Commit e3b00de3 authored by Francois Gouget's avatar Francois Gouget Committed by Alexandre Julliard

advapi32/tests: Use win_skip() to skip over unimplemented functionality.

parent 737c64d2
...@@ -351,7 +351,7 @@ START_TEST(cred) ...@@ -351,7 +351,7 @@ START_TEST(cred)
if (!pCredEnumerateA || !pCredFree || !pCredWriteA || !pCredDeleteA || if (!pCredEnumerateA || !pCredFree || !pCredWriteA || !pCredDeleteA ||
!pCredReadA) !pCredReadA)
{ {
skip("credentials functions not present in advapi32.dll\n"); win_skip("credentials functions not present in advapi32.dll\n");
return; return;
} }
......
...@@ -331,7 +331,7 @@ static void test_incorrect_api_usage(void) ...@@ -331,7 +331,7 @@ static void test_incorrect_api_usage(void)
GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError()); GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError());
} }
else else
skip("CryptSignHashW is not available\n"); win_skip("CryptSignHashW is not available\n");
result = pCryptSetKeyParam(hKey, 0, &temp, 1); result = pCryptSetKeyParam(hKey, 0, &temp, 1);
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
...@@ -349,7 +349,7 @@ static void test_incorrect_api_usage(void) ...@@ -349,7 +349,7 @@ static void test_incorrect_api_usage(void)
GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError()); GetLastError() == ERROR_CALL_NOT_IMPLEMENTED), "%d\n", GetLastError());
} }
else else
skip("CryptVerifySignatureW is not available\n"); win_skip("CryptVerifySignatureW is not available\n");
result = pCryptDestroyHash(hHash); result = pCryptDestroyHash(hHash);
ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError()); ok (!result && GetLastError() == ERROR_INVALID_PARAMETER, "%d\n", GetLastError());
...@@ -394,7 +394,7 @@ static void test_verify_sig(void) ...@@ -394,7 +394,7 @@ static void test_verify_sig(void)
if (!pCryptVerifySignatureW) if (!pCryptVerifySignatureW)
{ {
skip("CryptVerifySignatureW is not available\n"); win_skip("CryptVerifySignatureW is not available\n");
return; return;
} }
...@@ -402,7 +402,7 @@ static void test_verify_sig(void) ...@@ -402,7 +402,7 @@ static void test_verify_sig(void)
ret = pCryptVerifySignatureW(0, NULL, 0, 0, NULL, 0); ret = pCryptVerifySignatureW(0, NULL, 0, 0, NULL, 0);
if (!ret && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED) if (!ret && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)
{ {
skip("CryptVerifySignatureW is not implemented\n"); win_skip("CryptVerifySignatureW is not implemented\n");
return; return;
} }
ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER, ok(!ret && GetLastError() == ERROR_INVALID_PARAMETER,
...@@ -497,13 +497,13 @@ static void test_enum_providers(void) ...@@ -497,13 +497,13 @@ static void test_enum_providers(void)
if(!pCryptEnumProvidersA) if(!pCryptEnumProvidersA)
{ {
skip("CryptEnumProvidersA is not available\n"); win_skip("CryptEnumProvidersA is not available\n");
return; return;
} }
if (!FindProvRegVals(dwIndex, &dwType, &pszProvName, &cbName, &provCount)) if (!FindProvRegVals(dwIndex, &dwType, &pszProvName, &cbName, &provCount))
{ {
skip("Could not find providers in registry\n"); win_skip("Could not find providers in registry\n");
return; return;
} }
...@@ -643,7 +643,7 @@ static void test_enum_provider_types(void) ...@@ -643,7 +643,7 @@ static void test_enum_provider_types(void)
if(!pCryptEnumProviderTypesA) if(!pCryptEnumProviderTypesA)
{ {
skip("CryptEnumProviderTypesA is not available\n"); win_skip("CryptEnumProviderTypesA is not available\n");
return; return;
} }
...@@ -784,7 +784,7 @@ static void test_get_default_provider(void) ...@@ -784,7 +784,7 @@ static void test_get_default_provider(void)
if(!pCryptGetDefaultProviderA) if(!pCryptGetDefaultProviderA)
{ {
skip("CryptGetDefaultProviderA is not available\n"); win_skip("CryptGetDefaultProviderA is not available\n");
return; return;
} }
...@@ -858,7 +858,7 @@ static void test_set_provider_ex(void) ...@@ -858,7 +858,7 @@ static void test_set_provider_ex(void)
if(!pCryptGetDefaultProviderA || !pCryptSetProviderExA) if(!pCryptGetDefaultProviderA || !pCryptSetProviderExA)
{ {
skip("CryptGetDefaultProviderA and/or CryptSetProviderExA are not available\n"); win_skip("CryptGetDefaultProviderA and/or CryptSetProviderExA are not available\n");
return; return;
} }
......
...@@ -413,7 +413,7 @@ static void test_SystemFunction_encrypt(descrypt func, int num) ...@@ -413,7 +413,7 @@ static void test_SystemFunction_encrypt(descrypt func, int num)
if (!func) if (!func)
{ {
skip("SystemFunction%03d is not available\n", num); win_skip("SystemFunction%03d is not available\n", num);
return; return;
} }
...@@ -434,7 +434,7 @@ static void test_SystemFunction_decrypt(descrypt func, int num) ...@@ -434,7 +434,7 @@ static void test_SystemFunction_decrypt(descrypt func, int num)
if (!func) if (!func)
{ {
skip("SystemFunction%03d is not available\n", num); win_skip("SystemFunction%03d is not available\n", num);
return; return;
} }
...@@ -460,7 +460,7 @@ static void test_SystemFunction_enc32(descrypt func, int num) ...@@ -460,7 +460,7 @@ static void test_SystemFunction_enc32(descrypt func, int num)
if (!func) if (!func)
{ {
skip("SystemFunction%03d is not available\n", num); win_skip("SystemFunction%03d is not available\n", num);
return; return;
} }
...@@ -482,7 +482,7 @@ static void test_SystemFunction_dec32(descrypt func, int num) ...@@ -482,7 +482,7 @@ static void test_SystemFunction_dec32(descrypt func, int num)
if (!func) if (!func)
{ {
skip("SystemFunction%03d is not available\n", num); win_skip("SystemFunction%03d is not available\n", num);
return; return;
} }
...@@ -504,7 +504,7 @@ static void test_memcmpfunc(memcmpfunc fn) ...@@ -504,7 +504,7 @@ static void test_memcmpfunc(memcmpfunc fn)
if (!fn) if (!fn)
{ {
skip("function is not available\n"); win_skip("function is not available\n");
return; return;
} }
...@@ -549,49 +549,49 @@ START_TEST(crypt_lmhash) ...@@ -549,49 +549,49 @@ START_TEST(crypt_lmhash)
if (pSystemFunction001) if (pSystemFunction001)
test_SystemFunction001(); test_SystemFunction001();
else else
skip("SystemFunction001 is not available\n"); win_skip("SystemFunction001 is not available\n");
pSystemFunction002 = (fnSystemFunction002)GetProcAddress( module, "SystemFunction002" ); pSystemFunction002 = (fnSystemFunction002)GetProcAddress( module, "SystemFunction002" );
if (pSystemFunction002) if (pSystemFunction002)
test_SystemFunction002(); test_SystemFunction002();
else else
skip("SystemFunction002 is not available\n"); win_skip("SystemFunction002 is not available\n");
pSystemFunction003 = (fnSystemFunction003)GetProcAddress( module, "SystemFunction003" ); pSystemFunction003 = (fnSystemFunction003)GetProcAddress( module, "SystemFunction003" );
if (pSystemFunction003) if (pSystemFunction003)
test_SystemFunction003(); test_SystemFunction003();
else else
skip("SystemFunction002 is not available\n"); win_skip("SystemFunction002 is not available\n");
pSystemFunction004 = (fnSystemFunction004)GetProcAddress( module, "SystemFunction004" ); pSystemFunction004 = (fnSystemFunction004)GetProcAddress( module, "SystemFunction004" );
if (pSystemFunction004) if (pSystemFunction004)
test_SystemFunction004(); test_SystemFunction004();
else else
skip("SystemFunction004 is not available\n"); win_skip("SystemFunction004 is not available\n");
pSystemFunction005 = (fnSystemFunction005)GetProcAddress( module, "SystemFunction005" ); pSystemFunction005 = (fnSystemFunction005)GetProcAddress( module, "SystemFunction005" );
if (pSystemFunction005) if (pSystemFunction005)
test_SystemFunction005(); test_SystemFunction005();
else else
skip("SystemFunction005 is not available\n"); win_skip("SystemFunction005 is not available\n");
pSystemFunction006 = (fnSystemFunction006)GetProcAddress( module, "SystemFunction006" ); pSystemFunction006 = (fnSystemFunction006)GetProcAddress( module, "SystemFunction006" );
if (pSystemFunction006) if (pSystemFunction006)
test_SystemFunction006(); test_SystemFunction006();
else else
skip("SystemFunction006 is not available\n"); win_skip("SystemFunction006 is not available\n");
pSystemFunction008 = (fnSystemFunction008)GetProcAddress( module, "SystemFunction008" ); pSystemFunction008 = (fnSystemFunction008)GetProcAddress( module, "SystemFunction008" );
if (pSystemFunction008) if (pSystemFunction008)
test_SystemFunction008(); test_SystemFunction008();
else else
skip("SystemFunction008 is not available\n"); win_skip("SystemFunction008 is not available\n");
pSystemFunction009 = (fnSystemFunction009)GetProcAddress( module, "SystemFunction009" ); pSystemFunction009 = (fnSystemFunction009)GetProcAddress( module, "SystemFunction009" );
if (pSystemFunction009) if (pSystemFunction009)
test_SystemFunction009(); test_SystemFunction009();
else else
skip("SystemFunction009 is not available\n"); win_skip("SystemFunction009 is not available\n");
pSystemFunction012 = (descrypt) GetProcAddress( module, "SystemFunction012"); pSystemFunction012 = (descrypt) GetProcAddress( module, "SystemFunction012");
pSystemFunction013 = (descrypt) GetProcAddress( module, "SystemFunction013"); pSystemFunction013 = (descrypt) GetProcAddress( module, "SystemFunction013");
...@@ -645,5 +645,5 @@ START_TEST(crypt_lmhash) ...@@ -645,5 +645,5 @@ START_TEST(crypt_lmhash)
if (pSystemFunction032) if (pSystemFunction032)
test_SystemFunction032(); test_SystemFunction032();
else else
skip("SystemFunction032 is not available\n"); win_skip("SystemFunction032 is not available\n");
} }
...@@ -156,23 +156,23 @@ START_TEST(crypt_md4) ...@@ -156,23 +156,23 @@ START_TEST(crypt_md4)
if (pMD4Init && pMD4Update && pMD4Final) if (pMD4Init && pMD4Update && pMD4Final)
test_md4_ctx(); test_md4_ctx();
else else
skip("MD4Init and/or MD4Update and/or MD4Final are not available\n"); win_skip("MD4Init and/or MD4Update and/or MD4Final are not available\n");
pSystemFunction007 = (fnSystemFunction007)GetProcAddress( module, "SystemFunction007" ); pSystemFunction007 = (fnSystemFunction007)GetProcAddress( module, "SystemFunction007" );
if (pSystemFunction007) if (pSystemFunction007)
test_SystemFunction007(); test_SystemFunction007();
else else
skip("SystemFunction007 is not available\n"); win_skip("SystemFunction007 is not available\n");
pSystemFunction010 = (md4hashfunc)GetProcAddress( module, "SystemFunction010" ); pSystemFunction010 = (md4hashfunc)GetProcAddress( module, "SystemFunction010" );
if (pSystemFunction010) if (pSystemFunction010)
test_md4hashfunc(pSystemFunction010); test_md4hashfunc(pSystemFunction010);
else else
skip("SystemFunction010 is not available\n"); win_skip("SystemFunction010 is not available\n");
pSystemFunction011 = (md4hashfunc)GetProcAddress( module, "SystemFunction011" ); pSystemFunction011 = (md4hashfunc)GetProcAddress( module, "SystemFunction011" );
if (pSystemFunction011) if (pSystemFunction011)
test_md4hashfunc(pSystemFunction011); test_md4hashfunc(pSystemFunction011);
else else
skip("SystemFunction011 is not available\n"); win_skip("SystemFunction011 is not available\n");
} }
...@@ -85,7 +85,7 @@ static void test_md5_ctx(void) ...@@ -85,7 +85,7 @@ static void test_md5_ctx(void)
if (!pMD5Init || !pMD5Update || !pMD5Final) if (!pMD5Init || !pMD5Update || !pMD5Final)
{ {
skip("Needed functions are not available\n"); win_skip("Needed functions are not available\n");
return; return;
} }
......
...@@ -53,7 +53,7 @@ static void test_sha_ctx(void) ...@@ -53,7 +53,7 @@ static void test_sha_ctx(void)
if (!pA_SHAInit || !pA_SHAUpdate || !pA_SHAFinal) if (!pA_SHAInit || !pA_SHAUpdate || !pA_SHAFinal)
{ {
skip("A_SHAInit and/or A_SHAUpdate and/or A_SHAFinal are not available\n"); win_skip("A_SHAInit and/or A_SHAUpdate and/or A_SHAFinal are not available\n");
return; return;
} }
......
...@@ -182,7 +182,7 @@ static void test_lsa(void) ...@@ -182,7 +182,7 @@ static void test_lsa(void)
START_TEST(lsa) START_TEST(lsa)
{ {
if (!init()) { if (!init()) {
skip("Needed functions are not available\n"); win_skip("Needed functions are not available\n");
return; return;
} }
......
...@@ -857,7 +857,7 @@ static void test_AccessCheck(void) ...@@ -857,7 +857,7 @@ static void test_AccessCheck(void)
GetProcAddress(NtDllModule, "RtlAdjustPrivilege"); GetProcAddress(NtDllModule, "RtlAdjustPrivilege");
if (!pRtlAdjustPrivilege) if (!pRtlAdjustPrivilege)
{ {
skip("missing RtlAdjustPrivilege, skipping test\n"); win_skip("missing RtlAdjustPrivilege, skipping test\n");
return; return;
} }
...@@ -1128,7 +1128,7 @@ static void test_AccessCheck(void) ...@@ -1128,7 +1128,7 @@ static void test_AccessCheck(void)
ok(ret, "AddAccessAllowedAceEx failed with error %d\n", GetLastError()); ok(ret, "AddAccessAllowedAceEx failed with error %d\n", GetLastError());
} }
else else
skip("AddAccessAllowedAceEx is not available\n"); win_skip("AddAccessAllowedAceEx is not available\n");
ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping, ret = AccessCheck(SecurityDescriptor, Token, KEY_READ, &Mapping,
PrivSet, &PrivSetLen, &Access, &AccessStatus); PrivSet, &PrivSetLen, &Access, &AccessStatus);
...@@ -1190,7 +1190,7 @@ static void test_token_attr(void) ...@@ -1190,7 +1190,7 @@ static void test_token_attr(void)
ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &Token); ret = OpenProcessToken(GetCurrentProcess(), MAXIMUM_ALLOWED, &Token);
if(!ret && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)) if(!ret && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED))
{ {
skip("OpenProcessToken is not implemented\n"); win_skip("OpenProcessToken is not implemented\n");
return; return;
} }
ok(ret, "OpenProcessToken failed with error %d\n", GetLastError()); ok(ret, "OpenProcessToken failed with error %d\n", GetLastError());
...@@ -1209,7 +1209,7 @@ static void test_token_attr(void) ...@@ -1209,7 +1209,7 @@ static void test_token_attr(void)
if(!pConvertSidToStringSidA) if(!pConvertSidToStringSidA)
{ {
skip("ConvertSidToStringSidA is not available\n"); win_skip("ConvertSidToStringSidA is not available\n");
return; return;
} }
...@@ -1359,7 +1359,7 @@ static void test_CreateWellKnownSid(void) ...@@ -1359,7 +1359,7 @@ static void test_CreateWellKnownSid(void)
if (!pCreateWellKnownSid) if (!pCreateWellKnownSid)
{ {
skip("CreateWellKnownSid not available\n"); win_skip("CreateWellKnownSid not available\n");
return; return;
} }
...@@ -1737,7 +1737,7 @@ static void test_LookupAccountName(void) ...@@ -1737,7 +1737,7 @@ static void test_LookupAccountName(void)
ret = LookupAccountNameA(NULL, user_name, NULL, &sid_size, NULL, &domain_size, &sid_use); ret = LookupAccountNameA(NULL, user_name, NULL, &sid_size, NULL, &domain_size, &sid_use);
if(!ret && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)) if(!ret && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED))
{ {
skip("LookupAccountNameA is not implemented\n"); win_skip("LookupAccountNameA is not implemented\n");
return; return;
} }
ok(!ret, "Expected 0, got %d\n", ret); ok(!ret, "Expected 0, got %d\n", ret);
...@@ -1913,7 +1913,7 @@ static void test_security_descriptor(void) ...@@ -1913,7 +1913,7 @@ static void test_security_descriptor(void)
ret = InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION); ret = InitializeSecurityDescriptor(&sd, SECURITY_DESCRIPTOR_REVISION);
if (ret && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED) if (ret && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)
{ {
skip("InitializeSecurityDescriptor is not implemented\n"); win_skip("InitializeSecurityDescriptor is not implemented\n");
return; return;
} }
...@@ -2006,7 +2006,7 @@ static void test_process_security(void) ...@@ -2006,7 +2006,7 @@ static void test_process_security(void)
res = InitializeAcl(Acl, 256, ACL_REVISION); res = InitializeAcl(Acl, 256, ACL_REVISION);
if (!res && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED) if (!res && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)
{ {
skip("ACLs not implemented - skipping tests\n"); win_skip("ACLs not implemented - skipping tests\n");
HeapFree(GetProcessHeap(), 0, Acl); HeapFree(GetProcessHeap(), 0, Acl);
return; return;
} }
...@@ -2184,14 +2184,14 @@ static void test_impersonation_level(void) ...@@ -2184,14 +2184,14 @@ static void test_impersonation_level(void)
pDuplicateTokenEx = (fnDuplicateTokenEx) GetProcAddress(hmod, "DuplicateTokenEx"); pDuplicateTokenEx = (fnDuplicateTokenEx) GetProcAddress(hmod, "DuplicateTokenEx");
if( !pDuplicateTokenEx ) { if( !pDuplicateTokenEx ) {
skip("DuplicateTokenEx is not available\n"); win_skip("DuplicateTokenEx is not available\n");
return; return;
} }
SetLastError(0xdeadbeef); SetLastError(0xdeadbeef);
ret = ImpersonateSelf(SecurityAnonymous); ret = ImpersonateSelf(SecurityAnonymous);
if(!ret && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)) if(!ret && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED))
{ {
skip("ImpersonateSelf is not implemented\n"); win_skip("ImpersonateSelf is not implemented\n");
return; return;
} }
ok(ret, "ImpersonateSelf(SecurityAnonymous) failed with error %d\n", GetLastError()); ok(ret, "ImpersonateSelf(SecurityAnonymous) failed with error %d\n", GetLastError());
...@@ -2409,7 +2409,7 @@ static void test_GetNamedSecurityInfoA(void) ...@@ -2409,7 +2409,7 @@ static void test_GetNamedSecurityInfoA(void)
if (!pGetNamedSecurityInfoA) if (!pGetNamedSecurityInfoA)
{ {
skip("GetNamedSecurityInfoA is not available\n"); win_skip("GetNamedSecurityInfoA is not available\n");
return; return;
} }
...@@ -2422,7 +2422,7 @@ static void test_GetNamedSecurityInfoA(void) ...@@ -2422,7 +2422,7 @@ static void test_GetNamedSecurityInfoA(void)
NULL, NULL, NULL, NULL, &pSecDesc); NULL, NULL, NULL, NULL, &pSecDesc);
if (error != ERROR_SUCCESS && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)) if (error != ERROR_SUCCESS && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED))
{ {
skip("GetNamedSecurityInfoA is not implemented\n"); win_skip("GetNamedSecurityInfoA is not implemented\n");
return; return;
} }
ok(!error, "GetNamedSecurityInfo failed with error %d\n", error); ok(!error, "GetNamedSecurityInfo failed with error %d\n", error);
...@@ -2450,7 +2450,7 @@ static void test_ConvertStringSecurityDescriptor(void) ...@@ -2450,7 +2450,7 @@ static void test_ConvertStringSecurityDescriptor(void)
if (!pConvertStringSecurityDescriptorToSecurityDescriptorA) if (!pConvertStringSecurityDescriptorToSecurityDescriptorA)
{ {
skip("ConvertStringSecurityDescriptorToSecurityDescriptor is not available\n"); win_skip("ConvertStringSecurityDescriptorToSecurityDescriptor is not available\n");
return; return;
} }
...@@ -2601,12 +2601,12 @@ static void test_ConvertSecurityDescriptorToString(void) ...@@ -2601,12 +2601,12 @@ static void test_ConvertSecurityDescriptorToString(void)
if (!pConvertSecurityDescriptorToStringSecurityDescriptorA) if (!pConvertSecurityDescriptorToStringSecurityDescriptorA)
{ {
skip("ConvertSecurityDescriptorToStringSecurityDescriptor is not available\n"); win_skip("ConvertSecurityDescriptorToStringSecurityDescriptor is not available\n");
return; return;
} }
if (!pCreateWellKnownSid) if (!pCreateWellKnownSid)
{ {
skip("CreateWellKnownSid is not available\n"); win_skip("CreateWellKnownSid is not available\n");
return; return;
} }
...@@ -2801,7 +2801,7 @@ static void test_PrivateObjectSecurity(void) ...@@ -2801,7 +2801,7 @@ static void test_PrivateObjectSecurity(void)
if (!pConvertStringSecurityDescriptorToSecurityDescriptorA) if (!pConvertStringSecurityDescriptorToSecurityDescriptorA)
{ {
skip("ConvertStringSecurityDescriptorToSecurityDescriptor is not available\n"); win_skip("ConvertStringSecurityDescriptorToSecurityDescriptor is not available\n");
return; return;
} }
...@@ -2883,7 +2883,7 @@ static void test_acls(void) ...@@ -2883,7 +2883,7 @@ static void test_acls(void)
ret = InitializeAcl(pAcl, sizeof(ACL) - 1, ACL_REVISION); ret = InitializeAcl(pAcl, sizeof(ACL) - 1, ACL_REVISION);
if (!ret && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED) if (!ret && GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)
{ {
skip("InitializeAcl is not implemented\n"); win_skip("InitializeAcl is not implemented\n");
return; return;
} }
......
...@@ -1829,7 +1829,7 @@ static void test_queryconfig2(void) ...@@ -1829,7 +1829,7 @@ static void test_queryconfig2(void)
if(!pQueryServiceConfig2A) if(!pQueryServiceConfig2A)
{ {
skip("function QueryServiceConfig2A not present\n"); win_skip("function QueryServiceConfig2A not present\n");
return; return;
} }
...@@ -1933,7 +1933,7 @@ static void test_queryconfig2(void) ...@@ -1933,7 +1933,7 @@ static void test_queryconfig2(void)
if(!pChangeServiceConfig2A) if(!pChangeServiceConfig2A)
{ {
skip("function ChangeServiceConfig2A not present\n"); win_skip("function ChangeServiceConfig2A not present\n");
goto cleanup; goto cleanup;
} }
...@@ -1971,7 +1971,7 @@ static void test_queryconfig2(void) ...@@ -1971,7 +1971,7 @@ static void test_queryconfig2(void)
if(!pQueryServiceConfig2W) if(!pQueryServiceConfig2W)
{ {
skip("function QueryServiceConfig2W not present\n"); win_skip("function QueryServiceConfig2W not present\n");
goto cleanup; goto cleanup;
} }
SetLastError(0xdeadbeef); SetLastError(0xdeadbeef);
...@@ -2107,7 +2107,7 @@ START_TEST(service) ...@@ -2107,7 +2107,7 @@ START_TEST(service)
if (!scm_handle && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED)) if (!scm_handle && (GetLastError() == ERROR_CALL_NOT_IMPLEMENTED))
{ {
skip("OpenSCManagerA is not implemented, we are most likely on win9x\n"); win_skip("OpenSCManagerA is not implemented, we are most likely on win9x\n");
return; return;
} }
CloseServiceHandle(scm_handle); CloseServiceHandle(scm_handle);
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment