Lines Matching refs:status

39 	int blockSize, ivSize, status;  in compareSessionKeys()  local
41 status = cryptGetAttribute( cryptContext1, CRYPT_CTXINFO_BLOCKSIZE, in compareSessionKeys()
43 if( cryptStatusOK( status ) ) in compareSessionKeys()
44 status = cryptGetAttribute( cryptContext1, CRYPT_CTXINFO_IVSIZE, in compareSessionKeys()
46 if( cryptStatusError( status ) ) in compareSessionKeys()
55 status = cryptEncrypt( cryptContext1, buffer, max( blockSize, 8 ) ); in compareSessionKeys()
56 if( cryptStatusError( status ) ) in compareSessionKeys()
59 "code %d, line %d.\n", status, __LINE__ ); in compareSessionKeys()
62 status = cryptDecrypt( cryptContext2, buffer, max( blockSize, 8 ) ); in compareSessionKeys()
63 if( cryptStatusError( status ) ) in compareSessionKeys()
66 "code %d, line %d.\n", status, __LINE__ ); in compareSessionKeys()
84 int length1, length2, status; in compareHashValues() local
86 status = cryptEncrypt( hashContext1, ( void * ) data, 16 ); in compareHashValues()
87 if( cryptStatusOK( status ) ) in compareHashValues()
88 status = cryptEncrypt( hashContext1, "", 0 ); in compareHashValues()
89 if( cryptStatusOK( status ) ) in compareHashValues()
90 status = cryptGetAttributeString( hashContext1, CRYPT_CTXINFO_HASHVALUE, in compareHashValues()
92 if( cryptStatusError( status ) ) in compareHashValues()
95 "error code %d, line %d.\n", status, __LINE__ ); in compareHashValues()
98 status = cryptEncrypt( hashContext2, ( void * ) data, 16 ); in compareHashValues()
99 if( cryptStatusOK( status ) ) in compareHashValues()
100 status = cryptEncrypt( hashContext2, "", 0 ); in compareHashValues()
101 if( cryptStatusOK( status ) ) in compareHashValues()
102 status = cryptGetAttributeString( hashContext2, CRYPT_CTXINFO_HASHVALUE, in compareHashValues()
104 if( cryptStatusError( status ) ) in compareHashValues()
107 "error code %d, line %d.\n", status, __LINE__ ); in compareHashValues()
145 int status, value, length; in signData() local
154 status = cryptCreateContext( &hashContext, CRYPT_UNUSED, in signData()
157 if( cryptStatusError( status ) ) in signData()
179 status = loadRSAContextsLarge( CRYPT_UNUSED, &checkContext, in signData()
184 status = loadRSAContexts( CRYPT_UNUSED, &checkContext, in signData()
190 status = loadDSAContexts( CRYPT_UNUSED, &checkContext, in signData()
195 status = loadECDSAContexts( CRYPT_UNUSED, &checkContext, in signData()
200 status = FALSE; in signData()
202 if( !status ) in signData()
207 status = cryptCreateSignatureEx( NULL, 0, &length, formatType, in signData()
209 if( cryptStatusError( status ) ) in signData()
212 status, __LINE__ ); in signData()
228 status = cryptCreateSignatureEx( buffer, 1024, &length, formatType, in signData()
230 if( cryptStatusError( status ) ) in signData()
233 status, __LINE__ ); in signData()
243 status = cryptQueryObject( buffer, length, &cryptObjectInfo ); in signData()
244 if( cryptStatusError( status ) ) in signData()
247 status, __LINE__ ); in signData()
275 status = cryptCheckSignature( buffer, length, checkContext, hashContext ); in signData()
276 if( cryptStatusError( status ) ) in signData()
279 status, __LINE__ ); in signData()
304 int status, length; in keyExportImport() local
312 status = cryptCreateContext( &sessionKeyContext1, CRYPT_UNUSED, in keyExportImport()
314 if( cryptStatusError( status ) ) in keyExportImport()
318 status = cryptGenerateKey( sessionKeyContext1 ); in keyExportImport()
319 if( cryptStatusError( status ) ) in keyExportImport()
323 status = cryptCreateContext( &sessionKeyContext2, CRYPT_UNUSED, in keyExportImport()
325 if( cryptStatusError( status ) ) in keyExportImport()
340 status = loadElgamalContexts( &cryptContext, &decryptContext ); in keyExportImport()
342 status = loadRSAContexts( CRYPT_UNUSED, &cryptContext, &decryptContext ); in keyExportImport()
343 if( !status ) in keyExportImport()
348 status = cryptExportKeyEx( NULL, 0, &length, formatType, cryptContext, in keyExportImport()
350 if( cryptStatusError( status ) ) in keyExportImport()
353 status, __LINE__ ); in keyExportImport()
362 status = cryptExportKeyEx( buffer, length, &length, formatType, in keyExportImport()
364 if( cryptStatusError( status ) ) in keyExportImport()
367 status, __LINE__ ); in keyExportImport()
373 status = cryptQueryObject( buffer, length, &cryptObjectInfo ); in keyExportImport()
374 if( cryptStatusError( status ) ) in keyExportImport()
377 status, __LINE__ ); in keyExportImport()
394 status = cryptImportKeyEx( buffer, length, decryptContext, in keyExportImport()
397 status = cryptImportKeyEx( buffer, length, decryptContext, in keyExportImport()
399 if( cryptStatusError( status ) ) in keyExportImport()
402 "code %d, line %d.\n", status, __LINE__ ); in keyExportImport()
428 int i, status; in testLargeBufferEncrypt() local
442 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, CRYPT_ALGO_3DES ); in testLargeBufferEncrypt()
443 if( cryptStatusError( status ) ) in testLargeBufferEncrypt()
452 status = cryptEncrypt( cryptContext, buffer, length ); in testLargeBufferEncrypt()
453 if( cryptStatusError( status ) ) in testLargeBufferEncrypt()
456 "code %d, line %d.\n", status, __LINE__ ); in testLargeBufferEncrypt()
463 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, CRYPT_ALGO_3DES ); in testLargeBufferEncrypt()
464 if( cryptStatusError( status ) ) in testLargeBufferEncrypt()
473 status = cryptDecrypt( cryptContext, buffer, length ); in testLargeBufferEncrypt()
474 if( cryptStatusError( status ) ) in testLargeBufferEncrypt()
477 "code %d, line %d.\n", status, __LINE__ ); in testLargeBufferEncrypt()
510 int hashAlgo, status; in deriveKey() local
523 status = cryptGetAttribute( CRYPT_UNUSED, CRYPT_OPTION_KEYING_ALGO, in deriveKey()
525 if( cryptStatusError( status ) ) in deriveKey()
531 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, in deriveKey()
533 if( cryptStatusOK( status ) ) in deriveKey()
534 status = cryptCreateContext( &decryptContext, CRYPT_UNUSED, in deriveKey()
542 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, in deriveKey()
544 if( cryptStatusOK( status ) ) in deriveKey()
545 status = cryptCreateContext( &decryptContext, CRYPT_UNUSED, in deriveKey()
548 if( cryptStatusError( status ) ) in deriveKey()
567 status = cryptSetAttributeString( cryptContext, in deriveKey()
570 if( cryptStatusError( status ) ) in deriveKey()
573 status, __LINE__ ); in deriveKey()
576 status = cryptSetAttributeString( decryptContext, in deriveKey()
579 if( cryptStatusError( status ) ) in deriveKey()
582 status, __LINE__ ); in deriveKey()
613 int value DUMMY_INIT, status; in testDeriveKey() local
618 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, in testDeriveKey()
620 if( cryptStatusError( status ) ) in testDeriveKey()
622 status = cryptSetAttribute( cryptContext, in testDeriveKey()
624 if( cryptStatusOK( status ) ) in testDeriveKey()
626 status = cryptGetAttribute( cryptContext, in testDeriveKey()
631 if( cryptStatusError( status ) || value != 5 ) in testDeriveKey()
633 if( cryptStatusError( status ) ) in testDeriveKey()
637 "%d.\n", status, value, __LINE__ ); in testDeriveKey()
643 status = deriveKey( shortUserKey, paramStrlen( shortUserKey ), in testDeriveKey()
645 if( status ) in testDeriveKey()
646 status = deriveKey( medUserKey, paramStrlen( medUserKey ), in testDeriveKey()
648 if( status ) in testDeriveKey()
649 status = deriveKey( longUserKey, paramStrlen( longUserKey ), in testDeriveKey()
651 if( !status ) in testDeriveKey()
656 status = deriveKey( shortUserKey, paramStrlen( shortUserKey ), in testDeriveKey()
658 if( status ) in testDeriveKey()
659 status = deriveKey( medUserKey, paramStrlen( medUserKey ), in testDeriveKey()
661 if( status ) in testDeriveKey()
662 status = deriveKey( longUserKey, paramStrlen( longUserKey ), in testDeriveKey()
664 if( !status ) in testDeriveKey()
668 status = deriveKey( shortUserKey, paramStrlen( shortUserKey ), "", in testDeriveKey()
670 if( !status ) in testDeriveKey()
672 status = deriveKey( shortUserKey, paramStrlen( shortUserKey ), "", in testDeriveKey()
674 if( !status ) in testDeriveKey()
682 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, in testDeriveKey()
684 if( cryptStatusError( status ) ) in testDeriveKey()
761 int length, status; in conventionalExportImport() local
764 status = cryptSetAttributeString( cryptContext, CRYPT_CTXINFO_KEYING_SALT, in conventionalExportImport()
766 if( cryptStatusOK( status ) && useAltAlgo ) in conventionalExportImport()
767 status = cryptSetAttribute( cryptContext, CRYPT_CTXINFO_KEYING_ALGO, in conventionalExportImport()
769 if( cryptStatusOK( status ) ) in conventionalExportImport()
770 status = cryptSetAttributeString( cryptContext, in conventionalExportImport()
773 if( cryptStatusError( status ) ) in conventionalExportImport()
776 "%d.\n", status, __LINE__ ); in conventionalExportImport()
781 status = cryptExportKey( NULL, 0, &length, cryptContext, in conventionalExportImport()
783 if( cryptStatusError( status ) ) in conventionalExportImport()
786 status, __LINE__ ); in conventionalExportImport()
795 status = cryptExportKey( buffer, length, &length, cryptContext, in conventionalExportImport()
797 if( cryptStatusError( status ) ) in conventionalExportImport()
800 status, __LINE__ ); in conventionalExportImport()
806 status = cryptQueryObject( buffer, length, &cryptObjectInfo ); in conventionalExportImport()
807 if( cryptStatusError( status ) ) in conventionalExportImport()
810 status, __LINE__ ); in conventionalExportImport()
832 "hash algorithm as %d, line %d.\n", status, __LINE__ ); in conventionalExportImport()
838 status = cryptCreateContext( &decryptContext, CRYPT_UNUSED, in conventionalExportImport()
840 if( cryptStatusError( status ) ) in conventionalExportImport()
843 "code %d, line %d.\n", status, __LINE__ ); in conventionalExportImport()
849 status = cryptSetAttributeString( decryptContext, in conventionalExportImport()
853 if( cryptStatusOK( status ) && useAltAlgo ) in conventionalExportImport()
854 status = cryptSetAttribute( decryptContext, in conventionalExportImport()
857 if( cryptStatusOK( status ) && \ in conventionalExportImport()
866 status = cryptSetAttribute( decryptContext, in conventionalExportImport()
869 if( cryptStatusOK( status ) ) in conventionalExportImport()
870 status = cryptSetAttributeString( decryptContext, in conventionalExportImport()
873 if( cryptStatusError( status ) ) in conventionalExportImport()
876 "%d.\n", status, __LINE__ ); in conventionalExportImport()
879 status = cryptImportKey( buffer, length, decryptContext, in conventionalExportImport()
881 if( cryptStatusError( status ) ) in conventionalExportImport()
884 status, __LINE__ ); in conventionalExportImport()
905 status = cryptGetAttribute( sessionKeyContext1, in conventionalExportImport()
907 if( cryptStatusError( status ) || length != sessionKeySize ) in conventionalExportImport()
913 status = cryptGetAttribute( decryptContext, in conventionalExportImport()
915 if( cryptStatusError( status ) || length != wrapKeySize ) in conventionalExportImport()
933 int status; in testConv3DES() local
939 status = cryptCreateContext( &sessionKeyContext1, CRYPT_UNUSED, in testConv3DES()
941 if( cryptStatusOK( status ) ) in testConv3DES()
942 status = cryptSetAttribute( sessionKeyContext1, CRYPT_CTXINFO_MODE, in testConv3DES()
944 if( cryptStatusOK( status ) ) in testConv3DES()
945 status = cryptGenerateKey( sessionKeyContext1 ); in testConv3DES()
946 if( cryptStatusOK( status ) ) in testConv3DES()
947 status = cryptCreateContext( &sessionKeyContext2, CRYPT_UNUSED, in testConv3DES()
949 if( cryptStatusOK( status ) ) in testConv3DES()
950 status = cryptSetAttribute( sessionKeyContext2, CRYPT_CTXINFO_MODE, in testConv3DES()
952 if( cryptStatusError( status ) ) in testConv3DES()
955 "code %d, line %d.\n", status, __LINE__ ); in testConv3DES()
960 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, in testConv3DES()
962 if( cryptStatusError( status ) ) in testConv3DES()
965 "code %d, line %d.\n", status, __LINE__ ); in testConv3DES()
991 int status; in testConvAES() local
999 status = cryptCreateContext( &sessionKeyContext1, CRYPT_UNUSED, in testConvAES()
1001 if( cryptStatusOK( status ) ) in testConvAES()
1002 status = cryptSetAttribute( sessionKeyContext1, CRYPT_CTXINFO_MODE, in testConvAES()
1004 if( cryptStatusOK( status ) && \ in testConvAES()
1006 status = cryptSetAttribute( sessionKeyContext1, in testConvAES()
1008 if( cryptStatusOK( status ) ) in testConvAES()
1009 status = cryptGenerateKey( sessionKeyContext1 ); in testConvAES()
1010 if( cryptStatusOK( status ) ) in testConvAES()
1012 status = cryptCreateContext( &sessionKeyContext2, CRYPT_UNUSED, in testConvAES()
1017 if( cryptStatusError( status ) ) in testConvAES()
1020 "code %d, line %d.\n", status, __LINE__ ); in testConvAES()
1023 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, in testConvAES()
1025 if( cryptStatusOK( status ) && \ in testConvAES()
1027 status = cryptSetAttribute( cryptContext, in testConvAES()
1029 if( cryptStatusError( status ) ) in testConvAES()
1032 "code %d, line %d.\n", status, __LINE__ ); in testConvAES()
1076 int status, length1, length2; in testMACExportImport() local
1081 status = cryptCreateContext( &macContext1, CRYPT_UNUSED, in testMACExportImport()
1083 if( cryptStatusOK( status ) ) in testMACExportImport()
1084 status = cryptGenerateKey( macContext1 ); in testMACExportImport()
1085 if( cryptStatusOK( status ) ) in testMACExportImport()
1086 status = cryptCreateContext( &macContext2, CRYPT_UNUSED, in testMACExportImport()
1088 if( cryptStatusError( status ) ) in testMACExportImport()
1092 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, in testMACExportImport()
1094 if( cryptStatusError( status ) ) in testMACExportImport()
1098 status = cryptSetAttributeString( cryptContext, in testMACExportImport()
1101 if( cryptStatusError( status ) ) in testMACExportImport()
1105 status = cryptExportKey( NULL, 0, &length1, cryptContext, macContext1 ); in testMACExportImport()
1106 if( cryptStatusError( status ) ) in testMACExportImport()
1109 status, __LINE__ ); in testMACExportImport()
1118 status = cryptExportKey( buffer, length1, &length1, cryptContext, in testMACExportImport()
1120 if( cryptStatusError( status ) ) in testMACExportImport()
1123 status, __LINE__ ); in testMACExportImport()
1129 status = cryptQueryObject( buffer, length1, &cryptObjectInfo ); in testMACExportImport()
1130 if( cryptStatusError( status ) ) in testMACExportImport()
1133 status, __LINE__ ); in testMACExportImport()
1143 status = cryptCreateContext( &decryptContext, CRYPT_UNUSED, in testMACExportImport()
1145 if( cryptStatusError( status ) ) in testMACExportImport()
1148 "code %d, line %d.\n", status, __LINE__ ); in testMACExportImport()
1156 status = cryptSetAttributeString( decryptContext, in testMACExportImport()
1159 if( cryptStatusOK( status ) ) in testMACExportImport()
1160 status = cryptImportKey( buffer, length1, decryptContext, in testMACExportImport()
1163 if( cryptStatusError( status ) ) in testMACExportImport()
1166 status, __LINE__ ); in testMACExportImport()
1172 status = cryptEncrypt( macContext1, "", 0 ); in testMACExportImport()
1173 if( cryptStatusOK( status ) ) in testMACExportImport()
1176 status = cryptEncrypt( macContext2, "", 0 ); in testMACExportImport()
1178 if( cryptStatusOK( status ) ) in testMACExportImport()
1179 status = cryptGetAttributeString( macContext1, in testMACExportImport()
1182 if( cryptStatusOK( status ) ) in testMACExportImport()
1183 status = cryptGetAttributeString( macContext2, in testMACExportImport()
1186 if( cryptStatusError( status ) ) in testMACExportImport()
1189 status, __LINE__ ); in testMACExportImport()
1259 int length, status; in keygen() local
1266 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, cryptAlgo ); in keygen()
1267 if( cryptStatusError( status ) ) in keygen()
1272 status = cryptGenerateKey( cryptContext ); in keygen()
1273 if( cryptStatusError( status ) ) in keygen()
1276 "code %d, line %d.\n", status, __LINE__ ); in keygen()
1291 status = cryptCreateContext( &hashContext, CRYPT_UNUSED, in keygen()
1293 if( cryptStatusError( status ) ) in keygen()
1299 status = cryptCreateSignature( buffer, BUFFER_SIZE, &length, in keygen()
1301 if( cryptStatusOK( status ) ) in keygen()
1302 status = cryptCheckSignature( buffer, length, cryptContext, in keygen()
1308 if( cryptStatusError( status ) ) in keygen()
1311 "with error code %d, line %d.\n", status, in keygen()
1323 status = cryptCreateContext( &sessionKeyContext1, CRYPT_UNUSED, in keygen()
1325 if( cryptStatusError( status ) ) in keygen()
1327 status = cryptCreateContext( &sessionKeyContext2, in keygen()
1329 if( cryptStatusError( status ) ) in keygen()
1334 if( cryptStatusOK( status ) ) in keygen()
1335 status = cryptGenerateKey( sessionKeyContext1 ); in keygen()
1336 if( cryptStatusError( status ) ) in keygen()
1338 status = cryptExportKey( buffer, BUFFER_SIZE, &length, in keygen()
1340 if( cryptStatusOK( status ) ) in keygen()
1341 status = cryptImportKey( buffer, length, cryptContext, in keygen()
1344 if( cryptStatusError( status ) ) in keygen()
1349 "code %d, line %d.\n", status, __LINE__ ); in keygen()
1376 status = cryptCreateContext( &sessionKeyContext1, CRYPT_UNUSED, in keygen()
1378 if( cryptStatusOK( status ) ) in keygen()
1379 status = cryptCreateContext( &sessionKeyContext2, in keygen()
1381 if( cryptStatusOK( status ) ) in keygen()
1382 status = cryptCreateContext( &dhContext, CRYPT_UNUSED, in keygen()
1384 if( cryptStatusError( status ) ) in keygen()
1386 status = cryptExportKey( buffer, BUFFER_SIZE, &length, in keygen()
1388 if( cryptStatusOK( status ) ) in keygen()
1389 status = cryptImportKey( buffer, length, dhContext, in keygen()
1391 if( cryptStatusOK( status ) ) in keygen()
1392 status = cryptExportKey( buffer, BUFFER_SIZE, &length, in keygen()
1394 if( cryptStatusOK( status ) ) in keygen()
1395 status = cryptImportKey( buffer, length, cryptContext, in keygen()
1399 if( cryptStatusError( status ) ) in keygen()
1404 "code %d, line %d.\n", status, __LINE__ ); in keygen()
1465 int status; in testRandomRoutines() local
1471 status = cryptCreateContext( &cryptContext, CRYPT_UNUSED, in testRandomRoutines()
1473 if( cryptStatusError( status ) ) in testRandomRoutines()
1475 status = cryptGenerateKey( cryptContext ); in testRandomRoutines()
1479 if( status == CRYPT_ERROR_RANDOM ) in testRandomRoutines()
1511 int status, length; in testKeyExportImportCMS() local
1516 status = cryptKeysetOpen( &cryptKeyset, CRYPT_UNUSED, CRYPT_KEYSET_FILE, in testKeyExportImportCMS()
1518 if( cryptStatusOK( status ) ) in testKeyExportImportCMS()
1520 status = cryptGetPrivateKey( cryptKeyset, &cryptContext, in testKeyExportImportCMS()
1525 if( cryptStatusError( status ) ) in testKeyExportImportCMS()
1527 printf( "Couldn't read private key, status %d, line %d.\n", status, in testKeyExportImportCMS()
1534 status = cryptCreateContext( &sessionKeyContext1, CRYPT_UNUSED, in testKeyExportImportCMS()
1536 if( cryptStatusOK( status ) ) in testKeyExportImportCMS()
1537 status = cryptGenerateKey( sessionKeyContext1 ); in testKeyExportImportCMS()
1538 if( cryptStatusOK( status ) ) in testKeyExportImportCMS()
1539 status = cryptCreateContext( &sessionKeyContext2, CRYPT_UNUSED, in testKeyExportImportCMS()
1541 if( cryptStatusError( status ) ) in testKeyExportImportCMS()
1545 status = cryptExportKeyEx( NULL, 0, &length, CRYPT_FORMAT_SMIME, in testKeyExportImportCMS()
1547 if( cryptStatusError( status ) ) in testKeyExportImportCMS()
1550 status, __LINE__ ); in testKeyExportImportCMS()
1559 status = cryptExportKeyEx( buffer, length, &length, CRYPT_FORMAT_SMIME, in testKeyExportImportCMS()
1561 if( cryptStatusError( status ) ) in testKeyExportImportCMS()
1564 status, __LINE__ ); in testKeyExportImportCMS()
1570 status = cryptQueryObject( buffer, length, &cryptObjectInfo ); in testKeyExportImportCMS()
1571 if( cryptStatusError( status ) ) in testKeyExportImportCMS()
1574 status, __LINE__ ); in testKeyExportImportCMS()
1585 status = cryptImportKey( buffer, length, cryptContext, in testKeyExportImportCMS()
1587 if( cryptStatusError( status ) ) in testKeyExportImportCMS()
1590 status, __LINE__ ); in testKeyExportImportCMS()
1640 int status, length; in signDataCMS() local
1645 status = cryptCreateContext( &hashContext, CRYPT_UNUSED, in signDataCMS()
1647 if( cryptStatusError( status ) ) in signDataCMS()
1653 status = cryptKeysetOpen( &cryptKeyset, CRYPT_UNUSED, CRYPT_KEYSET_FILE, in signDataCMS()
1655 if( cryptStatusOK( status ) ) in signDataCMS()
1657 status = cryptGetPrivateKey( cryptKeyset, &signContext, in signDataCMS()
1662 if( cryptStatusError( status ) ) in signDataCMS()
1664 printf( "Couldn't read private key, status %d, line %d.\n", status, in signDataCMS()
1670 status = cryptCreateSignatureEx( NULL, 0, &length, CRYPT_FORMAT_SMIME, in signDataCMS()
1672 if( cryptStatusError( status ) ) in signDataCMS()
1675 "%d.\n", status, __LINE__ ); in signDataCMS()
1684 status = cryptCreateSignatureEx( buffer, length, &length, in signDataCMS()
1687 if( cryptStatusError( status ) ) in signDataCMS()
1690 "%d.\n", status, __LINE__ ); in signDataCMS()
1700 status = cryptCheckSignatureEx( buffer, length, signContext, hashContext, in signDataCMS()
1702 if( cryptStatusError( status ) ) in signDataCMS()
1705 "%d.\n", status, __LINE__ ); in signDataCMS()
1727 int value, status; in testSignDataCMS() local
1736 status = cryptCreateCert( &cmsAttributes, CRYPT_UNUSED, in testSignDataCMS()
1738 if( cryptStatusError( status ) || \ in testSignDataCMS()
1741 status = signDataCMS( "complex CMS signature", cmsAttributes, FALSE ); in testSignDataCMS()
1743 if( !status ) in testSignDataCMS()
1744 return( status ); in testSignDataCMS()
1752 status = cryptCreateCert( &cmsAttributes, CRYPT_UNUSED, in testSignDataCMS()
1754 if( cryptStatusError( status ) ) in testSignDataCMS()
1756 status = cryptAddCertExtension( cmsAttributes, "1.2.3.4.5", in testSignDataCMS()
1758 if( cryptStatusOK( status ) ) in testSignDataCMS()
1760 status = cryptSetAttribute( CRYPT_UNUSED, in testSignDataCMS()
1764 if( cryptStatusOK( status ) ) in testSignDataCMS()
1765 status = signDataCMS( "CMS signature with custom attributes", in testSignDataCMS()
1770 if( !status ) in testSignDataCMS()
1771 return( status ); in testSignDataCMS()
1772 return( status ); in testSignDataCMS()