Add some test vectors to get coverage for the IV that is output by CTS
implementations.

Signed-off-by: Ard Biesheuvel <a...@kernel.org>
---
 crypto/testmgr.h | 12 ++++++++++++
 1 file changed, 12 insertions(+)

diff --git a/crypto/testmgr.h b/crypto/testmgr.h
index d29983908c38..d45fa1ad91ee 100644
--- a/crypto/testmgr.h
+++ b/crypto/testmgr.h
@@ -31041,6 +31041,8 @@ static const struct cipher_testvec 
cts_mode_tv_template[] = {
                .ctext  = "\xc6\x35\x35\x68\xf2\xbf\x8c\xb4"
                          "\xd8\xa5\x80\x36\x2d\xa7\xff\x7f"
                          "\x97",
+               .iv_out = "\xc6\x35\x35\x68\xf2\xbf\x8c\xb4"
+                         "\xd8\xa5\x80\x36\x2d\xa7\xff\x7f",
        }, {
                .klen   = 16,
                .key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
@@ -31054,6 +31056,8 @@ static const struct cipher_testvec 
cts_mode_tv_template[] = {
                          "\xd4\x45\xd4\xc8\xef\xf7\xed\x22"
                          "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
                          "\xc0\x7b\x25\xe2\x5e\xcf\xe5",
+               .iv_out = "\xfc\x00\x78\x3e\x0e\xfd\xb2\xc1"
+                         "\xd4\x45\xd4\xc8\xef\xf7\xed\x22",
        }, {
                .klen   = 16,
                .key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
@@ -31067,6 +31071,8 @@ static const struct cipher_testvec 
cts_mode_tv_template[] = {
                          "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8"
                          "\x97\x68\x72\x68\xd6\xec\xcc\xc0"
                          "\xc0\x7b\x25\xe2\x5e\xcf\xe5\x84",
+               .iv_out = "\x39\x31\x25\x23\xa7\x86\x62\xd5"
+                         "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8",
        }, {
                .klen   = 16,
                .key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
@@ -31084,6 +31090,8 @@ static const struct cipher_testvec 
cts_mode_tv_template[] = {
                          "\x1b\x55\x49\xd2\xf8\x38\x02\x9e"
                          "\x39\x31\x25\x23\xa7\x86\x62\xd5"
                          "\xbe\x7f\xcb\xcc\x98\xeb\xf5",
+               .iv_out = "\xb3\xff\xfd\x94\x0c\x16\xa1\x8c"
+                         "\x1b\x55\x49\xd2\xf8\x38\x02\x9e",
        }, {
                .klen   = 16,
                .key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
@@ -31101,6 +31109,8 @@ static const struct cipher_testvec 
cts_mode_tv_template[] = {
                          "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8"
                          "\x39\x31\x25\x23\xa7\x86\x62\xd5"
                          "\xbe\x7f\xcb\xcc\x98\xeb\xf5\xa8",
+               .iv_out = "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0"
+                         "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8",
        }, {
                .klen   = 16,
                .key    = "\x63\x68\x69\x63\x6b\x65\x6e\x20"
@@ -31122,6 +31132,8 @@ static const struct cipher_testvec 
cts_mode_tv_template[] = {
                          "\x26\x73\x0d\xbc\x2f\x7b\xc8\x40"
                          "\x9d\xad\x8b\xbb\x96\xc4\xcd\xc0"
                          "\x3b\xc1\x03\xe1\xa1\x94\xbb\xd8",
+               .iv_out = "\x48\x07\xef\xe8\x36\xee\x89\xa5"
+                         "\x26\x73\x0d\xbc\x2f\x7b\xc8\x40",
        }
 };
 
-- 
2.20.1

Reply via email to