@@ -22755,7 +22755,7 @@ static int test_wc_GetPubKeyDerFromCert(void)
2275522755 return EXPECT_RESULT();
2275622756}
2275722757
22758- static int test_wc_ExportX509PubKeyWithSpki (void)
22758+ static int test_wc_GetSubjectPubKeyInfoDerFromCert (void)
2275922759{
2276022760 EXPECT_DECLS;
2276122761#if !defined(NO_RSA) || defined(HAVE_ECC)
@@ -22809,8 +22809,8 @@ static int test_wc_ExportX509PubKeyWithSpki(void)
2280922809#endif
2281022810
2281122811 /* good test case - RSA DER cert */
22812- ExpectIntEQ(wc_ExportX509PubKeyWithSpki (rsaCertDer, rsaCertDerSz, keyDer ,
22813- &keyDerSz), 0);
22812+ ExpectIntEQ(wc_GetSubjectPubKeyInfoDerFromCert (rsaCertDer, rsaCertDerSz,
22813+ keyDer, &keyDerSz), 0);
2281422814 ExpectIntGT(keyDerSz, 0);
2281522815
2281622816 /* sanity check, verify we can import DER public key */
@@ -22823,18 +22823,20 @@ static int test_wc_ExportX509PubKeyWithSpki(void)
2282322823
2282422824 /* bad args: certDer */
2282522825 keyDerSz = (word32)sizeof(keyDer);
22826- ExpectIntEQ(wc_ExportX509PubKeyWithSpki (NULL, rsaCertDerSz, keyDer,
22827- &keyDerSz),
22826+ ExpectIntEQ(wc_GetSubjectPubKeyInfoDerFromCert (NULL, rsaCertDerSz, keyDer,
22827+ &keyDerSz),
2282822828 WC_NO_ERR_TRACE(BAD_FUNC_ARG));
2282922829
2283022830 /* bad args: 0 sized certSz */
2283122831 keyDerSz = (word32)sizeof(keyDer);
22832- ExpectIntEQ(wc_ExportX509PubKeyWithSpki(rsaCertDer, 0, keyDer, &keyDerSz),
22832+ ExpectIntEQ(wc_GetSubjectPubKeyInfoDerFromCert(rsaCertDer, 0, keyDer,
22833+ &keyDerSz),
2283322834 WC_NO_ERR_TRACE(BAD_FUNC_ARG));
2283422835
2283522836 /* bad args: NULL inout size */
22836- ExpectIntEQ(ret = wc_ExportX509PubKeyWithSpki(rsaCertDer, rsaCertDerSz,
22837- keyDer, NULL),
22837+ ExpectIntEQ(ret = wc_GetSubjectPubKeyInfoDerFromCert(rsaCertDer,
22838+ rsaCertDerSz, keyDer,
22839+ NULL),
2283822840 WC_NO_ERR_TRACE(BAD_FUNC_ARG));
2283922841
2284022842 /* Certificate Request Tests */
@@ -22849,8 +22851,10 @@ static int test_wc_ExportX509PubKeyWithSpki(void)
2284922851
2285022852 /* good test case - RSA DER certificate request */
2285122853 keyDerSz = sizeof(keyDer);
22852- ExpectIntEQ(ret = wc_ExportX509PubKeyWithSpki(rsaCertDer, rsaCertDerSz,
22853- keyDer, &keyDerSz), 0);
22854+ ExpectIntEQ(ret = wc_GetSubjectPubKeyInfoDerFromCert(rsaCertDer,
22855+ rsaCertDerSz,
22856+ keyDer,
22857+ &keyDerSz), 0);
2285422858 ExpectIntGT(keyDerSz, 0);
2285522859
2285622860 /* sanity check, verify we can import DER public key */
@@ -22878,8 +22882,8 @@ static int test_wc_ExportX509PubKeyWithSpki(void)
2287822882 /* good test case - ECC */
2287922883 XMEMSET(keyDer, 0, sizeof(keyDer));
2288022884 keyDerSz = sizeof(keyDer);
22881- ExpectIntEQ(wc_ExportX509PubKeyWithSpki (eccCert, eccCertSz, keyDer,
22882- &keyDerSz), 0);
22885+ ExpectIntEQ(wc_GetSubjectPubKeyInfoDerFromCert (eccCert, eccCertSz, keyDer,
22886+ &keyDerSz), 0);
2288322887 ExpectIntGT(keyDerSz, 0);
2288422888
2288522889 /* sanity check, verify we can import DER public key */
@@ -66987,7 +66991,7 @@ TEST_CASE testCases[] = {
6698766991 TEST_DECL(test_wc_PubKeyPemToDer),
6698866992 TEST_DECL(test_wc_PemPubKeyToDer),
6698966993 TEST_DECL(test_wc_GetPubKeyDerFromCert),
66990- TEST_DECL(test_wc_ExportX509PubKeyWithSpki ),
66994+ TEST_DECL(test_wc_GetSubjectPubKeyInfoDerFromCert ),
6699166995 TEST_DECL(test_wc_CheckCertSigPubKey),
6699266996
6699366997 /* wolfCrypt ASN tests */
0 commit comments