os/security/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
//
sl@0
     2
// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
// All rights reserved.
sl@0
     4
// This component and the accompanying materials are made available
sl@0
     5
// under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
// which accompanies this distribution, and is available
sl@0
     7
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
//
sl@0
     9
// Initial Contributors:
sl@0
    10
// Nokia Corporation - initial contribution.
sl@0
    11
//
sl@0
    12
// Contributors:
sl@0
    13
//
sl@0
    14
// Description: 
sl@0
    15
//
sl@0
    16
sl@0
    17
PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite 
sl@0
    18
sl@0
    19
LOAD_SUITE tpkcs10serverv2
sl@0
    20
sl@0
    21
// pre- test: move out of the way key store file.
sl@0
    22
RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat
sl@0
    23
START_TESTCASE 			SEC-PKCS10-RSA-0001
sl@0
    24
//! @SYMTestCaseID 		SEC-PKCS10-RSA-0001
sl@0
    25
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
    26
//!		     		certificate requests using the parameters listed below.
sl@0
    27
//!		  		Key Algorithm: RSA
sl@0
    28
//!				Key size: 512 bits 
sl@0
    29
//!		    		Digest Algorithm: SHA1 
sl@0
    30
//!				Number of attributes: 0	
sl@0
    31
//! @SYMPREQ 			CR0973
sl@0
    32
//! @SYMREQ 			REQ1581.5
sl@0
    33
//! @SYMTestPriority 		Critical
sl@0
    34
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
    35
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
    36
//! @SYMTestType CIT
sl@0
    37
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
    38
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001
sl@0
    39
END_TESTCASE 			SEC-PKCS10-RSA-0001
sl@0
    40
sl@0
    41
START_TESTCASE 			SEC-PKCS10-RSA-0002
sl@0
    42
//! @SYMTestCaseID 		SEC-PKCS10-RSA-0002
sl@0
    43
//! @SYMTestCaseDesc		check that CPKCS10Request class generates correct encoding for 
sl@0
    44
//!		     		certificate requests using the parameters listed below.
sl@0
    45
//!		  		Key Algorithm: RSA
sl@0
    46
//!				Key size: 512 bits 
sl@0
    47
//!		    	  	Digest Algorithm: MD2 
sl@0
    48
//!				Number of attributes: 0	
sl@0
    49
//! @SYMPREQ 			CR0973
sl@0
    50
//! @SYMREQ 			REQ1581.5
sl@0
    51
//! @SYMTestPriority 		Critical
sl@0
    52
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
    53
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
    54
//! @SYMTestType 		CIT
sl@0
    55
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
    56
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002
sl@0
    57
END_TESTCASE 			SEC-PKCS10-RSA-0002
sl@0
    58
sl@0
    59
START_TESTCASE 			SEC-PKCS10-RSA-0003
sl@0
    60
sl@0
    61
//! @SYMTestCaseID 		SEC-PKCS10-RSA-0003
sl@0
    62
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
    63
//!		     		certificate requests using the parameters listed below.
sl@0
    64
//!		  		Key Algorithm: RSA
sl@0
    65
//!				Key size: 512 bits 
sl@0
    66
//!		     		   Digest Algorithm: MD5 
sl@0
    67
//!				Number of attributes: 0
sl@0
    68
//! @SYMPREQ 			CR0973
sl@0
    69
//! @SYMREQ 			REQ1581.5
sl@0
    70
//! @SYMTestPriority 		Critical
sl@0
    71
//! @SYMTestActions	 	PKCS10 certificate request construction.
sl@0
    72
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
    73
//! @SYMTestType 		CIT
sl@0
    74
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
    75
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003
sl@0
    76
END_TESTCASE 			SEC-PKCS10-RSA-0003
sl@0
    77
sl@0
    78
START_TESTCASE 			SEC-PKCS10-RSA-0004
sl@0
    79
//! @SYMTestCaseID 		SEC-PKCS10-RSA-0004
sl@0
    80
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
    81
//!		     		certificate requests using the parameters listed below.
sl@0
    82
//!		  		Key Algorithm: RSA
sl@0
    83
//!				Key size: 512 bits 
sl@0
    84
//!		     		   Digest Algorithm: SHA1
sl@0
    85
//!				Number of attributes: 1 (challenge password)
sl@0
    86
//! @SYMPREQ 			CR0973
sl@0
    87
//! @SYMREQ 			REQ1581.5
sl@0
    88
//! @SYMTestPriority 		Critical
sl@0
    89
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
    90
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
    91
//! @SYMTestType 		CIT
sl@0
    92
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
    93
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004
sl@0
    94
END_TESTCASE 			SEC-PKCS10-RSA-0004
sl@0
    95
sl@0
    96
START_TESTCASE 			SEC-PKCS10-RSA-0005
sl@0
    97
//! @SYMTestCaseID 		SEC-PKCS10-RSA-0005
sl@0
    98
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
    99
//!		     		certificate requests using the parameters listed below.
sl@0
   100
//!		  		Key Algorithm: RSA
sl@0
   101
//!				Key size: 512 bits 
sl@0
   102
//!		        	Digest Algorithm: SHA1 
sl@0
   103
//!				Number of attributes: 2 (challenge password and structured name)
sl@0
   104
//! @SYMPREQ 			CR0973
sl@0
   105
//! @SYMREQ 			REQ1581.5
sl@0
   106
//! @SYMTestPriority 		Critical
sl@0
   107
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   108
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   109
//! @SYMTestType 		CIT
sl@0
   110
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   111
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005
sl@0
   112
END_TESTCASE 			SEC-PKCS10-RSA-0005
sl@0
   113
sl@0
   114
START_TESTCASE 			SEC-PKCS10-RSA-0006
sl@0
   115
//! @SYMTestCaseID 		SEC-PKCS10-RSA-0006
sl@0
   116
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   117
//!		     		certificate requests using the parameters listed below.
sl@0
   118
//!		  		Key Algorithm: RSA
sl@0
   119
//!				Key size: 2048 bits 
sl@0
   120
//!		     		   Digest Algorithm: SHA1 
sl@0
   121
//!				Number of attributes: 2 (challenge password and structured name)
sl@0
   122
//! @SYMPREQ 			CR0973
sl@0
   123
//! @SYMREQ 			REQ1581.5
sl@0
   124
//! @SYMTestPriority 		Critical
sl@0
   125
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   126
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   127
//! @SYMTestType 		CIT
sl@0
   128
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   129
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006
sl@0
   130
END_TESTCASE 			SEC-PKCS10-RSA-0006
sl@0
   131
sl@0
   132
START_TESTCASE 			SEC-PKCS10-DSA-0001
sl@0
   133
//! @SYMTestCaseID 		SEC-PKCS10-DSA-0001
sl@0
   134
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   135
//!		     		certificate requests using the parameters listed below.
sl@0
   136
//!		  		Key Algorithm: DSA
sl@0
   137
//!				Key size: 512 bits 
sl@0
   138
//!		        	Digest Algorithm: SHA1 
sl@0
   139
//!				Number of attributes: 0
sl@0
   140
//! @SYMPREQ 			CR0973
sl@0
   141
//! @SYMREQ 			REQ1581.5
sl@0
   142
//! @SYMTestPriority 		Critical
sl@0
   143
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   144
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   145
//! @SYMTestType 		CIT
sl@0
   146
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   147
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001
sl@0
   148
END_TESTCASE 			SEC-PKCS10-DSA-0001
sl@0
   149
sl@0
   150
START_TESTCASE 			SEC-PKCS10-DSA-0002
sl@0
   151
//! @SYMTestCaseID 		SEC-PKCS10-DSA-0002
sl@0
   152
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   153
//!		    		 certificate requests using the parameters listed below.
sl@0
   154
//!		  		Key Algorithm: DSA
sl@0
   155
//!				Key size: 512 bits 
sl@0
   156
//!		        	Digest Algorithm: SHA1
sl@0
   157
//!				Number of attributes: 1 (challenge password)
sl@0
   158
//! @SYMPREQ 			CR0973
sl@0
   159
//! @SYMREQ 			REQ1581.5
sl@0
   160
//! @SYMTestPriority 		Critical
sl@0
   161
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   162
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   163
//! @SYMTestType 		CIT
sl@0
   164
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   165
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002
sl@0
   166
END_TESTCASE 			SEC-PKCS10-DSA-0002
sl@0
   167
sl@0
   168
START_TESTCASE 			SEC-PKCS10-DSA-0003
sl@0
   169
//! @SYMTestCaseID 		SEC-PKCS10-DSA-0003
sl@0
   170
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   171
//!		     		certificate requests using the parameters listed below.
sl@0
   172
//!		  		Key Algorithm: DSA
sl@0
   173
//!				Key size: 512 bits 
sl@0
   174
//!		        	Digest Algorithm: SHA1 
sl@0
   175
//!				Number of attributes: 2 (challenge password and structured name)
sl@0
   176
//! @SYMPREQ 			CR0973
sl@0
   177
//! @SYMREQ 			REQ1581.5
sl@0
   178
//! @SYMTestPriority 		Critical
sl@0
   179
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   180
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   181
//! @SYMTestType 		CIT
sl@0
   182
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   183
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003
sl@0
   184
END_TESTCASE 			SEC-PKCS10-DSA-0003
sl@0
   185
sl@0
   186
START_TESTCASE 			SEC-PKCS10-DSA-0004
sl@0
   187
//! @SYMTestCaseID 		SEC-PKCS10-DSA-0004
sl@0
   188
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   189
//!		     		certificate requests using the parameters listed below.
sl@0
   190
//!		  		Key Algorithm: DSA
sl@0
   191
//!				Key size: 2048 bits 
sl@0
   192
//!		     		Digest Algorithm: SHA1 
sl@0
   193
//!				Number of attributes: 2 (challenge password and structured name)
sl@0
   194
//! @SYMPREQ 			CR0973
sl@0
   195
//! @SYMREQ 			REQ1581.5
sl@0
   196
//! @SYMTestPriority 		Critical
sl@0
   197
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   198
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   199
//! @SYMTestType 		CIT
sl@0
   200
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   201
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004
sl@0
   202
END_TESTCASE 			SEC-PKCS10-DSA-0004
sl@0
   203
sl@0
   204
START_TESTCASE 			SEC-PKCS10-EXT-0001
sl@0
   205
//! @SYMTestCaseID 		SEC-PKCS10-EXT-0001
sl@0
   206
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   207
//!		     		certificate requests including extension requestsusing the parameters listed below.
sl@0
   208
//!		  		Key Algorithm: RSA
sl@0
   209
//!				Key size: 2048 bits 
sl@0
   210
//!		     		   Digest Algorithm: SHA1 
sl@0
   211
//!				Number of attributes: 2 (challenge password and structured name)
sl@0
   212
//!				Extensions used: basic Constraints,
sl@0
   213
//!				 subject Alt Name,
sl@0
   214
//!				 issuer Alt Name, 
sl@0
   215
//!			         key Usage,
sl@0
   216
//!                              extended Key Usage,
sl@0
   217
//!				 authority Info Access 
sl@0
   218
//! @SYMPREQ 			CR0973
sl@0
   219
//! @SYMREQ 			REQ1581.5
sl@0
   220
//! @SYMTestPriority 		Critical
sl@0
   221
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   222
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   223
//! @SYMTestType 		CIT
sl@0
   224
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   225
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001
sl@0
   226
END_TESTCASE 			SEC-PKCS10-EXT-0001
sl@0
   227
sl@0
   228
START_TESTCASE 			SEC-PKCS10-EXT-0002
sl@0
   229
//! @SYMTestCaseID 		SEC-PKCS10-EXT-0002
sl@0
   230
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   231
//!		     		certificate requests including extension requestsusing the parameters listed below.
sl@0
   232
//!		  		Key Algorithm: RSA
sl@0
   233
//!				Key size: 2048 bits 
sl@0
   234
//!		       		 Digest Algorithm: MD2 
sl@0
   235
//!				Number of attributes: 2 (challenge password and structured name)
sl@0
   236
//!				Extensions used: basic Constraints,
sl@0
   237
//!					 subject Alt Name,
sl@0
   238
//!					 issuer Alt Name, 
sl@0
   239
//!			                 key Usage,
sl@0
   240
//!                                      extended Key Usage,
sl@0
   241
//!					 authority Info Access 
sl@0
   242
//!		
sl@0
   243
//! @SYMPREQ 			CR0973
sl@0
   244
//! @SYMREQ 			REQ1581.5
sl@0
   245
//! @SYMTestPriority 		Critical
sl@0
   246
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   247
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   248
//! @SYMTestType 		CIT
sl@0
   249
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   250
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002
sl@0
   251
END_TESTCASE 			SEC-PKCS10-EXT-0002
sl@0
   252
sl@0
   253
START_TESTCASE 			SEC-PKCS10-EXT-0003
sl@0
   254
//! @SYMTestCaseID 		SEC-PKCS10-EXT-0003
sl@0
   255
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   256
//!		     		certificate requests including extension requestsusing the parameters listed below.
sl@0
   257
//!		  		Key Algorithm: RSA
sl@0
   258
//!				Key size: 2048 bits 
sl@0
   259
//!		     	   	Digest Algorithm: MD5 
sl@0
   260
//!				Number of attributes: 2 (challenge password and structured name)
sl@0
   261
//!				Extensions used: basic Constraints,
sl@0
   262
//!					 subject Alt Name,
sl@0
   263
//!					 issuer Alt Name, 
sl@0
   264
//!			                 key Usage,
sl@0
   265
//!                                      extended Key Usage,
sl@0
   266
//!					 authority Info Access 
sl@0
   267
//!		
sl@0
   268
//! @SYMPREQ 			CR0973
sl@0
   269
//! @SYMREQ 			REQ1581.5
sl@0
   270
//! @SYMTestPriority 		Critical
sl@0
   271
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   272
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   273
//! @SYMTestType 		CIT
sl@0
   274
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   275
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003
sl@0
   276
END_TESTCASE 			SEC-PKCS10-EXT-0003
sl@0
   277
sl@0
   278
START_TESTCASE 			SEC-PKCS10-EXT-0004
sl@0
   279
//! @SYMTestCaseID 		SEC-PKCS10-EXT-0004
sl@0
   280
//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
sl@0
   281
//!		     		certificate requests including extension requestsusing the parameters listed below.
sl@0
   282
//!		  		Key Algorithm: DSA
sl@0
   283
//!				Key size: 2048 bits 
sl@0
   284
//!		        	Digest Algorithm: SHA1 
sl@0
   285
//!				Number of attributes: 2 (challenge password and structured name)
sl@0
   286
//!				Extensions used: basic Constraints,
sl@0
   287
//!					 subject Alt Name,
sl@0
   288
//!					 issuer Alt Name, 
sl@0
   289
//!			                 key Usage,
sl@0
   290
//!                                      extended Key Usage,
sl@0
   291
//!					 authority Info Access 
sl@0
   292
//!		
sl@0
   293
//! @SYMPREQ 			CR0973
sl@0
   294
//! @SYMREQ 			REQ1581.5
sl@0
   295
//! @SYMTestPriority 		Critical
sl@0
   296
//! @SYMTestActions 		PKCS10 certificate request construction.
sl@0
   297
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   298
//! @SYMTestType 		CIT
sl@0
   299
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   300
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004
sl@0
   301
END_TESTCASE 			SEC-PKCS10-EXT-0004
sl@0
   302
sl@0
   303
START_TESTCASE 			SEC-PKCS10-OOM-0001
sl@0
   304
//! @SYMTestCaseID 		SEC-PKCS10-OOM-0001
sl@0
   305
//! @SYMTestCaseDesc 		To check that CPKCS10Request class can manage out of memory conditions graciously
sl@0
   306
//!		  		Use the following parameters:
sl@0
   307
//!				Key Algorithm: RSA
sl@0
   308
//!				Key size: 512 bits 
sl@0
   309
//!		     		   Digest Algorithm: SHA1 
sl@0
   310
//!				Number of attributes: 2
sl@0
   311
//!		
sl@0
   312
//! @SYMPREQ 			CR0973
sl@0
   313
//! @SYMREQ 			REQ1581.5
sl@0
   314
//! @SYMTestPriority 		Critical
sl@0
   315
//! @SYMTestActions 		PKCS10 certificate request construction in OOM conditions.
sl@0
   316
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   317
//! @SYMTestType 		CIT
sl@0
   318
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   319
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001
sl@0
   320
END_TESTCASE 			SEC-PKCS10-OOM-0001
sl@0
   321
sl@0
   322
START_TESTCASE 			SEC-PKCS10-OOM-0002
sl@0
   323
//! @SYMTestCaseID 		SEC-PKCS10-OOM-0002
sl@0
   324
//! @SYMTestCaseDesc 		To check that CPKCS10Request class can manage out of memory conditions graciously
sl@0
   325
//!		  		Use the following parameters:
sl@0
   326
//!				Key Algorithm: DSA
sl@0
   327
//!				Key size: 512 bits 
sl@0
   328
//!		       		 Digest Algorithm: SHA1 
sl@0
   329
//!				Number of attributes: 2
sl@0
   330
//! @SYMPREQ 			CR0973
sl@0
   331
//! @SYMREQ 			REQ1581.5
sl@0
   332
//! @SYMTestPriority 		Critical
sl@0
   333
//! @SYMTestActions 		PKCS10 certificate request construction in OOM conditions.
sl@0
   334
//! @SYMTestExpectedResults 	Encoding successfully validated
sl@0
   335
//! @SYMTestType 		CIT
sl@0
   336
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   337
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002
sl@0
   338
END_TESTCASE 			SEC-PKCS10-OOM-0002
sl@0
   339
sl@0
   340
START_TESTCASE 			SEC-PKCS10-REU-0001
sl@0
   341
//! @SYMTestCaseID 		SEC-PKCS10-REU-0001
sl@0
   342
//! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.		
sl@0
   343
//! @SYMPREQ 			CR0973
sl@0
   344
//! @SYMREQ 			REQ1581.5
sl@0
   345
//! @SYMTestPriority 		Critical
sl@0
   346
//! @SYMTestActions 		Create CPKCS10Attribute test object using using valid values.
sl@0
   347
//!					Use GetEncodingLC to retrieve ASN1 value from this instance.
sl@0
   348
//!					Use Reset method of CPKCS10Attribute test object with appropriate parameters.
sl@0
   349
//!					Use GetEncodingLC method again to check that new ASN1 value had been 
sl@0
   350
//!					updated correctly. 
sl@0
   351
//!
sl@0
   352
//! @SYMTestExpectedResults 	Encoding matches in both cases.
sl@0
   353
//! @SYMTestType 		CIT
sl@0
   354
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   355
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001
sl@0
   356
END_TESTCASE 			SEC-PKCS10-REU-0001
sl@0
   357
sl@0
   358
START_TESTCASE 			SEC-PKCS10-REU-0002
sl@0
   359
//! @SYMTestCaseID 		SEC-PKCS10-REU-0002
sl@0
   360
//! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.	
sl@0
   361
//! @SYMPREQ 			CR0973
sl@0
   362
//! @SYMREQ 			REQ1581.5
sl@0
   363
//! @SYMTestPriority 		Critical
sl@0
   364
//! @SYMTestActions     	Create CPKCS10Attribute instance with appropiate values
sl@0
   365
//!                     	GetEncodingLC from test instance
sl@0
   366
//!                     	repopulate data using appropiate methods 
sl@0
   367
//! 				request a new cert request	
sl@0
   368
//! @SYMTestExpectedResults 	New cert request in created correctly
sl@0
   369
//! @SYMTestType 		CIT
sl@0
   370
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   371
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002
sl@0
   372
END_TESTCASE 			SEC-PKCS10-REU-0002
sl@0
   373
sl@0
   374
START_TESTCASE 			SEC-PKCS10-REU-0003
sl@0
   375
//! @SYMTestCaseID 		SEC-PKCS10-REU-0003
sl@0
   376
//! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.	
sl@0
   377
//! @SYMPREQ 			CR0973
sl@0
   378
//! @SYMREQ 			REQ1581.5
sl@0
   379
//! @SYMTestPriority 		Critical
sl@0
   380
//! @SYMTestActions    		Create CPKCS10Attribute instance with appropiate values
sl@0
   381
//!                     	GetEncodingLC from test instance
sl@0
   382
//!                     	Do not repopulate data.
sl@0
   383
//! 				request a new cert request	
sl@0
   384
//! @SYMTestExpectedResults 	New cert request in created correctly
sl@0
   385
//! @SYMTestType 		CIT
sl@0
   386
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   387
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003
sl@0
   388
END_TESTCASE 			SEC-PKCS10-REU-0003
sl@0
   389
sl@0
   390
START_TESTCASE 			SEC-PKCS10-REU-0004
sl@0
   391
//! @SYMTestCaseID 		SEC-PKCS10-REU-0004
sl@0
   392
//! @SYMTestCaseDesc  		To check that a CPKCS9ChallengePasswordAttr can be reused with new values.
sl@0
   393
//! @SYMPREQ 			CR0973
sl@0
   394
//! @SYMREQ 			REQ1581.5
sl@0
   395
//! @SYMTestPriority 		Critical
sl@0
   396
//! @SYMTestActions 		Create CPKCS9ChallengePasswordAttr test object using valid value.
sl@0
   397
//!					Use GetEncodingLC to retrieve ASN1 value from this instance.
sl@0
   398
//!					Use Reset method of CPKCS9ChallengePasswordAttr test object 
sl@0
   399
//!					with appropriate parameter.
sl@0
   400
//!					Use GetEncodingLC method again to check that new ASN1 value 
sl@0
   401
//!					had been updated correctly. 
sl@0
   402
//! @SYMTestExpectedResults 	Encoding matches in both cases.
sl@0
   403
//! @SYMTestType 		CIT
sl@0
   404
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   405
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004
sl@0
   406
END_TESTCASE 			SEC-PKCS10-REU-0004
sl@0
   407
sl@0
   408
START_TESTCASE 			SEC-PKCS10-REU-0005
sl@0
   409
//! @SYMTestCaseID 		SEC-PKCS10-REU-0005
sl@0
   410
//! @SYMTestCaseDesc  		To check that a CPKCS10GenericAttr can be reused with new values.
sl@0
   411
//! @SYMPREQ 			CR0973
sl@0
   412
//! @SYMREQ 			REQ1581.5
sl@0
   413
//! @SYMTestPriority 		Critical
sl@0
   414
//! @SYMTestActions 		Create CPKCS9ExtensionRequestAttr test object using valid values.
sl@0
   415
//!					Use GetEncodingLC to retrieve ASN1 value from this instance.
sl@0
   416
//!					Use ResetL method of CPKCS9ExtensionRequestAttr test object 
sl@0
   417
//!					with appropriate parameters.
sl@0
   418
//!					Use GetEncodingLC method again to check that new ASN1 value had 
sl@0
   419
//!					been updated correctly. 
sl@0
   420
//! @SYMTestExpectedResults Encoding matches in both cases.
sl@0
   421
//! @SYMTestType 		CIT
sl@0
   422
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   423
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005
sl@0
   424
END_TESTCASE 			SEC-PKCS10-REU-0005
sl@0
   425
sl@0
   426
START_TESTCASE 			SEC-PKCS10-NEG-0001
sl@0
   427
//! @SYMTestCaseID 		SEC-PKCS10-NEG-0001
sl@0
   428
//! @SYMTestCaseDesc 		Check that CPKCS10GenericAttr class returns a 
sl@0
   429
//!				KErrBadDescriptor (or KErrArgument) when its methods are used with 
sl@0
   430
//!				invalid/null value parameters. 
sl@0
   431
//! @SYMPREQ 			CR0973
sl@0
   432
//! @SYMREQ 			REQ1581.5
sl@0
   433
//! @SYMTestPriority 		Critical
sl@0
   434
//! @SYMTestActions 		PKCS10 CPKCS10GenericAttr construction
sl@0
   435
//! @SYMTestExpectedResults 	Returns KErrBadDescriptor (or KErrArgument)
sl@0
   436
//! @SYMTestType 		CIT
sl@0
   437
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   438
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001
sl@0
   439
END_TESTCASE 			SEC-PKCS10-NEG-0001
sl@0
   440
sl@0
   441
START_TESTCASE 			SEC-PKCS10-NEG-0002
sl@0
   442
//! @SYMTestCaseID 		SEC-PKCS10-NEG-0002
sl@0
   443
//! @SYMTestCaseDesc 		Check that CPKCS9ChallengePasswordAttr class returns a 
sl@0
   444
//!				KErrArgument when its methods are used with null value parameters. 
sl@0
   445
//! @SYMPREQ 			CR0973
sl@0
   446
//! @SYMREQ 			REQ1581.5
sl@0
   447
//! @SYMTestPriority 		Critical
sl@0
   448
//! @SYMTestActions 		PKCS10 CPKCS9ChallengePasswordAttr construction
sl@0
   449
//! @SYMTestExpectedResults 	Returns KErrArgument
sl@0
   450
//! @SYMTestType 		CIT
sl@0
   451
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   452
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002
sl@0
   453
END_TESTCASE 			SEC-PKCS10-NEG-0002
sl@0
   454
sl@0
   455
START_TESTCASE 			SEC-PKCS10-NEG-0003
sl@0
   456
//! @SYMTestCaseID 		SEC-PKCS10-NEG-0003
sl@0
   457
//! @SYMTestCaseDesc 		Check that CPKCS9ExtensionRequestAttr class can recognise 
sl@0
   458
//!				when application is trying to add malformed or un-initialised cert 
sl@0
   459
//!				extension object to extension request.
sl@0
   460
//! @SYMPREQ 			CR0973
sl@0
   461
//! @SYMREQ 			REQ1581.5
sl@0
   462
//! @SYMTestPriority 		Critical
sl@0
   463
//! @SYMTestActions 		PKCS10 CPKCS9ExtensionRequestAttr construction.
sl@0
   464
//! @SYMTestExpectedResults 	Returns KErrBadDescriptor
sl@0
   465
//! @SYMTestType 		CIT
sl@0
   466
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   467
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003
sl@0
   468
END_TESTCASE 			SEC-PKCS10-NEG-0003
sl@0
   469
sl@0
   470
START_TESTCASE 			SEC-PKCS10-NEG-0004
sl@0
   471
//! @SYMTestCaseID 		SEC-PKCS10-NEG-0004
sl@0
   472
//! @SYMTestCaseDesc 		Check that CPKCS9ExtensionRequestAttr class returns a 
sl@0
   473
//!				KErrArgument when its methods are used with null value parameters.
sl@0
   474
//! @SYMPREQ 			CR0973
sl@0
   475
//! @SYMREQ 			REQ1581.5
sl@0
   476
//! @SYMTestPriority 		Critical
sl@0
   477
//! @SYMTestActions 		PKCS10 CPKCS9ExtensionRequestAttr construction
sl@0
   478
//! @SYMTestExpectedResults 	Returns KErrArgument
sl@0
   479
//! @SYMTestType 		CIT
sl@0
   480
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   481
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004
sl@0
   482
END_TESTCASE 			SEC-PKCS10-NEG-0004
sl@0
   483
sl@0
   484
START_TESTCASE 			SEC-PKCS10-NEG-0005
sl@0
   485
//! @SYMTestCaseID 		SEC-PKCS10-NEG-0005
sl@0
   486
//! @SYMTestCaseDesc 		Check that CPKCS10Request class returns a KErrArgument when 
sl@0
   487
//!				its methods are used with invalid value parameters.
sl@0
   488
//! @SYMPREQ 			CR0973
sl@0
   489
//! @SYMREQ 			REQ1581.5
sl@0
   490
//! @SYMTestPriority 		Critical
sl@0
   491
//! @SYMTestActions 		PKCS10 CPKCS10Request construction.
sl@0
   492
//! @SYMTestExpectedResults 	Returns KErrArgument
sl@0
   493
//! @SYMTestType 		CIT
sl@0
   494
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   495
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005
sl@0
   496
END_TESTCASE 			SEC-PKCS10-NEG-0005
sl@0
   497
sl@0
   498
START_TESTCASE 			SEC-PKCS10-DEF103311-0001
sl@0
   499
//! @SYMTestCaseID 		SEC-PKCS10-DEF103311-0001
sl@0
   500
//! @SYMTestCaseDesc 		Test case added for defect DEF103311, increases test coverage for PKCS1-
sl@0
   501
//! @SYMREQ 			REQ0000
sl@0
   502
//! @SYMTestPriority 		Critical
sl@0
   503
//! @SYMTestActions 		Creates a CPKCS10Request and then cancels it. 
sl@0
   504
//! @SYMTestExpectedResults 	Returns KErrNone, no memory leak.
sl@0
   505
//! @SYMTestType 		CIT
sl@0
   506
RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
sl@0
   507
RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001
sl@0
   508
END_TESTCASE 			SEC-PKCS10-DEF103311-0001
sl@0
   509
sl@0
   510
//Post- test: re-states key store file
sl@0
   511
RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat 
sl@0
   512
RUN_UTILS DeleteFile c:\keys.dat 
sl@0
   513
sl@0
   514
PRINT Complete_tpkcs10serverv2_Tests