification part\n");
	rtlglue_printf("Doing cbcm\n");
	if ((j=des_set_key(&cbc_key, ks)) != 0)
		{
		rtlglue_printf("Key error %d\n",j);
		err=1;
		}
	if ((j=des_set_key(&cbc2_key, ks2)) != 0)
		{
		rtlglue_printf("Key error %d\n",j);
		err=1;
		}
	if ((j=des_set_key(&cbc3_key, ks3)) != 0)
		{
		rtlglue_printf("Key error %d\n",j);
		err=1;
		}
	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	i=strlen((char *)cbc_data)+1;
	/* i=((i+7)/8)*8; */
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	memset(iv2,'\0',sizeof iv2);

	des_ede3_cbcm_encrypt(cbc_data,cbc_out,16L,&ks,&ks2,&ks3,&iv3,&iv2,
			      DES_ENCRYPT);
	des_ede3_cbcm_encrypt(&cbc_data[16],&cbc_out[16],i-16,&ks,&ks2,&ks3,
			      &iv3,&iv2,DES_ENCRYPT);
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	memset(iv2,'\0',sizeof iv2);
	des_ede3_cbcm_encrypt(cbc_out,cbc_in,i,&ks,&ks2,&ks3,&iv3,&iv2,DES_DECRYPT);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0) {
		int n;

		rtlglue_printf("des_ede3_cbcm_encrypt decrypt error\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",cbc_data[n]);
		rtlglue_printf("\n");
		for(n=0 ; n < i ; ++n)
		    rtlglue_printf(" %02x",cbc_in[n]);
		rtlglue_printf("\n");
		err=1;
	} 
	rtlglue_printf("Doing desx cbc\n");
	if ((j=des_set_key(&cbc_key, ks)) != 0) {
		rtlglue_printf("Key error %d\n",j);
		err=1;
	}
	memset(cbc_out,0,40);
	memset(cbc_in,0,40);
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_xcbc_encrypt(cbc_data,cbc_out,strlen((char *)cbc_data)+1,ks,
			 &iv3,&cbc2_key,&cbc3_key, DES_ENCRYPT);
	if (memcmp(cbc_out,xcbc_ok,32) != 0) {
		rtlglue_printf("des_xcbc_encrypt encrypt error\n");
		err=1;
	}
	memcpy(iv3,cbc_iv,sizeof(cbc_iv));
	des_xcbc_encrypt(cbc_out,cbc_in,strlen((char *)cbc_data)+1,ks,
			 &iv3,&cbc2_key,&cbc3_key, DES_DECRYPT);
	if (memcmp(cbc_in,cbc_data,strlen((char *)cbc_data)+1) != 0) {
		rtlglue_printf("des_xcbc_encrypt decrypt error\n");
		err=1;
	}

	return(err);
}