os/security/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script
1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/security/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,514 @@
1.4 +//
1.5 +// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
1.6 +// All rights reserved.
1.7 +// This component and the accompanying materials are made available
1.8 +// under the terms of the License "Eclipse Public License v1.0"
1.9 +// which accompanies this distribution, and is available
1.10 +// at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.11 +//
1.12 +// Initial Contributors:
1.13 +// Nokia Corporation - initial contribution.
1.14 +//
1.15 +// Contributors:
1.16 +//
1.17 +// Description:
1.18 +//
1.19 +
1.20 +PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite
1.21 +
1.22 +LOAD_SUITE tpkcs10serverv2
1.23 +
1.24 +// pre- test: move out of the way key store file.
1.25 +RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat
1.26 +START_TESTCASE SEC-PKCS10-RSA-0001
1.27 +//! @SYMTestCaseID SEC-PKCS10-RSA-0001
1.28 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.29 +//! certificate requests using the parameters listed below.
1.30 +//! Key Algorithm: RSA
1.31 +//! Key size: 512 bits
1.32 +//! Digest Algorithm: SHA1
1.33 +//! Number of attributes: 0
1.34 +//! @SYMPREQ CR0973
1.35 +//! @SYMREQ REQ1581.5
1.36 +//! @SYMTestPriority Critical
1.37 +//! @SYMTestActions PKCS10 certificate request construction.
1.38 +//! @SYMTestExpectedResults Encoding successfully validated
1.39 +//! @SYMTestType CIT
1.40 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.41 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001
1.42 +END_TESTCASE SEC-PKCS10-RSA-0001
1.43 +
1.44 +START_TESTCASE SEC-PKCS10-RSA-0002
1.45 +//! @SYMTestCaseID SEC-PKCS10-RSA-0002
1.46 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.47 +//! certificate requests using the parameters listed below.
1.48 +//! Key Algorithm: RSA
1.49 +//! Key size: 512 bits
1.50 +//! Digest Algorithm: MD2
1.51 +//! Number of attributes: 0
1.52 +//! @SYMPREQ CR0973
1.53 +//! @SYMREQ REQ1581.5
1.54 +//! @SYMTestPriority Critical
1.55 +//! @SYMTestActions PKCS10 certificate request construction.
1.56 +//! @SYMTestExpectedResults Encoding successfully validated
1.57 +//! @SYMTestType CIT
1.58 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.59 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002
1.60 +END_TESTCASE SEC-PKCS10-RSA-0002
1.61 +
1.62 +START_TESTCASE SEC-PKCS10-RSA-0003
1.63 +
1.64 +//! @SYMTestCaseID SEC-PKCS10-RSA-0003
1.65 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.66 +//! certificate requests using the parameters listed below.
1.67 +//! Key Algorithm: RSA
1.68 +//! Key size: 512 bits
1.69 +//! Digest Algorithm: MD5
1.70 +//! Number of attributes: 0
1.71 +//! @SYMPREQ CR0973
1.72 +//! @SYMREQ REQ1581.5
1.73 +//! @SYMTestPriority Critical
1.74 +//! @SYMTestActions PKCS10 certificate request construction.
1.75 +//! @SYMTestExpectedResults Encoding successfully validated
1.76 +//! @SYMTestType CIT
1.77 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.78 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003
1.79 +END_TESTCASE SEC-PKCS10-RSA-0003
1.80 +
1.81 +START_TESTCASE SEC-PKCS10-RSA-0004
1.82 +//! @SYMTestCaseID SEC-PKCS10-RSA-0004
1.83 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.84 +//! certificate requests using the parameters listed below.
1.85 +//! Key Algorithm: RSA
1.86 +//! Key size: 512 bits
1.87 +//! Digest Algorithm: SHA1
1.88 +//! Number of attributes: 1 (challenge password)
1.89 +//! @SYMPREQ CR0973
1.90 +//! @SYMREQ REQ1581.5
1.91 +//! @SYMTestPriority Critical
1.92 +//! @SYMTestActions PKCS10 certificate request construction.
1.93 +//! @SYMTestExpectedResults Encoding successfully validated
1.94 +//! @SYMTestType CIT
1.95 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.96 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004
1.97 +END_TESTCASE SEC-PKCS10-RSA-0004
1.98 +
1.99 +START_TESTCASE SEC-PKCS10-RSA-0005
1.100 +//! @SYMTestCaseID SEC-PKCS10-RSA-0005
1.101 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.102 +//! certificate requests using the parameters listed below.
1.103 +//! Key Algorithm: RSA
1.104 +//! Key size: 512 bits
1.105 +//! Digest Algorithm: SHA1
1.106 +//! Number of attributes: 2 (challenge password and structured name)
1.107 +//! @SYMPREQ CR0973
1.108 +//! @SYMREQ REQ1581.5
1.109 +//! @SYMTestPriority Critical
1.110 +//! @SYMTestActions PKCS10 certificate request construction.
1.111 +//! @SYMTestExpectedResults Encoding successfully validated
1.112 +//! @SYMTestType CIT
1.113 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.114 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005
1.115 +END_TESTCASE SEC-PKCS10-RSA-0005
1.116 +
1.117 +START_TESTCASE SEC-PKCS10-RSA-0006
1.118 +//! @SYMTestCaseID SEC-PKCS10-RSA-0006
1.119 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.120 +//! certificate requests using the parameters listed below.
1.121 +//! Key Algorithm: RSA
1.122 +//! Key size: 2048 bits
1.123 +//! Digest Algorithm: SHA1
1.124 +//! Number of attributes: 2 (challenge password and structured name)
1.125 +//! @SYMPREQ CR0973
1.126 +//! @SYMREQ REQ1581.5
1.127 +//! @SYMTestPriority Critical
1.128 +//! @SYMTestActions PKCS10 certificate request construction.
1.129 +//! @SYMTestExpectedResults Encoding successfully validated
1.130 +//! @SYMTestType CIT
1.131 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.132 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006
1.133 +END_TESTCASE SEC-PKCS10-RSA-0006
1.134 +
1.135 +START_TESTCASE SEC-PKCS10-DSA-0001
1.136 +//! @SYMTestCaseID SEC-PKCS10-DSA-0001
1.137 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.138 +//! certificate requests using the parameters listed below.
1.139 +//! Key Algorithm: DSA
1.140 +//! Key size: 512 bits
1.141 +//! Digest Algorithm: SHA1
1.142 +//! Number of attributes: 0
1.143 +//! @SYMPREQ CR0973
1.144 +//! @SYMREQ REQ1581.5
1.145 +//! @SYMTestPriority Critical
1.146 +//! @SYMTestActions PKCS10 certificate request construction.
1.147 +//! @SYMTestExpectedResults Encoding successfully validated
1.148 +//! @SYMTestType CIT
1.149 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.150 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001
1.151 +END_TESTCASE SEC-PKCS10-DSA-0001
1.152 +
1.153 +START_TESTCASE SEC-PKCS10-DSA-0002
1.154 +//! @SYMTestCaseID SEC-PKCS10-DSA-0002
1.155 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.156 +//! certificate requests using the parameters listed below.
1.157 +//! Key Algorithm: DSA
1.158 +//! Key size: 512 bits
1.159 +//! Digest Algorithm: SHA1
1.160 +//! Number of attributes: 1 (challenge password)
1.161 +//! @SYMPREQ CR0973
1.162 +//! @SYMREQ REQ1581.5
1.163 +//! @SYMTestPriority Critical
1.164 +//! @SYMTestActions PKCS10 certificate request construction.
1.165 +//! @SYMTestExpectedResults Encoding successfully validated
1.166 +//! @SYMTestType CIT
1.167 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.168 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002
1.169 +END_TESTCASE SEC-PKCS10-DSA-0002
1.170 +
1.171 +START_TESTCASE SEC-PKCS10-DSA-0003
1.172 +//! @SYMTestCaseID SEC-PKCS10-DSA-0003
1.173 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.174 +//! certificate requests using the parameters listed below.
1.175 +//! Key Algorithm: DSA
1.176 +//! Key size: 512 bits
1.177 +//! Digest Algorithm: SHA1
1.178 +//! Number of attributes: 2 (challenge password and structured name)
1.179 +//! @SYMPREQ CR0973
1.180 +//! @SYMREQ REQ1581.5
1.181 +//! @SYMTestPriority Critical
1.182 +//! @SYMTestActions PKCS10 certificate request construction.
1.183 +//! @SYMTestExpectedResults Encoding successfully validated
1.184 +//! @SYMTestType CIT
1.185 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.186 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003
1.187 +END_TESTCASE SEC-PKCS10-DSA-0003
1.188 +
1.189 +START_TESTCASE SEC-PKCS10-DSA-0004
1.190 +//! @SYMTestCaseID SEC-PKCS10-DSA-0004
1.191 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.192 +//! certificate requests using the parameters listed below.
1.193 +//! Key Algorithm: DSA
1.194 +//! Key size: 2048 bits
1.195 +//! Digest Algorithm: SHA1
1.196 +//! Number of attributes: 2 (challenge password and structured name)
1.197 +//! @SYMPREQ CR0973
1.198 +//! @SYMREQ REQ1581.5
1.199 +//! @SYMTestPriority Critical
1.200 +//! @SYMTestActions PKCS10 certificate request construction.
1.201 +//! @SYMTestExpectedResults Encoding successfully validated
1.202 +//! @SYMTestType CIT
1.203 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.204 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004
1.205 +END_TESTCASE SEC-PKCS10-DSA-0004
1.206 +
1.207 +START_TESTCASE SEC-PKCS10-EXT-0001
1.208 +//! @SYMTestCaseID SEC-PKCS10-EXT-0001
1.209 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.210 +//! certificate requests including extension requestsusing the parameters listed below.
1.211 +//! Key Algorithm: RSA
1.212 +//! Key size: 2048 bits
1.213 +//! Digest Algorithm: SHA1
1.214 +//! Number of attributes: 2 (challenge password and structured name)
1.215 +//! Extensions used: basic Constraints,
1.216 +//! subject Alt Name,
1.217 +//! issuer Alt Name,
1.218 +//! key Usage,
1.219 +//! extended Key Usage,
1.220 +//! authority Info Access
1.221 +//! @SYMPREQ CR0973
1.222 +//! @SYMREQ REQ1581.5
1.223 +//! @SYMTestPriority Critical
1.224 +//! @SYMTestActions PKCS10 certificate request construction.
1.225 +//! @SYMTestExpectedResults Encoding successfully validated
1.226 +//! @SYMTestType CIT
1.227 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.228 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001
1.229 +END_TESTCASE SEC-PKCS10-EXT-0001
1.230 +
1.231 +START_TESTCASE SEC-PKCS10-EXT-0002
1.232 +//! @SYMTestCaseID SEC-PKCS10-EXT-0002
1.233 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.234 +//! certificate requests including extension requestsusing the parameters listed below.
1.235 +//! Key Algorithm: RSA
1.236 +//! Key size: 2048 bits
1.237 +//! Digest Algorithm: MD2
1.238 +//! Number of attributes: 2 (challenge password and structured name)
1.239 +//! Extensions used: basic Constraints,
1.240 +//! subject Alt Name,
1.241 +//! issuer Alt Name,
1.242 +//! key Usage,
1.243 +//! extended Key Usage,
1.244 +//! authority Info Access
1.245 +//!
1.246 +//! @SYMPREQ CR0973
1.247 +//! @SYMREQ REQ1581.5
1.248 +//! @SYMTestPriority Critical
1.249 +//! @SYMTestActions PKCS10 certificate request construction.
1.250 +//! @SYMTestExpectedResults Encoding successfully validated
1.251 +//! @SYMTestType CIT
1.252 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.253 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002
1.254 +END_TESTCASE SEC-PKCS10-EXT-0002
1.255 +
1.256 +START_TESTCASE SEC-PKCS10-EXT-0003
1.257 +//! @SYMTestCaseID SEC-PKCS10-EXT-0003
1.258 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.259 +//! certificate requests including extension requestsusing the parameters listed below.
1.260 +//! Key Algorithm: RSA
1.261 +//! Key size: 2048 bits
1.262 +//! Digest Algorithm: MD5
1.263 +//! Number of attributes: 2 (challenge password and structured name)
1.264 +//! Extensions used: basic Constraints,
1.265 +//! subject Alt Name,
1.266 +//! issuer Alt Name,
1.267 +//! key Usage,
1.268 +//! extended Key Usage,
1.269 +//! authority Info Access
1.270 +//!
1.271 +//! @SYMPREQ CR0973
1.272 +//! @SYMREQ REQ1581.5
1.273 +//! @SYMTestPriority Critical
1.274 +//! @SYMTestActions PKCS10 certificate request construction.
1.275 +//! @SYMTestExpectedResults Encoding successfully validated
1.276 +//! @SYMTestType CIT
1.277 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.278 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003
1.279 +END_TESTCASE SEC-PKCS10-EXT-0003
1.280 +
1.281 +START_TESTCASE SEC-PKCS10-EXT-0004
1.282 +//! @SYMTestCaseID SEC-PKCS10-EXT-0004
1.283 +//! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
1.284 +//! certificate requests including extension requestsusing the parameters listed below.
1.285 +//! Key Algorithm: DSA
1.286 +//! Key size: 2048 bits
1.287 +//! Digest Algorithm: SHA1
1.288 +//! Number of attributes: 2 (challenge password and structured name)
1.289 +//! Extensions used: basic Constraints,
1.290 +//! subject Alt Name,
1.291 +//! issuer Alt Name,
1.292 +//! key Usage,
1.293 +//! extended Key Usage,
1.294 +//! authority Info Access
1.295 +//!
1.296 +//! @SYMPREQ CR0973
1.297 +//! @SYMREQ REQ1581.5
1.298 +//! @SYMTestPriority Critical
1.299 +//! @SYMTestActions PKCS10 certificate request construction.
1.300 +//! @SYMTestExpectedResults Encoding successfully validated
1.301 +//! @SYMTestType CIT
1.302 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.303 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004
1.304 +END_TESTCASE SEC-PKCS10-EXT-0004
1.305 +
1.306 +START_TESTCASE SEC-PKCS10-OOM-0001
1.307 +//! @SYMTestCaseID SEC-PKCS10-OOM-0001
1.308 +//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
1.309 +//! Use the following parameters:
1.310 +//! Key Algorithm: RSA
1.311 +//! Key size: 512 bits
1.312 +//! Digest Algorithm: SHA1
1.313 +//! Number of attributes: 2
1.314 +//!
1.315 +//! @SYMPREQ CR0973
1.316 +//! @SYMREQ REQ1581.5
1.317 +//! @SYMTestPriority Critical
1.318 +//! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
1.319 +//! @SYMTestExpectedResults Encoding successfully validated
1.320 +//! @SYMTestType CIT
1.321 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.322 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001
1.323 +END_TESTCASE SEC-PKCS10-OOM-0001
1.324 +
1.325 +START_TESTCASE SEC-PKCS10-OOM-0002
1.326 +//! @SYMTestCaseID SEC-PKCS10-OOM-0002
1.327 +//! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
1.328 +//! Use the following parameters:
1.329 +//! Key Algorithm: DSA
1.330 +//! Key size: 512 bits
1.331 +//! Digest Algorithm: SHA1
1.332 +//! Number of attributes: 2
1.333 +//! @SYMPREQ CR0973
1.334 +//! @SYMREQ REQ1581.5
1.335 +//! @SYMTestPriority Critical
1.336 +//! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
1.337 +//! @SYMTestExpectedResults Encoding successfully validated
1.338 +//! @SYMTestType CIT
1.339 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.340 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002
1.341 +END_TESTCASE SEC-PKCS10-OOM-0002
1.342 +
1.343 +START_TESTCASE SEC-PKCS10-REU-0001
1.344 +//! @SYMTestCaseID SEC-PKCS10-REU-0001
1.345 +//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
1.346 +//! @SYMPREQ CR0973
1.347 +//! @SYMREQ REQ1581.5
1.348 +//! @SYMTestPriority Critical
1.349 +//! @SYMTestActions Create CPKCS10Attribute test object using using valid values.
1.350 +//! Use GetEncodingLC to retrieve ASN1 value from this instance.
1.351 +//! Use Reset method of CPKCS10Attribute test object with appropriate parameters.
1.352 +//! Use GetEncodingLC method again to check that new ASN1 value had been
1.353 +//! updated correctly.
1.354 +//!
1.355 +//! @SYMTestExpectedResults Encoding matches in both cases.
1.356 +//! @SYMTestType CIT
1.357 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.358 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001
1.359 +END_TESTCASE SEC-PKCS10-REU-0001
1.360 +
1.361 +START_TESTCASE SEC-PKCS10-REU-0002
1.362 +//! @SYMTestCaseID SEC-PKCS10-REU-0002
1.363 +//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
1.364 +//! @SYMPREQ CR0973
1.365 +//! @SYMREQ REQ1581.5
1.366 +//! @SYMTestPriority Critical
1.367 +//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values
1.368 +//! GetEncodingLC from test instance
1.369 +//! repopulate data using appropiate methods
1.370 +//! request a new cert request
1.371 +//! @SYMTestExpectedResults New cert request in created correctly
1.372 +//! @SYMTestType CIT
1.373 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.374 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002
1.375 +END_TESTCASE SEC-PKCS10-REU-0002
1.376 +
1.377 +START_TESTCASE SEC-PKCS10-REU-0003
1.378 +//! @SYMTestCaseID SEC-PKCS10-REU-0003
1.379 +//! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
1.380 +//! @SYMPREQ CR0973
1.381 +//! @SYMREQ REQ1581.5
1.382 +//! @SYMTestPriority Critical
1.383 +//! @SYMTestActions Create CPKCS10Attribute instance with appropiate values
1.384 +//! GetEncodingLC from test instance
1.385 +//! Do not repopulate data.
1.386 +//! request a new cert request
1.387 +//! @SYMTestExpectedResults New cert request in created correctly
1.388 +//! @SYMTestType CIT
1.389 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.390 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003
1.391 +END_TESTCASE SEC-PKCS10-REU-0003
1.392 +
1.393 +START_TESTCASE SEC-PKCS10-REU-0004
1.394 +//! @SYMTestCaseID SEC-PKCS10-REU-0004
1.395 +//! @SYMTestCaseDesc To check that a CPKCS9ChallengePasswordAttr can be reused with new values.
1.396 +//! @SYMPREQ CR0973
1.397 +//! @SYMREQ REQ1581.5
1.398 +//! @SYMTestPriority Critical
1.399 +//! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value.
1.400 +//! Use GetEncodingLC to retrieve ASN1 value from this instance.
1.401 +//! Use Reset method of CPKCS9ChallengePasswordAttr test object
1.402 +//! with appropriate parameter.
1.403 +//! Use GetEncodingLC method again to check that new ASN1 value
1.404 +//! had been updated correctly.
1.405 +//! @SYMTestExpectedResults Encoding matches in both cases.
1.406 +//! @SYMTestType CIT
1.407 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.408 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004
1.409 +END_TESTCASE SEC-PKCS10-REU-0004
1.410 +
1.411 +START_TESTCASE SEC-PKCS10-REU-0005
1.412 +//! @SYMTestCaseID SEC-PKCS10-REU-0005
1.413 +//! @SYMTestCaseDesc To check that a CPKCS10GenericAttr can be reused with new values.
1.414 +//! @SYMPREQ CR0973
1.415 +//! @SYMREQ REQ1581.5
1.416 +//! @SYMTestPriority Critical
1.417 +//! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values.
1.418 +//! Use GetEncodingLC to retrieve ASN1 value from this instance.
1.419 +//! Use ResetL method of CPKCS9ExtensionRequestAttr test object
1.420 +//! with appropriate parameters.
1.421 +//! Use GetEncodingLC method again to check that new ASN1 value had
1.422 +//! been updated correctly.
1.423 +//! @SYMTestExpectedResults Encoding matches in both cases.
1.424 +//! @SYMTestType CIT
1.425 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.426 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005
1.427 +END_TESTCASE SEC-PKCS10-REU-0005
1.428 +
1.429 +START_TESTCASE SEC-PKCS10-NEG-0001
1.430 +//! @SYMTestCaseID SEC-PKCS10-NEG-0001
1.431 +//! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a
1.432 +//! KErrBadDescriptor (or KErrArgument) when its methods are used with
1.433 +//! invalid/null value parameters.
1.434 +//! @SYMPREQ CR0973
1.435 +//! @SYMREQ REQ1581.5
1.436 +//! @SYMTestPriority Critical
1.437 +//! @SYMTestActions PKCS10 CPKCS10GenericAttr construction
1.438 +//! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument)
1.439 +//! @SYMTestType CIT
1.440 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.441 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001
1.442 +END_TESTCASE SEC-PKCS10-NEG-0001
1.443 +
1.444 +START_TESTCASE SEC-PKCS10-NEG-0002
1.445 +//! @SYMTestCaseID SEC-PKCS10-NEG-0002
1.446 +//! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a
1.447 +//! KErrArgument when its methods are used with null value parameters.
1.448 +//! @SYMPREQ CR0973
1.449 +//! @SYMREQ REQ1581.5
1.450 +//! @SYMTestPriority Critical
1.451 +//! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction
1.452 +//! @SYMTestExpectedResults Returns KErrArgument
1.453 +//! @SYMTestType CIT
1.454 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.455 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002
1.456 +END_TESTCASE SEC-PKCS10-NEG-0002
1.457 +
1.458 +START_TESTCASE SEC-PKCS10-NEG-0003
1.459 +//! @SYMTestCaseID SEC-PKCS10-NEG-0003
1.460 +//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise
1.461 +//! when application is trying to add malformed or un-initialised cert
1.462 +//! extension object to extension request.
1.463 +//! @SYMPREQ CR0973
1.464 +//! @SYMREQ REQ1581.5
1.465 +//! @SYMTestPriority Critical
1.466 +//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction.
1.467 +//! @SYMTestExpectedResults Returns KErrBadDescriptor
1.468 +//! @SYMTestType CIT
1.469 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.470 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003
1.471 +END_TESTCASE SEC-PKCS10-NEG-0003
1.472 +
1.473 +START_TESTCASE SEC-PKCS10-NEG-0004
1.474 +//! @SYMTestCaseID SEC-PKCS10-NEG-0004
1.475 +//! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a
1.476 +//! KErrArgument when its methods are used with null value parameters.
1.477 +//! @SYMPREQ CR0973
1.478 +//! @SYMREQ REQ1581.5
1.479 +//! @SYMTestPriority Critical
1.480 +//! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction
1.481 +//! @SYMTestExpectedResults Returns KErrArgument
1.482 +//! @SYMTestType CIT
1.483 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.484 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004
1.485 +END_TESTCASE SEC-PKCS10-NEG-0004
1.486 +
1.487 +START_TESTCASE SEC-PKCS10-NEG-0005
1.488 +//! @SYMTestCaseID SEC-PKCS10-NEG-0005
1.489 +//! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when
1.490 +//! its methods are used with invalid value parameters.
1.491 +//! @SYMPREQ CR0973
1.492 +//! @SYMREQ REQ1581.5
1.493 +//! @SYMTestPriority Critical
1.494 +//! @SYMTestActions PKCS10 CPKCS10Request construction.
1.495 +//! @SYMTestExpectedResults Returns KErrArgument
1.496 +//! @SYMTestType CIT
1.497 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.498 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005
1.499 +END_TESTCASE SEC-PKCS10-NEG-0005
1.500 +
1.501 +START_TESTCASE SEC-PKCS10-DEF103311-0001
1.502 +//! @SYMTestCaseID SEC-PKCS10-DEF103311-0001
1.503 +//! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1-
1.504 +//! @SYMREQ REQ0000
1.505 +//! @SYMTestPriority Critical
1.506 +//! @SYMTestActions Creates a CPKCS10Request and then cancels it.
1.507 +//! @SYMTestExpectedResults Returns KErrNone, no memory leak.
1.508 +//! @SYMTestType CIT
1.509 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
1.510 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001
1.511 +END_TESTCASE SEC-PKCS10-DEF103311-0001
1.512 +
1.513 +//Post- test: re-states key store file
1.514 +RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat
1.515 +RUN_UTILS DeleteFile c:\keys.dat
1.516 +
1.517 +PRINT Complete_tpkcs10serverv2_Tests