| OLD | NEW |
| 1 // Autogenerated by generate_tests.py, do not edit | 1 // Autogenerated by generate_tests.py, do not edit |
| 2 | 2 |
| 3 // Hack to allow disabling type parameterized test cases. | 3 // Hack to allow disabling type parameterized test cases. |
| 4 // See https://github.com/google/googletest/issues/389 | 4 // See https://github.com/google/googletest/issues/389 |
| 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ | 5 #define WRAPPED_TYPED_TEST_P(CaseName, TestName) \ |
| 6 TYPED_TEST_P(CaseName, TestName) | 6 TYPED_TEST_P(CaseName, TestName) |
| 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ | 7 #define WRAPPED_REGISTER_TYPED_TEST_CASE_P(CaseName, ...) \ |
| 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) | 8 REGISTER_TYPED_TEST_CASE_P(CaseName, __VA_ARGS__) |
| 9 | 9 |
| 10 template <typename PkitsTestDelegate> | 10 template <typename PkitsTestDelegate> |
| (...skipping 2095 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 2106 // 4.10.7 Invalid Mapping From anyPolicy Test7 | 2106 // 4.10.7 Invalid Mapping From anyPolicy Test7 |
| 2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2107 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2108 Section10InvalidMappingFromanyPolicyTest7) { | 2108 Section10InvalidMappingFromanyPolicyTest7) { |
| 2109 const char* const certs[] = {"TrustAnchorRootCertificate", | 2109 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2110 "MappingFromanyPolicyCACert", | 2110 "MappingFromanyPolicyCACert", |
| 2111 "InvalidMappingFromanyPolicyTest7EE"}; | 2111 "InvalidMappingFromanyPolicyTest7EE"}; |
| 2112 const char* const crls[] = {"TrustAnchorRootCRL", | 2112 const char* const crls[] = {"TrustAnchorRootCRL", |
| 2113 "MappingFromanyPolicyCACRL"}; | 2113 "MappingFromanyPolicyCACRL"}; |
| 2114 PkitsTestInfo info; | 2114 PkitsTestInfo info; |
| 2115 info.should_validate = false; | 2115 info.should_validate = false; |
| 2116 info.SetUserConstrainedPolicySet(""); |
| 2116 | 2117 |
| 2117 this->RunTest(certs, crls, info); | 2118 this->RunTest(certs, crls, info); |
| 2118 } | 2119 } |
| 2119 | 2120 |
| 2120 // 4.10.8 Invalid Mapping To anyPolicy Test8 | 2121 // 4.10.8 Invalid Mapping To anyPolicy Test8 |
| 2121 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, | 2122 WRAPPED_TYPED_TEST_P(PkitsTest10PolicyMappings, |
| 2122 Section10InvalidMappingToanyPolicyTest8) { | 2123 Section10InvalidMappingToanyPolicyTest8) { |
| 2123 const char* const certs[] = {"TrustAnchorRootCertificate", | 2124 const char* const certs[] = {"TrustAnchorRootCertificate", |
| 2124 "MappingToanyPolicyCACert", | 2125 "MappingToanyPolicyCACert", |
| 2125 "InvalidMappingToanyPolicyTest8EE"}; | 2126 "InvalidMappingToanyPolicyTest8EE"}; |
| (...skipping 1777 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 3903 PkitsTestInfo info; | 3904 PkitsTestInfo info; |
| 3904 info.should_validate = false; | 3905 info.should_validate = false; |
| 3905 | 3906 |
| 3906 this->RunTest(certs, crls, info); | 3907 this->RunTest(certs, crls, info); |
| 3907 } | 3908 } |
| 3908 | 3909 |
| 3909 WRAPPED_REGISTER_TYPED_TEST_CASE_P( | 3910 WRAPPED_REGISTER_TYPED_TEST_CASE_P( |
| 3910 PkitsTest16PrivateCertificateExtensions, | 3911 PkitsTest16PrivateCertificateExtensions, |
| 3911 Section16ValidUnknownNotCriticalCertificateExtensionTest1, | 3912 Section16ValidUnknownNotCriticalCertificateExtensionTest1, |
| 3912 Section16InvalidUnknownCriticalCertificateExtensionTest2); | 3913 Section16InvalidUnknownCriticalCertificateExtensionTest2); |
| OLD | NEW |