crypt32/tests: Use win_skip() to skip over unimplemented functionality.
This commit is contained in:
parent
3d777d6e61
commit
df4d664582
|
@ -449,10 +449,10 @@ START_TEST(base64)
|
||||||
if (pCryptBinaryToStringA)
|
if (pCryptBinaryToStringA)
|
||||||
testBinaryToStringA();
|
testBinaryToStringA();
|
||||||
else
|
else
|
||||||
skip("CryptBinaryToStringA is not available\n");
|
win_skip("CryptBinaryToStringA is not available\n");
|
||||||
|
|
||||||
if (pCryptStringToBinaryA)
|
if (pCryptStringToBinaryA)
|
||||||
testStringToBinaryA();
|
testStringToBinaryA();
|
||||||
else
|
else
|
||||||
skip("CryptStringToBinaryA is not available\n");
|
win_skip("CryptStringToBinaryA is not available\n");
|
||||||
}
|
}
|
||||||
|
|
|
@ -1672,12 +1672,12 @@ static void testVerifyCertSig(HCRYPTPROV csp, const CRYPT_DATA_BLOB *toBeSigned,
|
||||||
|
|
||||||
if (!pCryptVerifyCertificateSignatureEx)
|
if (!pCryptVerifyCertificateSignatureEx)
|
||||||
{
|
{
|
||||||
skip("no CryptVerifyCertificateSignatureEx support\n");
|
win_skip("no CryptVerifyCertificateSignatureEx support\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
if (!pCryptEncodeObjectEx)
|
if (!pCryptEncodeObjectEx)
|
||||||
{
|
{
|
||||||
skip("no CryptEncodeObjectEx support\n");
|
win_skip("no CryptEncodeObjectEx support\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
ret = pCryptVerifyCertificateSignatureEx(0, 0, 0, NULL, 0, NULL, 0, NULL);
|
ret = pCryptVerifyCertificateSignatureEx(0, 0, 0, NULL, 0, NULL, 0, NULL);
|
||||||
|
@ -1897,7 +1897,7 @@ static void testCreateSelfSignCert(void)
|
||||||
|
|
||||||
if (!pCertCreateSelfSignCertificate)
|
if (!pCertCreateSelfSignCertificate)
|
||||||
{
|
{
|
||||||
skip("CertCreateSelfSignCertificate() is not available\n");
|
win_skip("CertCreateSelfSignCertificate() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2334,7 +2334,7 @@ static void testGetValidUsages(void)
|
||||||
|
|
||||||
if (!pCertGetValidUsages)
|
if (!pCertGetValidUsages)
|
||||||
{
|
{
|
||||||
skip("CertGetValidUsages() is not available\n");
|
win_skip("CertGetValidUsages() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2875,7 +2875,7 @@ static void testAcquireCertPrivateKey(void)
|
||||||
|
|
||||||
if (!pCryptAcquireCertificatePrivateKey)
|
if (!pCryptAcquireCertificatePrivateKey)
|
||||||
{
|
{
|
||||||
skip("CryptAcquireCertificatePrivateKey() is not available\n");
|
win_skip("CryptAcquireCertificatePrivateKey() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -68,7 +68,7 @@ static void testCreateCertChainEngine(void)
|
||||||
|
|
||||||
if (!pCertCreateCertificateChainEngine || !pCertFreeCertificateChainEngine)
|
if (!pCertCreateCertificateChainEngine || !pCertFreeCertificateChainEngine)
|
||||||
{
|
{
|
||||||
skip("Cert*CertificateChainEngine() functions are not available\n");
|
win_skip("Cert*CertificateChainEngine() functions are not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1930,7 +1930,7 @@ static void testVerifyCertChainPolicy(void)
|
||||||
|
|
||||||
if (!pCertVerifyCertificateChainPolicy)
|
if (!pCertVerifyCertificateChainPolicy)
|
||||||
{
|
{
|
||||||
skip("CertVerifyCertificateChainPolicy() is not available\n");
|
win_skip("CertVerifyCertificateChainPolicy() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2010,7 +2010,7 @@ START_TEST(chain)
|
||||||
testCreateCertChainEngine();
|
testCreateCertChainEngine();
|
||||||
if (!pCertGetCertificateChain)
|
if (!pCertGetCertificateChain)
|
||||||
{
|
{
|
||||||
skip("CertGetCertificateChain() is not available\n");
|
win_skip("CertGetCertificateChain() is not available\n");
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
|
|
@ -219,7 +219,7 @@ static void testFindCRL(void)
|
||||||
if (!store) return;
|
if (!store) return;
|
||||||
if (!pCertFindCRLInStore)
|
if (!pCertFindCRLInStore)
|
||||||
{
|
{
|
||||||
skip("CertFindCRLInStore() is not available\n");
|
win_skip("CertFindCRLInStore() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -619,7 +619,7 @@ static void testFindCertInCRL(void)
|
||||||
|
|
||||||
if (!pCertFindCertificateInCRL)
|
if (!pCertFindCertificateInCRL)
|
||||||
{
|
{
|
||||||
skip("CertFindCertificateInCRL() is not available\n");
|
win_skip("CertFindCertificateInCRL() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -7497,7 +7497,7 @@ START_TEST(encode)
|
||||||
pCryptEncodeObjectEx = (void*)GetProcAddress(hCrypt32, "CryptEncodeObjectEx");
|
pCryptEncodeObjectEx = (void*)GetProcAddress(hCrypt32, "CryptEncodeObjectEx");
|
||||||
if (!pCryptDecodeObjectEx || !pCryptEncodeObjectEx)
|
if (!pCryptDecodeObjectEx || !pCryptEncodeObjectEx)
|
||||||
{
|
{
|
||||||
skip("CryptDecodeObjectEx() is not available\n");
|
win_skip("CryptDecodeObjectEx() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -531,7 +531,7 @@ static void test_enumOIDInfo(void)
|
||||||
|
|
||||||
if (!pCryptEnumOIDInfo)
|
if (!pCryptEnumOIDInfo)
|
||||||
{
|
{
|
||||||
skip("CryptEnumOIDInfo() is not available\n");
|
win_skip("CryptEnumOIDInfo() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -221,7 +221,7 @@ START_TEST(protectdata)
|
||||||
pCryptUnprotectData = (void*)GetProcAddress(hCrypt32, "CryptUnprotectData");
|
pCryptUnprotectData = (void*)GetProcAddress(hCrypt32, "CryptUnprotectData");
|
||||||
if (!pCryptProtectData || !pCryptUnprotectData)
|
if (!pCryptProtectData || !pCryptUnprotectData)
|
||||||
{
|
{
|
||||||
skip("Crypt(Un)ProtectData() is not available\n");
|
win_skip("Crypt(Un)ProtectData() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -285,7 +285,7 @@ static void testCollectionStore(void)
|
||||||
|
|
||||||
if (!pCertAddStoreToCollection)
|
if (!pCertAddStoreToCollection)
|
||||||
{
|
{
|
||||||
skip("CertAddStoreToCollection() is not available\n");
|
win_skip("CertAddStoreToCollection() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -545,7 +545,7 @@ static void testCollectionStore(void)
|
||||||
|
|
||||||
if (!pCertRemoveStoreFromCollection)
|
if (!pCertRemoveStoreFromCollection)
|
||||||
{
|
{
|
||||||
skip("CertRemoveStoreFromCollection() is not available\n");
|
win_skip("CertRemoveStoreFromCollection() is not available\n");
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
@ -639,7 +639,7 @@ static void testRegStore(void)
|
||||||
/* It looks like the remainder pretty much needs CertControlStore() */
|
/* It looks like the remainder pretty much needs CertControlStore() */
|
||||||
if (!pCertControlStore)
|
if (!pCertControlStore)
|
||||||
{
|
{
|
||||||
skip("CertControlStore() is not available\n");
|
win_skip("CertControlStore() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1113,7 +1113,7 @@ static void testFileStore(void)
|
||||||
|
|
||||||
if (!pCertControlStore)
|
if (!pCertControlStore)
|
||||||
{
|
{
|
||||||
skip("CertControlStore() is not available\n");
|
win_skip("CertControlStore() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1714,7 +1714,7 @@ static void testCertEnumSystemStore(void)
|
||||||
|
|
||||||
if (!pCertEnumSystemStore)
|
if (!pCertEnumSystemStore)
|
||||||
{
|
{
|
||||||
skip("CertEnumSystemStore() is not available\n");
|
win_skip("CertEnumSystemStore() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -1754,7 +1754,7 @@ static void testStoreProperty(void)
|
||||||
|
|
||||||
if (!pCertGetStoreProperty || !pCertSetStoreProperty)
|
if (!pCertGetStoreProperty || !pCertSetStoreProperty)
|
||||||
{
|
{
|
||||||
skip("CertGet/SetStoreProperty() is not available\n");
|
win_skip("CertGet/SetStoreProperty() is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -2016,7 +2016,7 @@ static void test_I_UpdateStore(void)
|
||||||
|
|
||||||
if (!pI_CertUpdatestore)
|
if (!pI_CertUpdatestore)
|
||||||
{
|
{
|
||||||
skip("No I_CertUpdateStore\n");
|
win_skip("No I_CertUpdateStore\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
store1 = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
|
store1 = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
|
||||||
|
|
|
@ -281,7 +281,7 @@ static void test_CertRDNValueToStrW(void)
|
||||||
|
|
||||||
if (!pCertRDNValueToStrW)
|
if (!pCertRDNValueToStrW)
|
||||||
{
|
{
|
||||||
skip("CertRDNValueToStrW is not available\n");
|
win_skip("CertRDNValueToStrW is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -333,7 +333,7 @@ static void test_CertNameToStrA(void)
|
||||||
|
|
||||||
if (!pCertNameToStrA)
|
if (!pCertNameToStrA)
|
||||||
{
|
{
|
||||||
skip("CertNameToStrA is not available\n");
|
win_skip("CertNameToStrA is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -412,7 +412,7 @@ static void test_CertNameToStrW(void)
|
||||||
|
|
||||||
if (!pCertNameToStrW)
|
if (!pCertNameToStrW)
|
||||||
{
|
{
|
||||||
skip("CertNameToStrW is not available\n");
|
win_skip("CertNameToStrW is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -499,7 +499,7 @@ static void test_CertStrToNameA(void)
|
||||||
|
|
||||||
if (!pCertStrToNameA)
|
if (!pCertStrToNameA)
|
||||||
{
|
{
|
||||||
skip("CertStrToNameA is not available\n");
|
win_skip("CertStrToNameA is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -584,7 +584,7 @@ static void test_CertStrToNameW(void)
|
||||||
|
|
||||||
if (!pCertStrToNameW)
|
if (!pCertStrToNameW)
|
||||||
{
|
{
|
||||||
skip("CertStrToNameW is not available\n");
|
win_skip("CertStrToNameW is not available\n");
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue