crypt32/tests: Use win_skip() to skip over unimplemented functionality.
This commit is contained in:
parent
3d777d6e61
commit
df4d664582
|
@ -449,10 +449,10 @@ START_TEST(base64)
|
|||
if (pCryptBinaryToStringA)
|
||||
testBinaryToStringA();
|
||||
else
|
||||
skip("CryptBinaryToStringA is not available\n");
|
||||
win_skip("CryptBinaryToStringA is not available\n");
|
||||
|
||||
if (pCryptStringToBinaryA)
|
||||
testStringToBinaryA();
|
||||
else
|
||||
skip("CryptStringToBinaryA is not available\n");
|
||||
win_skip("CryptStringToBinaryA is not available\n");
|
||||
}
|
||||
|
|
|
@ -1672,12 +1672,12 @@ static void testVerifyCertSig(HCRYPTPROV csp, const CRYPT_DATA_BLOB *toBeSigned,
|
|||
|
||||
if (!pCryptVerifyCertificateSignatureEx)
|
||||
{
|
||||
skip("no CryptVerifyCertificateSignatureEx support\n");
|
||||
win_skip("no CryptVerifyCertificateSignatureEx support\n");
|
||||
return;
|
||||
}
|
||||
if (!pCryptEncodeObjectEx)
|
||||
{
|
||||
skip("no CryptEncodeObjectEx support\n");
|
||||
win_skip("no CryptEncodeObjectEx support\n");
|
||||
return;
|
||||
}
|
||||
ret = pCryptVerifyCertificateSignatureEx(0, 0, 0, NULL, 0, NULL, 0, NULL);
|
||||
|
@ -1897,7 +1897,7 @@ static void testCreateSelfSignCert(void)
|
|||
|
||||
if (!pCertCreateSelfSignCertificate)
|
||||
{
|
||||
skip("CertCreateSelfSignCertificate() is not available\n");
|
||||
win_skip("CertCreateSelfSignCertificate() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -2334,7 +2334,7 @@ static void testGetValidUsages(void)
|
|||
|
||||
if (!pCertGetValidUsages)
|
||||
{
|
||||
skip("CertGetValidUsages() is not available\n");
|
||||
win_skip("CertGetValidUsages() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -2875,7 +2875,7 @@ static void testAcquireCertPrivateKey(void)
|
|||
|
||||
if (!pCryptAcquireCertificatePrivateKey)
|
||||
{
|
||||
skip("CryptAcquireCertificatePrivateKey() is not available\n");
|
||||
win_skip("CryptAcquireCertificatePrivateKey() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
|
|
@ -68,7 +68,7 @@ static void testCreateCertChainEngine(void)
|
|||
|
||||
if (!pCertCreateCertificateChainEngine || !pCertFreeCertificateChainEngine)
|
||||
{
|
||||
skip("Cert*CertificateChainEngine() functions are not available\n");
|
||||
win_skip("Cert*CertificateChainEngine() functions are not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -1930,7 +1930,7 @@ static void testVerifyCertChainPolicy(void)
|
|||
|
||||
if (!pCertVerifyCertificateChainPolicy)
|
||||
{
|
||||
skip("CertVerifyCertificateChainPolicy() is not available\n");
|
||||
win_skip("CertVerifyCertificateChainPolicy() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -2010,7 +2010,7 @@ START_TEST(chain)
|
|||
testCreateCertChainEngine();
|
||||
if (!pCertGetCertificateChain)
|
||||
{
|
||||
skip("CertGetCertificateChain() is not available\n");
|
||||
win_skip("CertGetCertificateChain() is not available\n");
|
||||
}
|
||||
else
|
||||
{
|
||||
|
|
|
@ -219,7 +219,7 @@ static void testFindCRL(void)
|
|||
if (!store) return;
|
||||
if (!pCertFindCRLInStore)
|
||||
{
|
||||
skip("CertFindCRLInStore() is not available\n");
|
||||
win_skip("CertFindCRLInStore() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -619,7 +619,7 @@ static void testFindCertInCRL(void)
|
|||
|
||||
if (!pCertFindCertificateInCRL)
|
||||
{
|
||||
skip("CertFindCertificateInCRL() is not available\n");
|
||||
win_skip("CertFindCertificateInCRL() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
|
|
@ -7497,7 +7497,7 @@ START_TEST(encode)
|
|||
pCryptEncodeObjectEx = (void*)GetProcAddress(hCrypt32, "CryptEncodeObjectEx");
|
||||
if (!pCryptDecodeObjectEx || !pCryptEncodeObjectEx)
|
||||
{
|
||||
skip("CryptDecodeObjectEx() is not available\n");
|
||||
win_skip("CryptDecodeObjectEx() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
|
|
@ -531,7 +531,7 @@ static void test_enumOIDInfo(void)
|
|||
|
||||
if (!pCryptEnumOIDInfo)
|
||||
{
|
||||
skip("CryptEnumOIDInfo() is not available\n");
|
||||
win_skip("CryptEnumOIDInfo() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
|
|
@ -221,7 +221,7 @@ START_TEST(protectdata)
|
|||
pCryptUnprotectData = (void*)GetProcAddress(hCrypt32, "CryptUnprotectData");
|
||||
if (!pCryptProtectData || !pCryptUnprotectData)
|
||||
{
|
||||
skip("Crypt(Un)ProtectData() is not available\n");
|
||||
win_skip("Crypt(Un)ProtectData() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
|
|
@ -285,7 +285,7 @@ static void testCollectionStore(void)
|
|||
|
||||
if (!pCertAddStoreToCollection)
|
||||
{
|
||||
skip("CertAddStoreToCollection() is not available\n");
|
||||
win_skip("CertAddStoreToCollection() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -545,7 +545,7 @@ static void testCollectionStore(void)
|
|||
|
||||
if (!pCertRemoveStoreFromCollection)
|
||||
{
|
||||
skip("CertRemoveStoreFromCollection() is not available\n");
|
||||
win_skip("CertRemoveStoreFromCollection() is not available\n");
|
||||
}
|
||||
else
|
||||
{
|
||||
|
@ -639,7 +639,7 @@ static void testRegStore(void)
|
|||
/* It looks like the remainder pretty much needs CertControlStore() */
|
||||
if (!pCertControlStore)
|
||||
{
|
||||
skip("CertControlStore() is not available\n");
|
||||
win_skip("CertControlStore() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -1113,7 +1113,7 @@ static void testFileStore(void)
|
|||
|
||||
if (!pCertControlStore)
|
||||
{
|
||||
skip("CertControlStore() is not available\n");
|
||||
win_skip("CertControlStore() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -1714,7 +1714,7 @@ static void testCertEnumSystemStore(void)
|
|||
|
||||
if (!pCertEnumSystemStore)
|
||||
{
|
||||
skip("CertEnumSystemStore() is not available\n");
|
||||
win_skip("CertEnumSystemStore() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -1754,7 +1754,7 @@ static void testStoreProperty(void)
|
|||
|
||||
if (!pCertGetStoreProperty || !pCertSetStoreProperty)
|
||||
{
|
||||
skip("CertGet/SetStoreProperty() is not available\n");
|
||||
win_skip("CertGet/SetStoreProperty() is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -2016,7 +2016,7 @@ static void test_I_UpdateStore(void)
|
|||
|
||||
if (!pI_CertUpdatestore)
|
||||
{
|
||||
skip("No I_CertUpdateStore\n");
|
||||
win_skip("No I_CertUpdateStore\n");
|
||||
return;
|
||||
}
|
||||
store1 = CertOpenStore(CERT_STORE_PROV_MEMORY, 0, 0,
|
||||
|
|
|
@ -281,7 +281,7 @@ static void test_CertRDNValueToStrW(void)
|
|||
|
||||
if (!pCertRDNValueToStrW)
|
||||
{
|
||||
skip("CertRDNValueToStrW is not available\n");
|
||||
win_skip("CertRDNValueToStrW is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -333,7 +333,7 @@ static void test_CertNameToStrA(void)
|
|||
|
||||
if (!pCertNameToStrA)
|
||||
{
|
||||
skip("CertNameToStrA is not available\n");
|
||||
win_skip("CertNameToStrA is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -412,7 +412,7 @@ static void test_CertNameToStrW(void)
|
|||
|
||||
if (!pCertNameToStrW)
|
||||
{
|
||||
skip("CertNameToStrW is not available\n");
|
||||
win_skip("CertNameToStrW is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -499,7 +499,7 @@ static void test_CertStrToNameA(void)
|
|||
|
||||
if (!pCertStrToNameA)
|
||||
{
|
||||
skip("CertStrToNameA is not available\n");
|
||||
win_skip("CertStrToNameA is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
@ -584,7 +584,7 @@ static void test_CertStrToNameW(void)
|
|||
|
||||
if (!pCertStrToNameW)
|
||||
{
|
||||
skip("CertStrToNameW is not available\n");
|
||||
win_skip("CertStrToNameW is not available\n");
|
||||
return;
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue