OLD | NEW |
1 // Autogenerated by generate_tests.py, do not edit | 1 // Autogenerated by generate_tests.py, do not edit |
2 | 2 |
3 // Hack to allow disabling type parameterized test cases. | 3 // Hack to allow disabling type parameterized test cases. |
4 // See https://github.com/google/googletest/issues/389 | 4 // See https://github.com/google/googletest/issues/389 |
5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ | 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ |
6 TYPED_TEST_P(CaseName, TestName) | 6 TYPED_TEST_P(CaseName, TestName) |
7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ | 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ |
8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) | 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) |
9 | 9 |
10 template <typename PkitsTestDelegate> | 10 template <typename PkitsTestDelegate> |
(...skipping 2095 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
2106 // 4.10.7 Invalid Mapping From anyPolicy Test7 | 2106 // 4.10.7 Invalid Mapping From anyPolicy Test7 |
2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
2108 Section10InvalidMappingFromanyPolicyTest7) { | 2108 Section10InvalidMappingFromanyPolicyTest7) { |
2109 const char* const certs[] = {"TrustAnchorRootCertificate", | 2109 const char* const certs[] = {"TrustAnchorRootCertificate", |
2110 "MappingFromanyPolicyCACert", | 2110 "MappingFromanyPolicyCACert", |
2111 "InvalidMappingFromanyPolicyTest7EE"}; | 2111 "InvalidMappingFromanyPolicyTest7EE"}; |
2112 const char* const crls[] = {"TrustAnchorRootCRL", | 2112 const char* const crls[] = {"TrustAnchorRootCRL", |
2113 "MappingFromanyPolicyCACRL"}; | 2113 "MappingFromanyPolicyCACRL"}; |
2114 PkitsTestInfo info; | 2114 PkitsTestInfo info; |
2115 info.should_validate = false; | 2115 info.should_validate = false; |
| 2116 info.SetUserConstrainedPolicySet(""); |
2116 | 2117 |
2117 this->RunTest(certs, crls, info); | 2118 this->RunTest(certs, crls, info); |
2118 } | 2119 } |
2119 | 2120 |
2120 // 4.10.8 Invalid Mapping To anyPolicy Test8 | 2121 // 4.10.8 Invalid Mapping To anyPolicy Test8 |
2121 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2122 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
2122 Section10InvalidMappingToanyPolicyTest8) { | 2123 Section10InvalidMappingToanyPolicyTest8) { |
2123 const char* const certs[] = {"TrustAnchorRootCertificate", | 2124 const char* const certs[] = {"TrustAnchorRootCertificate", |
2124 "MappingToanyPolicyCACert", | 2125 "MappingToanyPolicyCACert", |
2125 "InvalidMappingToanyPolicyTest8EE"}; | 2126 "InvalidMappingToanyPolicyTest8EE"}; |
(...skipping 1777 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
3903 PkitsTestInfo info; | 3904 PkitsTestInfo info; |
3904 info.should_validate = false; | 3905 info.should_validate = false; |
3905 | 3906 |
3906 this->RunTest(certs, crls, info); | 3907 this->RunTest(certs, crls, info); |
3907 } | 3908 } |
3908 | 3909 |
3909 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3910 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
3910 PkitsTest16PrivateCertificateExtensions, | 3911 PkitsTest16PrivateCertificateExtensions, |
3911 Section16ValidUnknownNotCriticalCertificateExtensionTest1, | 3912 Section16ValidUnknownNotCriticalCertificateExtensionTest1, |
3912 Section16InvalidUnknownCriticalCertificateExtensionTest2); | 3913 Section16InvalidUnknownCriticalCertificateExtensionTest2); |
OLD | NEW |