sl@0
|
1 |
//
|
sl@0
|
2 |
// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
|
sl@0
|
3 |
// All rights reserved.
|
sl@0
|
4 |
// This component and the accompanying materials are made available
|
sl@0
|
5 |
// under the terms of the License "Eclipse Public License v1.0"
|
sl@0
|
6 |
// which accompanies this distribution, and is available
|
sl@0
|
7 |
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
|
sl@0
|
8 |
//
|
sl@0
|
9 |
// Initial Contributors:
|
sl@0
|
10 |
// Nokia Corporation - initial contribution.
|
sl@0
|
11 |
//
|
sl@0
|
12 |
// Contributors:
|
sl@0
|
13 |
//
|
sl@0
|
14 |
// Description:
|
sl@0
|
15 |
//
|
sl@0
|
16 |
|
sl@0
|
17 |
PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite
|
sl@0
|
18 |
|
sl@0
|
19 |
LOAD_SUITE tpkcs10serverv2
|
sl@0
|
20 |
|
sl@0
|
21 |
// pre- test: move out of the way key store file.
|
sl@0
|
22 |
RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat
|
sl@0
|
23 |
START_TESTCASE SEC-PKCS10-RSA-0001
|
sl@0
|
24 |
//! @SYMTestCaseID SEC-PKCS10-RSA-0001
|
sl@0
|
25 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
26 |
//! certificate requests using the parameters listed below.
|
sl@0
|
27 |
//! Key Algorithm: RSA
|
sl@0
|
28 |
//! Key size: 512 bits
|
sl@0
|
29 |
//! Digest Algorithm: SHA1
|
sl@0
|
30 |
//! Number of attributes: 0
|
sl@0
|
31 |
//! @SYMPREQ CR0973
|
sl@0
|
32 |
//! @SYMREQ REQ1581.5
|
sl@0
|
33 |
//! @SYMTestPriority Critical
|
sl@0
|
34 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
35 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
36 |
//! @SYMTestType CIT
|
sl@0
|
37 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
38 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001
|
sl@0
|
39 |
END_TESTCASE SEC-PKCS10-RSA-0001
|
sl@0
|
40 |
|
sl@0
|
41 |
START_TESTCASE SEC-PKCS10-RSA-0002
|
sl@0
|
42 |
//! @SYMTestCaseID SEC-PKCS10-RSA-0002
|
sl@0
|
43 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
44 |
//! certificate requests using the parameters listed below.
|
sl@0
|
45 |
//! Key Algorithm: RSA
|
sl@0
|
46 |
//! Key size: 512 bits
|
sl@0
|
47 |
//! Digest Algorithm: MD2
|
sl@0
|
48 |
//! Number of attributes: 0
|
sl@0
|
49 |
//! @SYMPREQ CR0973
|
sl@0
|
50 |
//! @SYMREQ REQ1581.5
|
sl@0
|
51 |
//! @SYMTestPriority Critical
|
sl@0
|
52 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
53 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
54 |
//! @SYMTestType CIT
|
sl@0
|
55 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
56 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002
|
sl@0
|
57 |
END_TESTCASE SEC-PKCS10-RSA-0002
|
sl@0
|
58 |
|
sl@0
|
59 |
START_TESTCASE SEC-PKCS10-RSA-0003
|
sl@0
|
60 |
|
sl@0
|
61 |
//! @SYMTestCaseID SEC-PKCS10-RSA-0003
|
sl@0
|
62 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
63 |
//! certificate requests using the parameters listed below.
|
sl@0
|
64 |
//! Key Algorithm: RSA
|
sl@0
|
65 |
//! Key size: 512 bits
|
sl@0
|
66 |
//! Digest Algorithm: MD5
|
sl@0
|
67 |
//! Number of attributes: 0
|
sl@0
|
68 |
//! @SYMPREQ CR0973
|
sl@0
|
69 |
//! @SYMREQ REQ1581.5
|
sl@0
|
70 |
//! @SYMTestPriority Critical
|
sl@0
|
71 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
72 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
73 |
//! @SYMTestType CIT
|
sl@0
|
74 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
75 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003
|
sl@0
|
76 |
END_TESTCASE SEC-PKCS10-RSA-0003
|
sl@0
|
77 |
|
sl@0
|
78 |
START_TESTCASE SEC-PKCS10-RSA-0004
|
sl@0
|
79 |
//! @SYMTestCaseID SEC-PKCS10-RSA-0004
|
sl@0
|
80 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
81 |
//! certificate requests using the parameters listed below.
|
sl@0
|
82 |
//! Key Algorithm: RSA
|
sl@0
|
83 |
//! Key size: 512 bits
|
sl@0
|
84 |
//! Digest Algorithm: SHA1
|
sl@0
|
85 |
//! Number of attributes: 1 (challenge password)
|
sl@0
|
86 |
//! @SYMPREQ CR0973
|
sl@0
|
87 |
//! @SYMREQ REQ1581.5
|
sl@0
|
88 |
//! @SYMTestPriority Critical
|
sl@0
|
89 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
90 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
91 |
//! @SYMTestType CIT
|
sl@0
|
92 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
93 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004
|
sl@0
|
94 |
END_TESTCASE SEC-PKCS10-RSA-0004
|
sl@0
|
95 |
|
sl@0
|
96 |
START_TESTCASE SEC-PKCS10-RSA-0005
|
sl@0
|
97 |
//! @SYMTestCaseID SEC-PKCS10-RSA-0005
|
sl@0
|
98 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
99 |
//! certificate requests using the parameters listed below.
|
sl@0
|
100 |
//! Key Algorithm: RSA
|
sl@0
|
101 |
//! Key size: 512 bits
|
sl@0
|
102 |
//! Digest Algorithm: SHA1
|
sl@0
|
103 |
//! Number of attributes: 2 (challenge password and structured name)
|
sl@0
|
104 |
//! @SYMPREQ CR0973
|
sl@0
|
105 |
//! @SYMREQ REQ1581.5
|
sl@0
|
106 |
//! @SYMTestPriority Critical
|
sl@0
|
107 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
108 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
109 |
//! @SYMTestType CIT
|
sl@0
|
110 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
111 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005
|
sl@0
|
112 |
END_TESTCASE SEC-PKCS10-RSA-0005
|
sl@0
|
113 |
|
sl@0
|
114 |
START_TESTCASE SEC-PKCS10-RSA-0006
|
sl@0
|
115 |
//! @SYMTestCaseID SEC-PKCS10-RSA-0006
|
sl@0
|
116 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
117 |
//! certificate requests using the parameters listed below.
|
sl@0
|
118 |
//! Key Algorithm: RSA
|
sl@0
|
119 |
//! Key size: 2048 bits
|
sl@0
|
120 |
//! Digest Algorithm: SHA1
|
sl@0
|
121 |
//! Number of attributes: 2 (challenge password and structured name)
|
sl@0
|
122 |
//! @SYMPREQ CR0973
|
sl@0
|
123 |
//! @SYMREQ REQ1581.5
|
sl@0
|
124 |
//! @SYMTestPriority Critical
|
sl@0
|
125 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
126 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
127 |
//! @SYMTestType CIT
|
sl@0
|
128 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
129 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006
|
sl@0
|
130 |
END_TESTCASE SEC-PKCS10-RSA-0006
|
sl@0
|
131 |
|
sl@0
|
132 |
START_TESTCASE SEC-PKCS10-DSA-0001
|
sl@0
|
133 |
//! @SYMTestCaseID SEC-PKCS10-DSA-0001
|
sl@0
|
134 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
135 |
//! certificate requests using the parameters listed below.
|
sl@0
|
136 |
//! Key Algorithm: DSA
|
sl@0
|
137 |
//! Key size: 512 bits
|
sl@0
|
138 |
//! Digest Algorithm: SHA1
|
sl@0
|
139 |
//! Number of attributes: 0
|
sl@0
|
140 |
//! @SYMPREQ CR0973
|
sl@0
|
141 |
//! @SYMREQ REQ1581.5
|
sl@0
|
142 |
//! @SYMTestPriority Critical
|
sl@0
|
143 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
144 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
145 |
//! @SYMTestType CIT
|
sl@0
|
146 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
147 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001
|
sl@0
|
148 |
END_TESTCASE SEC-PKCS10-DSA-0001
|
sl@0
|
149 |
|
sl@0
|
150 |
START_TESTCASE SEC-PKCS10-DSA-0002
|
sl@0
|
151 |
//! @SYMTestCaseID SEC-PKCS10-DSA-0002
|
sl@0
|
152 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
153 |
//! certificate requests using the parameters listed below.
|
sl@0
|
154 |
//! Key Algorithm: DSA
|
sl@0
|
155 |
//! Key size: 512 bits
|
sl@0
|
156 |
//! Digest Algorithm: SHA1
|
sl@0
|
157 |
//! Number of attributes: 1 (challenge password)
|
sl@0
|
158 |
//! @SYMPREQ CR0973
|
sl@0
|
159 |
//! @SYMREQ REQ1581.5
|
sl@0
|
160 |
//! @SYMTestPriority Critical
|
sl@0
|
161 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
162 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
163 |
//! @SYMTestType CIT
|
sl@0
|
164 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
165 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002
|
sl@0
|
166 |
END_TESTCASE SEC-PKCS10-DSA-0002
|
sl@0
|
167 |
|
sl@0
|
168 |
START_TESTCASE SEC-PKCS10-DSA-0003
|
sl@0
|
169 |
//! @SYMTestCaseID SEC-PKCS10-DSA-0003
|
sl@0
|
170 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
171 |
//! certificate requests using the parameters listed below.
|
sl@0
|
172 |
//! Key Algorithm: DSA
|
sl@0
|
173 |
//! Key size: 512 bits
|
sl@0
|
174 |
//! Digest Algorithm: SHA1
|
sl@0
|
175 |
//! Number of attributes: 2 (challenge password and structured name)
|
sl@0
|
176 |
//! @SYMPREQ CR0973
|
sl@0
|
177 |
//! @SYMREQ REQ1581.5
|
sl@0
|
178 |
//! @SYMTestPriority Critical
|
sl@0
|
179 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
180 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
181 |
//! @SYMTestType CIT
|
sl@0
|
182 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
183 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003
|
sl@0
|
184 |
END_TESTCASE SEC-PKCS10-DSA-0003
|
sl@0
|
185 |
|
sl@0
|
186 |
START_TESTCASE SEC-PKCS10-DSA-0004
|
sl@0
|
187 |
//! @SYMTestCaseID SEC-PKCS10-DSA-0004
|
sl@0
|
188 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
189 |
//! certificate requests using the parameters listed below.
|
sl@0
|
190 |
//! Key Algorithm: DSA
|
sl@0
|
191 |
//! Key size: 2048 bits
|
sl@0
|
192 |
//! Digest Algorithm: SHA1
|
sl@0
|
193 |
//! Number of attributes: 2 (challenge password and structured name)
|
sl@0
|
194 |
//! @SYMPREQ CR0973
|
sl@0
|
195 |
//! @SYMREQ REQ1581.5
|
sl@0
|
196 |
//! @SYMTestPriority Critical
|
sl@0
|
197 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
198 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
199 |
//! @SYMTestType CIT
|
sl@0
|
200 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
201 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004
|
sl@0
|
202 |
END_TESTCASE SEC-PKCS10-DSA-0004
|
sl@0
|
203 |
|
sl@0
|
204 |
START_TESTCASE SEC-PKCS10-EXT-0001
|
sl@0
|
205 |
//! @SYMTestCaseID SEC-PKCS10-EXT-0001
|
sl@0
|
206 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
207 |
//! certificate requests including extension requestsusing the parameters listed below.
|
sl@0
|
208 |
//! Key Algorithm: RSA
|
sl@0
|
209 |
//! Key size: 2048 bits
|
sl@0
|
210 |
//! Digest Algorithm: SHA1
|
sl@0
|
211 |
//! Number of attributes: 2 (challenge password and structured name)
|
sl@0
|
212 |
//! Extensions used: basic Constraints,
|
sl@0
|
213 |
//! subject Alt Name,
|
sl@0
|
214 |
//! issuer Alt Name,
|
sl@0
|
215 |
//! key Usage,
|
sl@0
|
216 |
//! extended Key Usage,
|
sl@0
|
217 |
//! authority Info Access
|
sl@0
|
218 |
//! @SYMPREQ CR0973
|
sl@0
|
219 |
//! @SYMREQ REQ1581.5
|
sl@0
|
220 |
//! @SYMTestPriority Critical
|
sl@0
|
221 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
222 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
223 |
//! @SYMTestType CIT
|
sl@0
|
224 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
225 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001
|
sl@0
|
226 |
END_TESTCASE SEC-PKCS10-EXT-0001
|
sl@0
|
227 |
|
sl@0
|
228 |
START_TESTCASE SEC-PKCS10-EXT-0002
|
sl@0
|
229 |
//! @SYMTestCaseID SEC-PKCS10-EXT-0002
|
sl@0
|
230 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
231 |
//! certificate requests including extension requestsusing the parameters listed below.
|
sl@0
|
232 |
//! Key Algorithm: RSA
|
sl@0
|
233 |
//! Key size: 2048 bits
|
sl@0
|
234 |
//! Digest Algorithm: MD2
|
sl@0
|
235 |
//! Number of attributes: 2 (challenge password and structured name)
|
sl@0
|
236 |
//! Extensions used: basic Constraints,
|
sl@0
|
237 |
//! subject Alt Name,
|
sl@0
|
238 |
//! issuer Alt Name,
|
sl@0
|
239 |
//! key Usage,
|
sl@0
|
240 |
//! extended Key Usage,
|
sl@0
|
241 |
//! authority Info Access
|
sl@0
|
242 |
//!
|
sl@0
|
243 |
//! @SYMPREQ CR0973
|
sl@0
|
244 |
//! @SYMREQ REQ1581.5
|
sl@0
|
245 |
//! @SYMTestPriority Critical
|
sl@0
|
246 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
247 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
248 |
//! @SYMTestType CIT
|
sl@0
|
249 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
250 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002
|
sl@0
|
251 |
END_TESTCASE SEC-PKCS10-EXT-0002
|
sl@0
|
252 |
|
sl@0
|
253 |
START_TESTCASE SEC-PKCS10-EXT-0003
|
sl@0
|
254 |
//! @SYMTestCaseID SEC-PKCS10-EXT-0003
|
sl@0
|
255 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
256 |
//! certificate requests including extension requestsusing the parameters listed below.
|
sl@0
|
257 |
//! Key Algorithm: RSA
|
sl@0
|
258 |
//! Key size: 2048 bits
|
sl@0
|
259 |
//! Digest Algorithm: MD5
|
sl@0
|
260 |
//! Number of attributes: 2 (challenge password and structured name)
|
sl@0
|
261 |
//! Extensions used: basic Constraints,
|
sl@0
|
262 |
//! subject Alt Name,
|
sl@0
|
263 |
//! issuer Alt Name,
|
sl@0
|
264 |
//! key Usage,
|
sl@0
|
265 |
//! extended Key Usage,
|
sl@0
|
266 |
//! authority Info Access
|
sl@0
|
267 |
//!
|
sl@0
|
268 |
//! @SYMPREQ CR0973
|
sl@0
|
269 |
//! @SYMREQ REQ1581.5
|
sl@0
|
270 |
//! @SYMTestPriority Critical
|
sl@0
|
271 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
272 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
273 |
//! @SYMTestType CIT
|
sl@0
|
274 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
275 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003
|
sl@0
|
276 |
END_TESTCASE SEC-PKCS10-EXT-0003
|
sl@0
|
277 |
|
sl@0
|
278 |
START_TESTCASE SEC-PKCS10-EXT-0004
|
sl@0
|
279 |
//! @SYMTestCaseID SEC-PKCS10-EXT-0004
|
sl@0
|
280 |
//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
|
sl@0
|
281 |
//! certificate requests including extension requestsusing the parameters listed below.
|
sl@0
|
282 |
//! Key Algorithm: DSA
|
sl@0
|
283 |
//! Key size: 2048 bits
|
sl@0
|
284 |
//! Digest Algorithm: SHA1
|
sl@0
|
285 |
//! Number of attributes: 2 (challenge password and structured name)
|
sl@0
|
286 |
//! Extensions used: basic Constraints,
|
sl@0
|
287 |
//! subject Alt Name,
|
sl@0
|
288 |
//! issuer Alt Name,
|
sl@0
|
289 |
//! key Usage,
|
sl@0
|
290 |
//! extended Key Usage,
|
sl@0
|
291 |
//! authority Info Access
|
sl@0
|
292 |
//!
|
sl@0
|
293 |
//! @SYMPREQ CR0973
|
sl@0
|
294 |
//! @SYMREQ REQ1581.5
|
sl@0
|
295 |
//! @SYMTestPriority Critical
|
sl@0
|
296 |
//! @SYMTestActions PKCS10 certificate request construction.
|
sl@0
|
297 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
298 |
//! @SYMTestType CIT
|
sl@0
|
299 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
300 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004
|
sl@0
|
301 |
END_TESTCASE SEC-PKCS10-EXT-0004
|
sl@0
|
302 |
|
sl@0
|
303 |
START_TESTCASE SEC-PKCS10-OOM-0001
|
sl@0
|
304 |
//! @SYMTestCaseID SEC-PKCS10-OOM-0001
|
sl@0
|
305 |
//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
|
sl@0
|
306 |
//! Use the following parameters:
|
sl@0
|
307 |
//! Key Algorithm: RSA
|
sl@0
|
308 |
//! Key size: 512 bits
|
sl@0
|
309 |
//! Digest Algorithm: SHA1
|
sl@0
|
310 |
//! Number of attributes: 2
|
sl@0
|
311 |
//!
|
sl@0
|
312 |
//! @SYMPREQ CR0973
|
sl@0
|
313 |
//! @SYMREQ REQ1581.5
|
sl@0
|
314 |
//! @SYMTestPriority Critical
|
sl@0
|
315 |
//! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
|
sl@0
|
316 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
317 |
//! @SYMTestType CIT
|
sl@0
|
318 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
319 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001
|
sl@0
|
320 |
END_TESTCASE SEC-PKCS10-OOM-0001
|
sl@0
|
321 |
|
sl@0
|
322 |
START_TESTCASE SEC-PKCS10-OOM-0002
|
sl@0
|
323 |
//! @SYMTestCaseID SEC-PKCS10-OOM-0002
|
sl@0
|
324 |
//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
|
sl@0
|
325 |
//! Use the following parameters:
|
sl@0
|
326 |
//! Key Algorithm: DSA
|
sl@0
|
327 |
//! Key size: 512 bits
|
sl@0
|
328 |
//! Digest Algorithm: SHA1
|
sl@0
|
329 |
//! Number of attributes: 2
|
sl@0
|
330 |
//! @SYMPREQ CR0973
|
sl@0
|
331 |
//! @SYMREQ REQ1581.5
|
sl@0
|
332 |
//! @SYMTestPriority Critical
|
sl@0
|
333 |
//! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
|
sl@0
|
334 |
//! @SYMTestExpectedResults Encoding successfully validated
|
sl@0
|
335 |
//! @SYMTestType CIT
|
sl@0
|
336 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
337 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002
|
sl@0
|
338 |
END_TESTCASE SEC-PKCS10-OOM-0002
|
sl@0
|
339 |
|
sl@0
|
340 |
START_TESTCASE SEC-PKCS10-REU-0001
|
sl@0
|
341 |
//! @SYMTestCaseID SEC-PKCS10-REU-0001
|
sl@0
|
342 |
//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
|
sl@0
|
343 |
//! @SYMPREQ CR0973
|
sl@0
|
344 |
//! @SYMREQ REQ1581.5
|
sl@0
|
345 |
//! @SYMTestPriority Critical
|
sl@0
|
346 |
//! @SYMTestActions Create CPKCS10Attribute test object using using valid values.
|
sl@0
|
347 |
//! Use GetEncodingLC to retrieve ASN1 value from this instance.
|
sl@0
|
348 |
//! Use Reset method of CPKCS10Attribute test object with appropriate parameters.
|
sl@0
|
349 |
//! Use GetEncodingLC method again to check that new ASN1 value had been
|
sl@0
|
350 |
//! updated correctly.
|
sl@0
|
351 |
//!
|
sl@0
|
352 |
//! @SYMTestExpectedResults Encoding matches in both cases.
|
sl@0
|
353 |
//! @SYMTestType CIT
|
sl@0
|
354 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
355 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001
|
sl@0
|
356 |
END_TESTCASE SEC-PKCS10-REU-0001
|
sl@0
|
357 |
|
sl@0
|
358 |
START_TESTCASE SEC-PKCS10-REU-0002
|
sl@0
|
359 |
//! @SYMTestCaseID SEC-PKCS10-REU-0002
|
sl@0
|
360 |
//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
|
sl@0
|
361 |
//! @SYMPREQ CR0973
|
sl@0
|
362 |
//! @SYMREQ REQ1581.5
|
sl@0
|
363 |
//! @SYMTestPriority Critical
|
sl@0
|
364 |
//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values
|
sl@0
|
365 |
//! GetEncodingLC from test instance
|
sl@0
|
366 |
//! repopulate data using appropiate methods
|
sl@0
|
367 |
//! request a new cert request
|
sl@0
|
368 |
//! @SYMTestExpectedResults New cert request in created correctly
|
sl@0
|
369 |
//! @SYMTestType CIT
|
sl@0
|
370 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
371 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002
|
sl@0
|
372 |
END_TESTCASE SEC-PKCS10-REU-0002
|
sl@0
|
373 |
|
sl@0
|
374 |
START_TESTCASE SEC-PKCS10-REU-0003
|
sl@0
|
375 |
//! @SYMTestCaseID SEC-PKCS10-REU-0003
|
sl@0
|
376 |
//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
|
sl@0
|
377 |
//! @SYMPREQ CR0973
|
sl@0
|
378 |
//! @SYMREQ REQ1581.5
|
sl@0
|
379 |
//! @SYMTestPriority Critical
|
sl@0
|
380 |
//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values
|
sl@0
|
381 |
//! GetEncodingLC from test instance
|
sl@0
|
382 |
//! Do not repopulate data.
|
sl@0
|
383 |
//! request a new cert request
|
sl@0
|
384 |
//! @SYMTestExpectedResults New cert request in created correctly
|
sl@0
|
385 |
//! @SYMTestType CIT
|
sl@0
|
386 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
387 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003
|
sl@0
|
388 |
END_TESTCASE SEC-PKCS10-REU-0003
|
sl@0
|
389 |
|
sl@0
|
390 |
START_TESTCASE SEC-PKCS10-REU-0004
|
sl@0
|
391 |
//! @SYMTestCaseID SEC-PKCS10-REU-0004
|
sl@0
|
392 |
//! @SYMTestCaseDesc To check that a CPKCS9ChallengePasswordAttr can be reused with new values.
|
sl@0
|
393 |
//! @SYMPREQ CR0973
|
sl@0
|
394 |
//! @SYMREQ REQ1581.5
|
sl@0
|
395 |
//! @SYMTestPriority Critical
|
sl@0
|
396 |
//! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value.
|
sl@0
|
397 |
//! Use GetEncodingLC to retrieve ASN1 value from this instance.
|
sl@0
|
398 |
//! Use Reset method of CPKCS9ChallengePasswordAttr test object
|
sl@0
|
399 |
//! with appropriate parameter.
|
sl@0
|
400 |
//! Use GetEncodingLC method again to check that new ASN1 value
|
sl@0
|
401 |
//! had been updated correctly.
|
sl@0
|
402 |
//! @SYMTestExpectedResults Encoding matches in both cases.
|
sl@0
|
403 |
//! @SYMTestType CIT
|
sl@0
|
404 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
405 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004
|
sl@0
|
406 |
END_TESTCASE SEC-PKCS10-REU-0004
|
sl@0
|
407 |
|
sl@0
|
408 |
START_TESTCASE SEC-PKCS10-REU-0005
|
sl@0
|
409 |
//! @SYMTestCaseID SEC-PKCS10-REU-0005
|
sl@0
|
410 |
//! @SYMTestCaseDesc To check that a CPKCS10GenericAttr can be reused with new values.
|
sl@0
|
411 |
//! @SYMPREQ CR0973
|
sl@0
|
412 |
//! @SYMREQ REQ1581.5
|
sl@0
|
413 |
//! @SYMTestPriority Critical
|
sl@0
|
414 |
//! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values.
|
sl@0
|
415 |
//! Use GetEncodingLC to retrieve ASN1 value from this instance.
|
sl@0
|
416 |
//! Use ResetL method of CPKCS9ExtensionRequestAttr test object
|
sl@0
|
417 |
//! with appropriate parameters.
|
sl@0
|
418 |
//! Use GetEncodingLC method again to check that new ASN1 value had
|
sl@0
|
419 |
//! been updated correctly.
|
sl@0
|
420 |
//! @SYMTestExpectedResults Encoding matches in both cases.
|
sl@0
|
421 |
//! @SYMTestType CIT
|
sl@0
|
422 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
423 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005
|
sl@0
|
424 |
END_TESTCASE SEC-PKCS10-REU-0005
|
sl@0
|
425 |
|
sl@0
|
426 |
START_TESTCASE SEC-PKCS10-NEG-0001
|
sl@0
|
427 |
//! @SYMTestCaseID SEC-PKCS10-NEG-0001
|
sl@0
|
428 |
//! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a
|
sl@0
|
429 |
//! KErrBadDescriptor (or KErrArgument) when its methods are used with
|
sl@0
|
430 |
//! invalid/null value parameters.
|
sl@0
|
431 |
//! @SYMPREQ CR0973
|
sl@0
|
432 |
//! @SYMREQ REQ1581.5
|
sl@0
|
433 |
//! @SYMTestPriority Critical
|
sl@0
|
434 |
//! @SYMTestActions PKCS10 CPKCS10GenericAttr construction
|
sl@0
|
435 |
//! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument)
|
sl@0
|
436 |
//! @SYMTestType CIT
|
sl@0
|
437 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
438 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001
|
sl@0
|
439 |
END_TESTCASE SEC-PKCS10-NEG-0001
|
sl@0
|
440 |
|
sl@0
|
441 |
START_TESTCASE SEC-PKCS10-NEG-0002
|
sl@0
|
442 |
//! @SYMTestCaseID SEC-PKCS10-NEG-0002
|
sl@0
|
443 |
//! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a
|
sl@0
|
444 |
//! KErrArgument when its methods are used with null value parameters.
|
sl@0
|
445 |
//! @SYMPREQ CR0973
|
sl@0
|
446 |
//! @SYMREQ REQ1581.5
|
sl@0
|
447 |
//! @SYMTestPriority Critical
|
sl@0
|
448 |
//! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction
|
sl@0
|
449 |
//! @SYMTestExpectedResults Returns KErrArgument
|
sl@0
|
450 |
//! @SYMTestType CIT
|
sl@0
|
451 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
452 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002
|
sl@0
|
453 |
END_TESTCASE SEC-PKCS10-NEG-0002
|
sl@0
|
454 |
|
sl@0
|
455 |
START_TESTCASE SEC-PKCS10-NEG-0003
|
sl@0
|
456 |
//! @SYMTestCaseID SEC-PKCS10-NEG-0003
|
sl@0
|
457 |
//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise
|
sl@0
|
458 |
//! when application is trying to add malformed or un-initialised cert
|
sl@0
|
459 |
//! extension object to extension request.
|
sl@0
|
460 |
//! @SYMPREQ CR0973
|
sl@0
|
461 |
//! @SYMREQ REQ1581.5
|
sl@0
|
462 |
//! @SYMTestPriority Critical
|
sl@0
|
463 |
//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction.
|
sl@0
|
464 |
//! @SYMTestExpectedResults Returns KErrBadDescriptor
|
sl@0
|
465 |
//! @SYMTestType CIT
|
sl@0
|
466 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
467 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003
|
sl@0
|
468 |
END_TESTCASE SEC-PKCS10-NEG-0003
|
sl@0
|
469 |
|
sl@0
|
470 |
START_TESTCASE SEC-PKCS10-NEG-0004
|
sl@0
|
471 |
//! @SYMTestCaseID SEC-PKCS10-NEG-0004
|
sl@0
|
472 |
//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a
|
sl@0
|
473 |
//! KErrArgument when its methods are used with null value parameters.
|
sl@0
|
474 |
//! @SYMPREQ CR0973
|
sl@0
|
475 |
//! @SYMREQ REQ1581.5
|
sl@0
|
476 |
//! @SYMTestPriority Critical
|
sl@0
|
477 |
//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction
|
sl@0
|
478 |
//! @SYMTestExpectedResults Returns KErrArgument
|
sl@0
|
479 |
//! @SYMTestType CIT
|
sl@0
|
480 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
481 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004
|
sl@0
|
482 |
END_TESTCASE SEC-PKCS10-NEG-0004
|
sl@0
|
483 |
|
sl@0
|
484 |
START_TESTCASE SEC-PKCS10-NEG-0005
|
sl@0
|
485 |
//! @SYMTestCaseID SEC-PKCS10-NEG-0005
|
sl@0
|
486 |
//! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when
|
sl@0
|
487 |
//! its methods are used with invalid value parameters.
|
sl@0
|
488 |
//! @SYMPREQ CR0973
|
sl@0
|
489 |
//! @SYMREQ REQ1581.5
|
sl@0
|
490 |
//! @SYMTestPriority Critical
|
sl@0
|
491 |
//! @SYMTestActions PKCS10 CPKCS10Request construction.
|
sl@0
|
492 |
//! @SYMTestExpectedResults Returns KErrArgument
|
sl@0
|
493 |
//! @SYMTestType CIT
|
sl@0
|
494 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
495 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005
|
sl@0
|
496 |
END_TESTCASE SEC-PKCS10-NEG-0005
|
sl@0
|
497 |
|
sl@0
|
498 |
START_TESTCASE SEC-PKCS10-DEF103311-0001
|
sl@0
|
499 |
//! @SYMTestCaseID SEC-PKCS10-DEF103311-0001
|
sl@0
|
500 |
//! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1-
|
sl@0
|
501 |
//! @SYMREQ REQ0000
|
sl@0
|
502 |
//! @SYMTestPriority Critical
|
sl@0
|
503 |
//! @SYMTestActions Creates a CPKCS10Request and then cancels it.
|
sl@0
|
504 |
//! @SYMTestExpectedResults Returns KErrNone, no memory leak.
|
sl@0
|
505 |
//! @SYMTestType CIT
|
sl@0
|
506 |
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
|
sl@0
|
507 |
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001
|
sl@0
|
508 |
END_TESTCASE SEC-PKCS10-DEF103311-0001
|
sl@0
|
509 |
|
sl@0
|
510 |
//Post- test: re-states key store file
|
sl@0
|
511 |
RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat
|
sl@0
|
512 |
RUN_UTILS DeleteFile c:\keys.dat
|
sl@0
|
513 |
|
sl@0
|
514 |
PRINT Complete_tpkcs10serverv2_Tests
|