const bool use_trustedsystemcerts,
ckmc_cert_list_s **ppcert_chain_list)
{
- return ckmc_get_certificate_chain(cert,
- untrustedcerts,
- trustedcerts,
- use_trustedsystemcerts,
- ppcert_chain_list);
+ return ckmc_get_cert_chain_with_trustedcert(cert,
+ untrustedcerts,
+ trustedcerts,
+ use_trustedsystemcerts,
+ ppcert_chain_list);
}
static int createChainWithAlias(const ckmc_cert_s *cert,
const bool use_trustedsystemcerts,
ckmc_cert_list_s **ppcert_chain_list)
{
- return ckmc_get_certificate_chain_with_alias(cert,
- untrustedcerts,
- trustedcerts,
- use_trustedsystemcerts,
- ppcert_chain_list);
+ return ckmc_get_cert_chain_with_trustedcert_alias(cert,
+ untrustedcerts,
+ trustedcerts,
+ use_trustedsystemcerts,
+ ppcert_chain_list);
}
};
CertListPtr untrusted_c = create_cert_list(ca1, NULL);
ca1 = NULL;
- assert_invalid_param(ckmc_get_certificate_chain,
+ assert_invalid_param(ckmc_get_cert_chain_with_trustedcert,
NULL_CERT,
untrusted_c.get(),
untrusted_c.get(),
true,
&chain);
- assert_invalid_param(ckmc_get_certificate_chain,
+ assert_invalid_param(ckmc_get_cert_chain_with_trustedcert,
ca2,
untrusted_c.get(),
untrusted_c.get(),
save_cert(ca1, "CERT_IM_CA1");
AliasListPtr untrusted_a = create_alias_list("CERT_IM_CA1", NULL);
- assert_invalid_param(ckmc_get_certificate_chain_with_alias,
+ assert_invalid_param(ckmc_get_cert_chain_with_trustedcert_alias,
NULL_CERT,
untrusted_a.get(),
untrusted_a.get(),
true,
&chain);
- assert_invalid_param(ckmc_get_certificate_chain_with_alias,
+ assert_invalid_param(ckmc_get_cert_chain_with_trustedcert_alias,
ca2,
untrusted_a.get(),
untrusted_a.get(),
AliasListPtr non_existing = create_alias_list("NON_EXISTING_ALIAS", NULL);
assert_result(CKMC_ERROR_DB_ALIAS_UNKNOWN,
- ckmc_get_certificate_chain_with_alias,
+ ckmc_get_cert_chain_with_trustedcert_alias,
ca2,
non_existing.get(),
NULL_ALIASES,
&chain);
assert_result(CKMC_ERROR_DB_ALIAS_UNKNOWN,
- ckmc_get_certificate_chain_with_alias,
+ ckmc_get_cert_chain_with_trustedcert_alias,
ca2,
NULL_ALIASES,
non_existing.get(),
ckmc_pkcs12_s *ppkcs12 = NULL;
RUNNER_ASSERT_MSG(
- CKMC_ERROR_NONE == (temp = ckmc_load_from_pkcs12_file2(p12file, password, &ppkcs12)),
+ CKMC_ERROR_NONE == (temp = ckmc_pkcs12_load(p12file, password, &ppkcs12)),
CKMCReadableError(temp));
RUNNER_ASSERT_MSG(ppkcs12->priv_key != NULL, "Null private_key");
RUNNER_ASSERT_MSG(ppkcs12->cert != NULL, "Null cert");
ckmc_pkcs12_s *ppkcs12 = NULL;
int temp;
RUNNER_ASSERT_MSG(
- CKMC_ERROR_INVALID_FORMAT == (temp = ckmc_load_from_pkcs12_file2("/usr/share/ckm-test/test1801.pkcs12", wrong_passwd, &ppkcs12)),
+ CKMC_ERROR_INVALID_FORMAT == (temp = ckmc_pkcs12_load("/usr/share/ckm-test/test1801.pkcs12", wrong_passwd, &ppkcs12)),
CKMCReadableError(temp));
}
ckmc_pkcs12_s *ppkcs12 = NULL;
int temp;
RUNNER_ASSERT_MSG(
- CKMC_ERROR_NONE == (temp = ckmc_load_from_pkcs12_file2("/usr/share/ckm-test/pkcs.p12", NULL, &ppkcs12)),
+ CKMC_ERROR_NONE == (temp = ckmc_pkcs12_load("/usr/share/ckm-test/pkcs.p12", NULL, &ppkcs12)),
CKMCReadableError(temp));
RUNNER_ASSERT_MSG(NULL != ppkcs12->cert, "no certificate in PKCS12");