Switch pkparse to use new mbedtls_pkcs12_pbe_ext function
Switch pkparse to use new mbedtls_pkcs12_pbe_ext function
and deprecate mbedtls_pkcs12_pbe function.
Signed-off-by: Waleed Elmelegy <waleed.elmelegy@arm.com>
diff --git a/tests/suites/test_suite_pkcs12.function b/tests/suites/test_suite_pkcs12.function
index 3e8ff5b..1d0c287 100644
--- a/tests/suites/test_suite_pkcs12.function
+++ b/tests/suites/test_suite_pkcs12.function
@@ -90,6 +90,7 @@
pbe_params.len = params_hex->len;
pbe_params.p = params_hex->x;
+#if defined(MBEDTLS_TEST_DEPRECATED)
if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
my_ret = mbedtls_pkcs12_pbe(&pbe_params, MBEDTLS_PKCS12_PBE_ENCRYPT, cipher_alg,
md_alg, pw->x, pw->len, data->x, data->len, my_out);
@@ -99,6 +100,7 @@
ASSERT_COMPARE(my_out, ref_out->len,
ref_out->x, ref_out->len);
}
+#endif
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)
@@ -143,6 +145,7 @@
pbe_params.len = params_hex->len;
pbe_params.p = params_hex->x;
+#if defined(MBEDTLS_TEST_DEPRECATED)
if (ref_ret != MBEDTLS_ERR_ASN1_BUF_TOO_SMALL) {
my_ret = mbedtls_pkcs12_pbe(&pbe_params, MBEDTLS_PKCS12_PBE_DECRYPT, cipher_alg,
md_alg, pw->x, pw->len, data->x, data->len, my_out);
@@ -153,6 +156,7 @@
ASSERT_COMPARE(my_out, ref_out->len,
ref_out->x, ref_out->len);
}
+#endif
#if defined(MBEDTLS_CIPHER_PADDING_PKCS7)