From 8e06fc4c0dc8e5886da79dd10f2f8e3052b3602a Mon Sep 17 00:00:00 2001 From: Alexandre Julliard Date: Tue, 12 Sep 2006 14:45:48 +0200 Subject: [PATCH] crypt32: Comment out an unreliable test. --- dlls/crypt32/tests/encode.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/dlls/crypt32/tests/encode.c b/dlls/crypt32/tests/encode.c index 50e37252349..b7d53416319 100644 --- a/dlls/crypt32/tests/encode.c +++ b/dlls/crypt32/tests/encode.c @@ -199,7 +199,7 @@ static void test_decodeInt(DWORD dwEncoding) static const BYTE bigInt[] = { 2, 5, 0xff, 0xfe, 0xff, 0xfe, 0xff }; static const BYTE testStr[] = { 0x16, 4, 't', 'e', 's', 't' }; static const BYTE longForm[] = { 2, 0x81, 0x01, 0x01 }; - static const BYTE bigBogus[] = { 0x02, 0x84, 0x01, 0xff, 0xff, 0xf9 }; + /* static const BYTE bigBogus[] = { 0x02, 0x84, 0x01, 0xff, 0xff, 0xf9 }; */ BYTE *buf = NULL; DWORD bufSize = 0; int i; @@ -324,10 +324,12 @@ static void test_decodeInt(DWORD dwEncoding) /* This will try to decode the buffer and overflow it, check that it's * caught. */ +#if 0 /* a large buffer isn't guaranteed to crash, it depends on memory allocation order */ ret = CryptDecodeObjectEx(dwEncoding, X509_MULTI_BYTE_INTEGER, bigBogus, 0x01ffffff, CRYPT_DECODE_ALLOC_FLAG, NULL, (BYTE *)&buf, &bufSize); ok(!ret && GetLastError() == STATUS_ACCESS_VIOLATION, "Expected STATUS_ACCESS_VIOLATION, got %08lx\n", GetLastError()); +#endif } static const BYTE bin18[] = {0x0a,0x01,0x01};