@@ -24629,7 +24629,7 @@ int wc_CertGetPubKey(const byte* cert, word32 certSz,
2462924629 * @return BUFFER_E if the provided buffer is too small
2463024630 */
2463124631WOLFSSL_API int wc_GetSubjectPubKeyInfoDerFromCert(const byte* certDer,
24632- word32 certSz ,
24632+ word32 certDerSz ,
2463324633 byte* pubKeyDer,
2463424634 word32* pubKeyDerSz)
2463524635{
@@ -24640,14 +24640,14 @@ WOLFSSL_API int wc_GetSubjectPubKeyInfoDerFromCert(const byte* certDer,
2464024640 word32 length;
2464124641 int badDate;
2464224642
24643- if (certDer == NULL || certSz == 0 || pubKeyDerSz == NULL) {
24643+ if (certDer == NULL || certDerSz == 0 || pubKeyDerSz == NULL) {
2464424644 return BAD_FUNC_ARG;
2464524645 }
2464624646
2464724647 length = 0;
2464824648 badDate = 0;
2464924649
24650- wc_InitDecodedCert(&cert, certDer, certSz , NULL);
24650+ wc_InitDecodedCert(&cert, certDer, certDerSz , NULL);
2465124651
2465224652 /* Parse up to the SubjectPublicKeyInfo */
2465324653 ret = wc_GetPubX509(&cert, 0, &badDate);
@@ -24657,7 +24657,7 @@ WOLFSSL_API int wc_GetSubjectPubKeyInfoDerFromCert(const byte* certDer,
2465724657
2465824658 /* Get the length of the SubjectPublicKeyInfo sequence */
2465924659 idx = startIdx;
24660- ret = GetSequence(certDer, &idx, (int*)&length, certSz );
24660+ ret = GetSequence(certDer, &idx, (int*)&length, certDerSz );
2466124661 if (ret >= 0) {
2466224662 /* Calculate total length including sequence header */
2466324663 length += (idx - startIdx);
0 commit comments