os/security/cryptoservices/certificateandkeymgmt/tpkixcert_tef/scripts/tpkixcert_tef.script
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
//
sl@0
     2
// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
// All rights reserved.
sl@0
     4
// This component and the accompanying materials are made available
sl@0
     5
// under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
// which accompanies this distribution, and is available
sl@0
     7
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
//
sl@0
     9
// Initial Contributors:
sl@0
    10
// Nokia Corporation - initial contribution.
sl@0
    11
//
sl@0
    12
// Contributors:
sl@0
    13
//
sl@0
    14
// Description: 
sl@0
    15
//
sl@0
    16
//! @file
sl@0
    17
//! @SYMTestSuiteName SEC-CERTMAN
sl@0
    18
//! @SYMScriptTestEnvironment The script has no specific test environment requirements. 
sl@0
    19
//! @SYMScriptPurpose Test the published API functions of CPKIXCertChain.
sl@0
    20
sl@0
    21
LOAD_SUITE tpkixcert_tefserver
sl@0
    22
sl@0
    23
sl@0
    24
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-DATETIME-0001
sl@0
    25
//! @SYMTestCaseDesc 		Testing CPKIXCertChain date and time checking behaviour during certificate validation.
sl@0
    26
//! @SYMCR 			1240
sl@0
    27
//! @SYMTestPriority 		Critical
sl@0
    28
//! @SYMTestActions 		1)	Construct the certificate chain. 
sl@0
    29
//! 				2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
sl@0
    30
//! 				3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
sl@0
    31
//! 				4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
sl@0
    32
//! 				5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
sl@0
    33
//! 				6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has expired.  
sl@0
    34
//! 				7) Cleanup the certificate chain and utility classes. 
sl@0
    35
//! @SYMTestExpectedResults 	Calls 2 and 6 should fail with EDateOutOfRange.  Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()).
sl@0
    36
//! @SYMTestType 		CIT
sl@0
    37
//! @SYMTestPurpose 		1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
sl@0
    38
//! 				2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
sl@0
    39
//! 				3) Then ensure this has left the system in the correct state to maintain normal behaviour.
sl@0
    40
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0001
sl@0
    41
RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ExpiredDateTime
sl@0
    42
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0001
sl@0
    43
sl@0
    44
sl@0
    45
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-DATETIME-0002
sl@0
    46
//! @SYMTestCaseDesc 		TestingCPKIXCertChain date and time checking behaviour during certificate validation.
sl@0
    47
//! @SYMCR 			1240
sl@0
    48
//! @SYMTestPriority 		Critical
sl@0
    49
//! @SYMTestActions 		1)	Construct the certificate chain. 
sl@0
    50
//! 				2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
sl@0
    51
//! 				3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
sl@0
    52
//! 				4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
sl@0
    53
//! 				5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
sl@0
    54
//! 				6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain has not yet become valid.  
sl@0
    55
//! 				7) Cleanup the certificate chain and utility classes. 
sl@0
    56
//! @SYMTestExpectedResults 	Calls 2 and 6 should fail with EDateOutOfRange.  Call 4 should pass with EValidatedOK but report the warning EDateOutOfRange through both the old warnings API(CPKIXValidationResult::Warnings()) and the new one(CCertificateWarning::Warnings()).
sl@0
    57
//! @SYMTestType 		CIT
sl@0
    58
//! @SYMTestPurpose 		1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
sl@0
    59
//! 				2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
sl@0
    60
//! 				3) Then ensure this has left the system in the correct state to maintain normal behaviour.
sl@0
    61
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0002
sl@0
    62
RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini InvalidDateTime
sl@0
    63
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0002
sl@0
    64
sl@0
    65
sl@0
    66
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-DATETIME-0003
sl@0
    67
//! @SYMTestCaseDesc 		TestingCPKIXCertChain date and time checking behaviour during certificate validation.
sl@0
    68
//! @SYMCR 			1240
sl@0
    69
//! @SYMTestPriority 		Critical
sl@0
    70
//! @SYMTestActions 		1)	Construct the certificate chain. 
sl@0
    71
//! 				2) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
sl@0
    72
//! 				3) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in EFalse.  
sl@0
    73
//! 				4) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
sl@0
    74
//! 				5) Call CPKIXCertChain::SetValidityPeriodCheckFatal() passing in ETrue. 
sl@0
    75
//! 				6) Call CPKIXCertChain::ValidateL() passing in a validation time where the certificate chain is valid.  
sl@0
    76
//! 				7) Cleanup the certificate chain and utility classes. 
sl@0
    77
//! @SYMTestExpectedResults 	Calls 2, 4 and 6 should validate successfully with EValidatedOK.
sl@0
    78
//! @SYMTestType 		CIT
sl@0
    79
//! @SYMTestPurpose 		1) Check that current behaviour has not been altered and we still fail to validate out of date certificate chains.  
sl@0
    80
//! 				2) Check that new behaviour works correctly by allowing a certificate chain with an invalid date to validate successfully when explicitly told to.  
sl@0
    81
//! 				3) Then ensure this has left the system in the correct state to maintain normal behaviour.
sl@0
    82
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0003
sl@0
    83
RUN_TEST_STEP 100 tpkixcert_tefserver DateTimeFatalValidateTest c:\tpkixcert_tef\scripts\validatetests.ini ValidDateTime
sl@0
    84
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-DATETIME-0003
sl@0
    85
sl@0
    86
sl@0
    87
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0001
sl@0
    88
//! @SYMTestCaseDesc 		Test correct behaviour of customisable supported critical extension processing.
sl@0
    89
//! @SYMCR 1399
sl@0
    90
//! @SYMTestPriority 		Critical
sl@0
    91
//! @SYMTestActions 		1) Construct the certificate chain.
sl@0
    92
//! 				2) Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL(). 
sl@0
    93
//! 				3) Call CPKIXCertChain::ValidateL(). 
sl@0
    94
//! 				4) Ensure all critical extensions encountered are supported and that the certificate and certificate index information in the results match up with the correct certificates. 
sl@0
    95
//! 				5) Cleanup the certificate chain and utility classes. 
sl@0
    96
//! @SYMTestExpectedResults 	Chain should validate successfully.  All critical extensions should be reported through the new certificate warnings API (CCertificateWarning::CriticalExtensionsFound()).
sl@0
    97
//! @SYMTestType 		CIT
sl@0
    98
//! @SYMTestPurpose 		Test we correctly report the full gamut of possible critical extension patterns we may be expected to deal with in a certificate chain – multiple extensions in one certificate, multiple extensions spanning multiple certificates and the same extension in multiple certificates.
sl@0
    99
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0001
sl@0
   100
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini CustomCriticalExts
sl@0
   101
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini CustomCriticalExts1
sl@0
   102
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0001
sl@0
   103
sl@0
   104
sl@0
   105
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0002
sl@0
   106
//! @SYMTestCaseDesc 		Test old and new warnings API for consistency and backwards compatibility.
sl@0
   107
//! @SYMCR 			1399
sl@0
   108
//! @SYMTestPriority 		Critical
sl@0
   109
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   110
//! 				2)	Set the supported OID list to the default OIDs and the new ones through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().  
sl@0
   111
//! 				3) 	Call CPKIXCertChain::ValidateL().  
sl@0
   112
//! 				4)	Compare resultant warnings.  
sl@0
   113
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   114
//! @SYMTestExpectedResults 	Chain should validate successfully.  Each of the recognised critical extensions should be reported both as a warning through the old warnings return and through the new API CCertificateWarning::CriticalExtensionsFound().  CCertificateWarning::Warnings() should contain the other warnings found in CPKIXValidationResult::Warnings().  The new returns mechanism should have no additional warnings.
sl@0
   115
//! @SYMTestType 		CIT
sl@0
   116
//! @SYMTestPurpose 		Ensure backwards compatibility of old style warning reporting and ensure the new warning returns match up with this.
sl@0
   117
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0002
sl@0
   118
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Warnings
sl@0
   119
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0002
sl@0
   120
sl@0
   121
sl@0
   122
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0003
sl@0
   123
//! @SYMTestCaseDesc 		Check supported OID list processing resilience.
sl@0
   124
//! @SYMCR 			1399
sl@0
   125
//! @SYMTestPriority 		Critical
sl@0
   126
//! @SYMTestActions 		1)	Construct certificate chain.
sl@0
   127
//! 				2)	Set the supported OID list to the default OIDs and a new invalid format OID through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   128
//! 				3)	Call CPKIXCertChain::ValidateL(). 
sl@0
   129
//! 				4) 	Cleanup the certificate chain and utility classes. 
sl@0
   130
//! @SYMTestExpectedResults 	Chain should validate successfully with EValidatedOK with expected warnings returned.
sl@0
   131
//! @SYMTestType 		CIT
sl@0
   132
//! @SYMTestPurpose 		Check the code is resilient to badly formed OID data being passed in to the supported OID list.
sl@0
   133
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0003
sl@0
   134
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini BadOidValue
sl@0
   135
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0003
sl@0
   136
sl@0
   137
sl@0
   138
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0004
sl@0
   139
//! @SYMTestCaseDesc 		Check supported OID list processing resilience.
sl@0
   140
//! @SYMCR 			1399
sl@0
   141
//! @SYMTestPriority 		Critical
sl@0
   142
//! @SYMTestActions 		1)	Construct certificate chain. 
sl@0
   143
//! 				2)	Set the supported OID list to an empty one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().  
sl@0
   144
//! 				3) Call CPKIXCertChain::ValidateL(). 
sl@0
   145
//! 				4)	Cleanup the certificate chain and utility classes. 
sl@0
   146
//! @SYMTestExpectedResults 	Chain should error with EUnrecognizedCriticalExtension (it is necessary for the CA to contain a critical extension).
sl@0
   147
//! @SYMTestType 		CIT
sl@0
   148
//! @SYMTestPurpose 		Check the code is resilient to an empty supported OID list.
sl@0
   149
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0004
sl@0
   150
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini EmptySupportedOidList
sl@0
   151
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0004
sl@0
   152
sl@0
   153
sl@0
   154
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0005
sl@0
   155
//! @SYMTestCaseDesc 		Test the Append API for manipulating supported OID list for correct behaviour.
sl@0
   156
//! @SYMCR 			1399
sl@0
   157
//! @SYMTestPriority 		Critical
sl@0
   158
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   159
//! 				2)	Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
sl@0
   160
//! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   161
//! 				4)	Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL().   
sl@0
   162
//! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   163
//! 				6)	Append a collection of OIDs with duplicates within the collection.  
sl@0
   164
//! 				7) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   165
//! 				8)	Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
sl@0
   166
//! 				9) 	Cleanup the certificate chain and utility classes.  
sl@0
   167
//! @SYMTestExpectedResults 	Supported OID list should be updated correctly in each case.
sl@0
   168
//! @SYMTestType 		CIT
sl@0
   169
//! @SYMTestPurpose 		Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported.
sl@0
   170
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0005
sl@0
   171
RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids
sl@0
   172
RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids
sl@0
   173
RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates
sl@0
   174
RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
sl@0
   175
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0005
sl@0
   176
sl@0
   177
sl@0
   178
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005
sl@0
   179
//! @SYMTestCaseDesc 		Test the Append API for manipulating supported OID list for correct behaviour.
sl@0
   180
//! @SYMCR 			1399
sl@0
   181
//! @SYMTestPriority 		Critical
sl@0
   182
//! @SYMTestActions 		OOM loop around steps 1 to 9:
sl@0
   183
//!				1)	Construct the certificate chain.  
sl@0
   184
//! 				2)	Append a collection of new OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
sl@0
   185
//! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   186
//! 				4)	Append a collection of OIDs already in the supported list through CPKIXCertChain::AddSupportedCriticalExtensionsL().   
sl@0
   187
//! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   188
//! 				6)	Append a collection of OIDs with duplicates within the collection.  
sl@0
   189
//! 				7) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   190
//! 				8)	Append an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
sl@0
   191
//! 				9) 	Cleanup the certificate chain and utility classes.  
sl@0
   192
//! @SYMTestExpectedResults 	There should be no memory leaks at any stage.
sl@0
   193
//! @SYMTestType 		CIT
sl@0
   194
//! @SYMTestPurpose		 Ensure OIDs are added to the supported list, that the result contains no duplicates and no errors are reported.
sl@0
   195
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005
sl@0
   196
RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids
sl@0
   197
RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids
sl@0
   198
RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates
sl@0
   199
RUN_TEST_STEP 100 tpkixcert_tefserver AddSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
sl@0
   200
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0005
sl@0
   201
sl@0
   202
sl@0
   203
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0006
sl@0
   204
//! @SYMTestCaseDesc 		Test the Remove API for manipulating supported OID list for correct behaviour.
sl@0
   205
//! @SYMCR 1399
sl@0
   206
//! @SYMTestPriority 		Critical
sl@0
   207
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   208
//! 				2)	Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().  
sl@0
   209
//! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   210
//! 				4)	Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().   
sl@0
   211
//! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   212
//! 				6)	Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
sl@0
   213
//! 				7) 	Cleanup the certificate chain and utility classes.  
sl@0
   214
//! @SYMTestExpectedResults 	Supported OID list should be updated correctly in each case.
sl@0
   215
//! @SYMTestType 		CIT
sl@0
   216
//! @SYMTestPurpose 		Ensure OIDs are removed from the supported list and no errors are reported.
sl@0
   217
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0006
sl@0
   218
RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NewOids
sl@0
   219
RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini AlreadySupportedOids
sl@0
   220
RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini SupportedOidsWithDuplicates
sl@0
   221
RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
sl@0
   222
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0006
sl@0
   223
sl@0
   224
sl@0
   225
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006
sl@0
   226
//! @SYMTestCaseDesc 		Test the Remove API for manipulating supported OID list for correct behaviour.
sl@0
   227
//! @SYMCR 			1399
sl@0
   228
//! @SYMTestPriority 		Critical
sl@0
   229
//! @SYMTestActions 		OOM loop around steps 1 to 7:
sl@0
   230
//!				1)	Construct the certificate chain.  
sl@0
   231
//! 				2)	Remove a collection of OIDs currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().  
sl@0
   232
//! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   233
//! 				4)	Remove a collection of OIDs not currently supported in the list through CPKIXCertChain::RemoveSupportedCriticalExtensions().   
sl@0
   234
//! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   235
//! 				6)	Remove an empty collection of OIDs through CPKIXCertChain::AddSupportedCriticalExtensionsL().  
sl@0
   236
//! 				7) 	Cleanup the certificate chain and utility classes.  
sl@0
   237
//! @SYMTestExpectedResults 	There should be no memory leaks at any stage.
sl@0
   238
//! @SYMTestType 		CIT
sl@0
   239
//! @SYMTestPurpose 		Ensure OIDs are removed from the supported list and no errors are reported.
sl@0
   240
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006
sl@0
   241
RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNewOids
sl@0
   242
RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomAlreadySupportedOids
sl@0
   243
RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomSupportedOidsWithDuplicates
sl@0
   244
RUN_TEST_STEP 100 tpkixcert_tefserver RemoveSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
sl@0
   245
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0006
sl@0
   246
sl@0
   247
sl@0
   248
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0007
sl@0
   249
//! @SYMTestCaseDesc 		Test the Reset API for manipulating supported OID list for correct behaviour.
sl@0
   250
//! @SYMCR 			1399
sl@0
   251
//! @SYMTestPriority 		Critical
sl@0
   252
//! @SYMTestActions 		1)	Construct the certificate chain.   
sl@0
   253
//! 				2) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list.     
sl@0
   254
//! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed)
sl@0
   255
//!					supported OID list.  
sl@0
   256
//! 				4) 	Cleanup the certificate chain and utility classes.  
sl@0
   257
//! @SYMTestExpectedResults 	Supported OID list should be updated correctly in each case.
sl@0
   258
//! @SYMTestType 		CIT
sl@0
   259
//! @SYMTestPurpose 		Ensure the supported OID list is reset to the default values correctly.
sl@0
   260
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0007
sl@0
   261
RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
sl@0
   262
RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved
sl@0
   263
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0007
sl@0
   264
sl@0
   265
sl@0
   266
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007
sl@0
   267
//! @SYMTestCaseDesc 		Test the Reset API for manipulating supported OID list for correct behaviour.
sl@0
   268
//! @SYMCR 			1399
sl@0
   269
//! @SYMTestPriority 		Critical
sl@0
   270
//! @SYMTestActions 		OOM loop around steps 1 to 4:
sl@0
   271
//!				1)	Construct the certificate chain.   
sl@0
   272
//! 				2) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() with an empty supported OID list.     
sl@0
   273
//! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL() on a non empty, no default (one new OID added and one default OID removed)
sl@0
   274
//!					supported OID list.  
sl@0
   275
//! 				4) 	Cleanup the certificate chain and utility classes.  
sl@0
   276
//! @SYMTestExpectedResults 	There should be no memory leaks at any stage.
sl@0
   277
//! @SYMTestType 		CIT
sl@0
   278
//! @SYMTestPurpose 		Ensure the supported OID list is reset to the default values correctly.
sl@0
   279
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007
sl@0
   280
RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
sl@0
   281
RUN_TEST_STEP 100 tpkixcert_tefserver ResetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved
sl@0
   282
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0007
sl@0
   283
sl@0
   284
sl@0
   285
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0008
sl@0
   286
//! @SYMTestCaseDesc 		Test the Set API for manipulating supported OID list for correct behaviour.
sl@0
   287
//! @SYMCR 			1399
sl@0
   288
//! @SYMTestPriority 		Critical
sl@0
   289
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   290
//! 				2)	Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
sl@0
   291
//! 				3)	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   292
//! 				4)	Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().   
sl@0
   293
//! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   294
//! 				6)	Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
sl@0
   295
//! 				7) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   296
//! 				8)	Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
sl@0
   297
//! 				9) 	Cleanup the certificate chain and utility classes.  
sl@0
   298
//! @SYMTestExpectedResults 	Supported OID list should be updated correctly in each case.
sl@0
   299
//! @SYMTestType 		CIT
sl@0
   300
//! @SYMTestPurpose 		Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported.
sl@0
   301
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0008
sl@0
   302
RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini NoOids
sl@0
   303
RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OneAddedOneRemoved
sl@0
   304
RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini CurrentlySupported
sl@0
   305
RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OidsWithDuplicates
sl@0
   306
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0008
sl@0
   307
sl@0
   308
sl@0
   309
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008
sl@0
   310
//! @SYMTestCaseDesc 		Test the Set API for manipulating supported OID list for correct behaviour.
sl@0
   311
//! @SYMCR 			1399
sl@0
   312
//! @SYMTestPriority 		Critical
sl@0
   313
//! @SYMTestActions 		OOM loop around steps 1 to 9:
sl@0
   314
//!				1)	Construct the certificate chain.  
sl@0
   315
//! 				2)	Set an empty collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
sl@0
   316
//! 				3) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   317
//! 				4)	Set a collection of non empty (one new OID and one default OID removed) collection of OIDs through CPKIXCertChain::SetSupportedCriticalExtensionsL().   
sl@0
   318
//! 				5) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   319
//! 				6)	Set the same collection of OIDs as is currently supported through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
sl@0
   320
//! 				7) 	Call CPKIXCertChain::ResetSupportedCriticalExtsToDefaultL().  
sl@0
   321
//! 				8)	Set a collection of OIDs containing internal duplicates through CPKIXCertChain::SetSupportedCriticalExtensionsL().  
sl@0
   322
//! 				9) 	Cleanup the certificate chain and utility classes.  
sl@0
   323
//! @SYMTestExpectedResults 	There should be no memory leaks at any stage.
sl@0
   324
//! @SYMTestType 		CIT
sl@0
   325
//! @SYMTestPurpose 		Ensure supported OID list is updated correctly, the result contains no duplicates and no errors are reported.
sl@0
   326
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008
sl@0
   327
RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomNoOids
sl@0
   328
RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOneAddedOneRemoved
sl@0
   329
RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomCurrentlySupported
sl@0
   330
RUN_TEST_STEP 100 tpkixcert_tefserver SetSupportedOidsTest c:\tpkixcert_tef\scripts\apitests.ini OomOidsWithDuplicates
sl@0
   331
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT_OOM-0008
sl@0
   332
sl@0
   333
sl@0
   334
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0009
sl@0
   335
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   336
//! @SYMCR 			1399
sl@0
   337
//! @SYMTestPriority 		Critical
sl@0
   338
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   339
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   340
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KExtendedKeyUsage is not set.
sl@0
   341
//! 				4)	Ensure the correct error value is returned  
sl@0
   342
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   343
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   344
//! @SYMTestType 		CIT
sl@0
   345
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   346
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0009
sl@0
   347
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_ExtendedKeyUsage
sl@0
   348
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0009
sl@0
   349
sl@0
   350
sl@0
   351
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0010
sl@0
   352
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   353
//! @SYMCR 			1399
sl@0
   354
//! @SYMTestPriority 		Critical
sl@0
   355
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   356
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   357
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyMapping is not set.
sl@0
   358
//! 				4)	Ensure the correct error value is returned  
sl@0
   359
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   360
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   361
//! @SYMTestType 		CIT
sl@0
   362
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   363
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0010
sl@0
   364
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyMapping
sl@0
   365
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0010
sl@0
   366
sl@0
   367
sl@0
   368
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0011
sl@0
   369
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   370
//! @SYMCR 			1399
sl@0
   371
//! @SYMTestPriority 		Critical
sl@0
   372
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   373
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   374
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KDeviceListConstraint is not set.
sl@0
   375
//! 				4)	Ensure the correct error value is returned  
sl@0
   376
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   377
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   378
//! @SYMTestType 		CIT
sl@0
   379
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   380
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0011
sl@0
   381
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_DeviceIdListConstraint
sl@0
   382
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0011
sl@0
   383
sl@0
   384
sl@0
   385
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0012
sl@0
   386
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   387
//! @SYMCR 			1399
sl@0
   388
//! @SYMTestPriority 		Critical
sl@0
   389
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   390
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   391
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KSidListConstraint is not set.
sl@0
   392
//! 				4)	Ensure the correct error value is returned  
sl@0
   393
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   394
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   395
//! @SYMTestType 		CIT
sl@0
   396
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   397
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0012
sl@0
   398
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SidListConstraint
sl@0
   399
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0012
sl@0
   400
sl@0
   401
sl@0
   402
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0013
sl@0
   403
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   404
//! @SYMCR 			1399
sl@0
   405
//! @SYMTestPriority 		Critical
sl@0
   406
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   407
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   408
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KVidListConstraint is not set.
sl@0
   409
//! 				4)	Ensure the correct error value is returned  
sl@0
   410
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   411
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   412
//! @SYMTestType 		CIT
sl@0
   413
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   414
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0013
sl@0
   415
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_VidListConstraint
sl@0
   416
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0013
sl@0
   417
sl@0
   418
sl@0
   419
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0014
sl@0
   420
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   421
//! @SYMCR 			1399
sl@0
   422
//! @SYMTestPriority 		Critical
sl@0
   423
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   424
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   425
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KCapabilitiesConstraint is not set.
sl@0
   426
//! 				4)	Ensure the correct error value is returned  
sl@0
   427
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   428
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   429
//! @SYMTestType 		CIT
sl@0
   430
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   431
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0014
sl@0
   432
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CapabilitiesConstraint
sl@0
   433
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0014
sl@0
   434
sl@0
   435
sl@0
   436
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0015
sl@0
   437
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   438
//! @SYMCR 1399
sl@0
   439
//! @SYMTestPriority 		Critical
sl@0
   440
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   441
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   442
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KCertPolicies is not set.
sl@0
   443
//! 				4)	Ensure the correct error value is returned  
sl@0
   444
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   445
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   446
//! @SYMTestType 		CIT
sl@0
   447
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   448
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0015
sl@0
   449
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_CertPolicies
sl@0
   450
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0015
sl@0
   451
sl@0
   452
sl@0
   453
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0016
sl@0
   454
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   455
//! @SYMCR 			1399
sl@0
   456
//! @SYMTestPriority 		Critical
sl@0
   457
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   458
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   459
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KPolicyConstraints is not set.
sl@0
   460
//! 				4)	Ensure the correct error value is returned  
sl@0
   461
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   462
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   463
//! @SYMTestType 		CIT
sl@0
   464
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   465
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0016
sl@0
   466
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_PolicyConstraint
sl@0
   467
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0016
sl@0
   468
sl@0
   469
sl@0
   470
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0017
sl@0
   471
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   472
//! @SYMCR 			1399
sl@0
   473
//! @SYMTestPriority 		Critical
sl@0
   474
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   475
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   476
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KNameConstraints is not set.
sl@0
   477
//! 				4)	Ensure the correct error value is returned  
sl@0
   478
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   479
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   480
//! @SYMTestType 		CIT
sl@0
   481
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   482
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0017
sl@0
   483
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_NameConstraint
sl@0
   484
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0017
sl@0
   485
sl@0
   486
sl@0
   487
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0018
sl@0
   488
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   489
//! @SYMCR 			1399
sl@0
   490
//! @SYMTestPriority 		Critical
sl@0
   491
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   492
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   493
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KBasicConstraints is not set.
sl@0
   494
//! 				4)	Ensure the correct error value is returned  
sl@0
   495
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   496
//! @SYMTestExpectedResults	The validation should return with EUnrecognisedCriticalExtension
sl@0
   497
//! @SYMTestType 		CIT
sl@0
   498
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   499
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0018
sl@0
   500
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_BasicConstraint
sl@0
   501
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0018
sl@0
   502
sl@0
   503
sl@0
   504
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0019
sl@0
   505
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   506
//! @SYMCR 			1399
sl@0
   507
//! @SYMTestPriority 		Critical
sl@0
   508
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   509
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   510
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KKeyUsage is not set.
sl@0
   511
//! 				4)	Ensure the correct error value is returned  
sl@0
   512
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   513
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   514
//! @SYMTestType 		CIT
sl@0
   515
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   516
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0019
sl@0
   517
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_KeyUsage
sl@0
   518
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0019
sl@0
   519
sl@0
   520
sl@0
   521
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0020
sl@0
   522
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   523
//! @SYMCR 			1399
sl@0
   524
//! @SYMTestPriority 		Critical
sl@0
   525
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   526
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   527
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KSubjectAltName is not set.
sl@0
   528
//! 				4)	Ensure the correct error value is returned  
sl@0
   529
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   530
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   531
//! @SYMTestType 		CIT
sl@0
   532
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   533
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0020
sl@0
   534
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_SubjectAltName
sl@0
   535
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0020
sl@0
   536
sl@0
   537
sl@0
   538
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0021
sl@0
   539
//! @SYMTestCaseDesc 		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   540
//! @SYMCR 			1399
sl@0
   541
//! @SYMTestPriority 		Critical
sl@0
   542
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   543
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   544
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KInhibitAnyPolicy is not set.
sl@0
   545
//! 				4)	Ensure the correct error value is returned  
sl@0
   546
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   547
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   548
//! @SYMTestType 		CIT
sl@0
   549
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   550
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0021
sl@0
   551
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_InhibitAnyPolicy
sl@0
   552
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0021
sl@0
   553
sl@0
   554
sl@0
   555
//! @SYMTestCaseID 		SEC-CERTMAN-PKIXCERT-CRITEXT-0022
sl@0
   556
//! @SYMTestCaseDesc		Test CPKIXCertChain::ValidateL() code fails correctly.
sl@0
   557
//! @SYMCR 			1399
sl@0
   558
//! @SYMTestPriority 		Critical
sl@0
   559
//! @SYMTestActions 		1)	Construct the certificate chain.  
sl@0
   560
//! 				2)	Set the supported OID list to the default OIDs and the new one through a call to CPKIXCertChain::SetSupportedCriticalExtensionsL().
sl@0
   561
//! 				3) 	Call CPKIXCertChain::ValidateL(). The default OID value for KTestOid is not set.
sl@0
   562
//! 				4)	Ensure the correct error value is returned  
sl@0
   563
//! 				5)	Cleanup the certificate chain and utility classes. 
sl@0
   564
//! @SYMTestExpectedResults 	The validation should return with EUnrecognisedCriticalExtension
sl@0
   565
//! @SYMTestType 		CIT
sl@0
   566
//! @SYMTestPurpose 		Ensure we fail correctly for critical extension OIDs encountered that are outside the specified list that we recognise.
sl@0
   567
START_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0022
sl@0
   568
RUN_TEST_STEP 100 tpkixcert_tefserver ValidateCertChain c:\tpkixcert_tef\scripts\validatetests.ini Missing_TestOid
sl@0
   569
END_TESTCASE 			SEC-CERTMAN-PKIXCERT-CRITEXT-0022