Skip to content

Commit b06f193

Browse files
author
Hanno Becker
committed
Add missing cases to RSA parameter validation test
1 parent 5bdfca9 commit b06f193

File tree

1 file changed

+37
-0
lines changed

1 file changed

+37
-0
lines changed

tests/suites/test_suite_rsa.function

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -302,6 +302,12 @@ void rsa_invalid_param( )
302302
valid_mode,
303303
0, sizeof( buf ), buf,
304304
NULL ) );
305+
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
306+
mbedtls_rsa_rsassa_pkcs1_v15_sign( &ctx, NULL, NULL,
307+
valid_mode,
308+
MBEDTLS_MD_SHA1,
309+
0, NULL,
310+
buf ) );
305311

306312
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
307313
mbedtls_rsa_rsassa_pss_sign( NULL, NULL, NULL,
@@ -323,6 +329,12 @@ void rsa_invalid_param( )
323329
valid_mode,
324330
0, sizeof( buf ), buf,
325331
NULL ) );
332+
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
333+
mbedtls_rsa_rsassa_pss_sign( &ctx, NULL, NULL,
334+
valid_mode,
335+
MBEDTLS_MD_SHA1,
336+
0, NULL,
337+
buf ) );
326338

327339
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
328340
mbedtls_rsa_pkcs1_verify( NULL, NULL, NULL,
@@ -344,6 +356,11 @@ void rsa_invalid_param( )
344356
valid_mode,
345357
0, sizeof( buf ), buf,
346358
NULL ) );
359+
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
360+
mbedtls_rsa_pkcs1_verify( &ctx, NULL, NULL,
361+
valid_mode,
362+
MBEDTLS_MD_SHA1, 0, NULL,
363+
buf ) );
347364

348365
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
349366
mbedtls_rsa_rsassa_pkcs1_v15_verify( NULL, NULL,
@@ -369,6 +386,13 @@ void rsa_invalid_param( )
369386
valid_mode,
370387
0, sizeof( buf ), buf,
371388
NULL ) );
389+
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
390+
mbedtls_rsa_rsassa_pkcs1_v15_verify( &ctx, NULL,
391+
NULL,
392+
valid_mode,
393+
MBEDTLS_MD_SHA1,
394+
0, NULL,
395+
buf ) );
372396

373397
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
374398
mbedtls_rsa_rsassa_pss_verify( NULL, NULL, NULL,
@@ -390,6 +414,12 @@ void rsa_invalid_param( )
390414
valid_mode,
391415
0, sizeof( buf ),
392416
buf, NULL ) );
417+
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
418+
mbedtls_rsa_rsassa_pss_verify( &ctx, NULL, NULL,
419+
valid_mode,
420+
MBEDTLS_MD_SHA1,
421+
0, NULL,
422+
buf ) );
393423

394424
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
395425
mbedtls_rsa_rsassa_pss_verify_ext( NULL, NULL, NULL,
@@ -417,6 +447,13 @@ void rsa_invalid_param( )
417447
0, sizeof( buf ),
418448
buf, 0, 0,
419449
NULL ) );
450+
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
451+
mbedtls_rsa_rsassa_pss_verify_ext( &ctx, NULL, NULL,
452+
valid_mode,
453+
MBEDTLS_MD_SHA1,
454+
0, NULL,
455+
0, 0,
456+
buf ) );
420457

421458
TEST_INVALID_PARAM_RET( MBEDTLS_ERR_RSA_BAD_INPUT_DATA,
422459
mbedtls_rsa_copy( NULL, &ctx ) );

0 commit comments

Comments
 (0)