cmac: improve parameter validation test suite
Extend the scope of NULL cipher info tests
diff --git a/tests/suites/test_suite_cmac.function b/tests/suites/test_suite_cmac.function
index a74e86a..25c56a6 100644
--- a/tests/suites/test_suite_cmac.function
+++ b/tests/suites/test_suite_cmac.function
@@ -27,54 +27,75 @@
mbedtls_cipher_init( &ctx );
/* Test NULL cipher info */
- TEST_INVALID_PARAM( mbedtls_cipher_cmac_update( &ctx, test_data, 16 ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_starts( &ctx, test_key, 128 ) );
+
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_update( &ctx, test_data, 16 ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_finish( &ctx, test_output ) );
+
cipher_info = mbedtls_cipher_info_from_type( MBEDTLS_CIPHER_AES_128_ECB );
- TEST_ASSERT( mbedtls_cipher_setup( &ctx, cipher_info ) == 0 );
+ TEST_ASSERT( mbedtls_cipher_setup( &ctx, cipher_info ) == 0 );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac_starts( NULL, test_key, 128 ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_starts( NULL, test_key, 128 ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac_starts( &ctx, NULL, 128 ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_starts( &ctx, NULL, 128 ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac_update( NULL, test_data, 16 ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_update( NULL, test_data, 16 ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac_update( &ctx, NULL, 16 ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_update( &ctx, NULL, 16 ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac_finish( NULL, test_output ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_finish( NULL, test_output ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac_finish( &ctx, NULL ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_finish( &ctx, NULL ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac_reset( NULL ) );
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac_reset( NULL ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac( NULL,
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac( NULL,
test_key, 128,
test_data, 16,
test_output ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac( cipher_info,
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac( cipher_info,
NULL, 128,
test_data, 16,
test_output ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac( cipher_info,
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac( cipher_info,
test_key, 128,
NULL, 16,
test_output ) );
- TEST_INVALID_PARAM( mbedtls_cipher_cmac( cipher_info,
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_cipher_cmac( cipher_info,
test_key, 128,
test_data, 16,
NULL ) );
- TEST_INVALID_PARAM( mbedtls_aes_cmac_prf_128( NULL, 16,
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_aes_cmac_prf_128( NULL, 16,
test_data, 16,
test_output ) );
- TEST_INVALID_PARAM( mbedtls_aes_cmac_prf_128( test_key, 16,
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_aes_cmac_prf_128( test_key, 16,
NULL, 16,
test_output ) );
- TEST_INVALID_PARAM( mbedtls_aes_cmac_prf_128( test_key, 16,
+ TEST_INVALID_PARAM_RET( MBEDTLS_ERR_CIPHER_BAD_INPUT_DATA,
+ mbedtls_aes_cmac_prf_128( test_key, 16,
test_data, 16,
NULL ) );