os/security/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/security/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,514 @@
     1.4 +//
     1.5 +// Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
     1.6 +// All rights reserved.
     1.7 +// This component and the accompanying materials are made available
     1.8 +// under the terms of the License "Eclipse Public License v1.0"
     1.9 +// which accompanies this distribution, and is available
    1.10 +// at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.11 +//
    1.12 +// Initial Contributors:
    1.13 +// Nokia Corporation - initial contribution.
    1.14 +//
    1.15 +// Contributors:
    1.16 +//
    1.17 +// Description: 
    1.18 +//
    1.19 +
    1.20 +PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite 
    1.21 +
    1.22 +LOAD_SUITE tpkcs10serverv2
    1.23 +
    1.24 +// pre- test: move out of the way key store file.
    1.25 +RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat
    1.26 +START_TESTCASE 			SEC-PKCS10-RSA-0001
    1.27 +//! @SYMTestCaseID 		SEC-PKCS10-RSA-0001
    1.28 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
    1.29 +//!		     		certificate requests using the parameters listed below.
    1.30 +//!		  		Key Algorithm: RSA
    1.31 +//!				Key size: 512 bits 
    1.32 +//!		    		Digest Algorithm: SHA1 
    1.33 +//!				Number of attributes: 0	
    1.34 +//! @SYMPREQ 			CR0973
    1.35 +//! @SYMREQ 			REQ1581.5
    1.36 +//! @SYMTestPriority 		Critical
    1.37 +//! @SYMTestActions 		PKCS10 certificate request construction.
    1.38 +//! @SYMTestExpectedResults 	Encoding successfully validated
    1.39 +//! @SYMTestType CIT
    1.40 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
    1.41 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001
    1.42 +END_TESTCASE 			SEC-PKCS10-RSA-0001
    1.43 +
    1.44 +START_TESTCASE 			SEC-PKCS10-RSA-0002
    1.45 +//! @SYMTestCaseID 		SEC-PKCS10-RSA-0002
    1.46 +//! @SYMTestCaseDesc		check that CPKCS10Request class generates correct encoding for 
    1.47 +//!		     		certificate requests using the parameters listed below.
    1.48 +//!		  		Key Algorithm: RSA
    1.49 +//!				Key size: 512 bits 
    1.50 +//!		    	  	Digest Algorithm: MD2 
    1.51 +//!				Number of attributes: 0	
    1.52 +//! @SYMPREQ 			CR0973
    1.53 +//! @SYMREQ 			REQ1581.5
    1.54 +//! @SYMTestPriority 		Critical
    1.55 +//! @SYMTestActions 		PKCS10 certificate request construction.
    1.56 +//! @SYMTestExpectedResults 	Encoding successfully validated
    1.57 +//! @SYMTestType 		CIT
    1.58 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
    1.59 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002
    1.60 +END_TESTCASE 			SEC-PKCS10-RSA-0002
    1.61 +
    1.62 +START_TESTCASE 			SEC-PKCS10-RSA-0003
    1.63 +
    1.64 +//! @SYMTestCaseID 		SEC-PKCS10-RSA-0003
    1.65 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
    1.66 +//!		     		certificate requests using the parameters listed below.
    1.67 +//!		  		Key Algorithm: RSA
    1.68 +//!				Key size: 512 bits 
    1.69 +//!		     		   Digest Algorithm: MD5 
    1.70 +//!				Number of attributes: 0
    1.71 +//! @SYMPREQ 			CR0973
    1.72 +//! @SYMREQ 			REQ1581.5
    1.73 +//! @SYMTestPriority 		Critical
    1.74 +//! @SYMTestActions	 	PKCS10 certificate request construction.
    1.75 +//! @SYMTestExpectedResults 	Encoding successfully validated
    1.76 +//! @SYMTestType 		CIT
    1.77 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
    1.78 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003
    1.79 +END_TESTCASE 			SEC-PKCS10-RSA-0003
    1.80 +
    1.81 +START_TESTCASE 			SEC-PKCS10-RSA-0004
    1.82 +//! @SYMTestCaseID 		SEC-PKCS10-RSA-0004
    1.83 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
    1.84 +//!		     		certificate requests using the parameters listed below.
    1.85 +//!		  		Key Algorithm: RSA
    1.86 +//!				Key size: 512 bits 
    1.87 +//!		     		   Digest Algorithm: SHA1
    1.88 +//!				Number of attributes: 1 (challenge password)
    1.89 +//! @SYMPREQ 			CR0973
    1.90 +//! @SYMREQ 			REQ1581.5
    1.91 +//! @SYMTestPriority 		Critical
    1.92 +//! @SYMTestActions 		PKCS10 certificate request construction.
    1.93 +//! @SYMTestExpectedResults 	Encoding successfully validated
    1.94 +//! @SYMTestType 		CIT
    1.95 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
    1.96 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004
    1.97 +END_TESTCASE 			SEC-PKCS10-RSA-0004
    1.98 +
    1.99 +START_TESTCASE 			SEC-PKCS10-RSA-0005
   1.100 +//! @SYMTestCaseID 		SEC-PKCS10-RSA-0005
   1.101 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.102 +//!		     		certificate requests using the parameters listed below.
   1.103 +//!		  		Key Algorithm: RSA
   1.104 +//!				Key size: 512 bits 
   1.105 +//!		        	Digest Algorithm: SHA1 
   1.106 +//!				Number of attributes: 2 (challenge password and structured name)
   1.107 +//! @SYMPREQ 			CR0973
   1.108 +//! @SYMREQ 			REQ1581.5
   1.109 +//! @SYMTestPriority 		Critical
   1.110 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.111 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.112 +//! @SYMTestType 		CIT
   1.113 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.114 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005
   1.115 +END_TESTCASE 			SEC-PKCS10-RSA-0005
   1.116 +
   1.117 +START_TESTCASE 			SEC-PKCS10-RSA-0006
   1.118 +//! @SYMTestCaseID 		SEC-PKCS10-RSA-0006
   1.119 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.120 +//!		     		certificate requests using the parameters listed below.
   1.121 +//!		  		Key Algorithm: RSA
   1.122 +//!				Key size: 2048 bits 
   1.123 +//!		     		   Digest Algorithm: SHA1 
   1.124 +//!				Number of attributes: 2 (challenge password and structured name)
   1.125 +//! @SYMPREQ 			CR0973
   1.126 +//! @SYMREQ 			REQ1581.5
   1.127 +//! @SYMTestPriority 		Critical
   1.128 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.129 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.130 +//! @SYMTestType 		CIT
   1.131 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.132 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006
   1.133 +END_TESTCASE 			SEC-PKCS10-RSA-0006
   1.134 +
   1.135 +START_TESTCASE 			SEC-PKCS10-DSA-0001
   1.136 +//! @SYMTestCaseID 		SEC-PKCS10-DSA-0001
   1.137 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.138 +//!		     		certificate requests using the parameters listed below.
   1.139 +//!		  		Key Algorithm: DSA
   1.140 +//!				Key size: 512 bits 
   1.141 +//!		        	Digest Algorithm: SHA1 
   1.142 +//!				Number of attributes: 0
   1.143 +//! @SYMPREQ 			CR0973
   1.144 +//! @SYMREQ 			REQ1581.5
   1.145 +//! @SYMTestPriority 		Critical
   1.146 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.147 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.148 +//! @SYMTestType 		CIT
   1.149 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.150 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001
   1.151 +END_TESTCASE 			SEC-PKCS10-DSA-0001
   1.152 +
   1.153 +START_TESTCASE 			SEC-PKCS10-DSA-0002
   1.154 +//! @SYMTestCaseID 		SEC-PKCS10-DSA-0002
   1.155 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.156 +//!		    		 certificate requests using the parameters listed below.
   1.157 +//!		  		Key Algorithm: DSA
   1.158 +//!				Key size: 512 bits 
   1.159 +//!		        	Digest Algorithm: SHA1
   1.160 +//!				Number of attributes: 1 (challenge password)
   1.161 +//! @SYMPREQ 			CR0973
   1.162 +//! @SYMREQ 			REQ1581.5
   1.163 +//! @SYMTestPriority 		Critical
   1.164 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.165 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.166 +//! @SYMTestType 		CIT
   1.167 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.168 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002
   1.169 +END_TESTCASE 			SEC-PKCS10-DSA-0002
   1.170 +
   1.171 +START_TESTCASE 			SEC-PKCS10-DSA-0003
   1.172 +//! @SYMTestCaseID 		SEC-PKCS10-DSA-0003
   1.173 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.174 +//!		     		certificate requests using the parameters listed below.
   1.175 +//!		  		Key Algorithm: DSA
   1.176 +//!				Key size: 512 bits 
   1.177 +//!		        	Digest Algorithm: SHA1 
   1.178 +//!				Number of attributes: 2 (challenge password and structured name)
   1.179 +//! @SYMPREQ 			CR0973
   1.180 +//! @SYMREQ 			REQ1581.5
   1.181 +//! @SYMTestPriority 		Critical
   1.182 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.183 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.184 +//! @SYMTestType 		CIT
   1.185 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.186 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003
   1.187 +END_TESTCASE 			SEC-PKCS10-DSA-0003
   1.188 +
   1.189 +START_TESTCASE 			SEC-PKCS10-DSA-0004
   1.190 +//! @SYMTestCaseID 		SEC-PKCS10-DSA-0004
   1.191 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.192 +//!		     		certificate requests using the parameters listed below.
   1.193 +//!		  		Key Algorithm: DSA
   1.194 +//!				Key size: 2048 bits 
   1.195 +//!		     		Digest Algorithm: SHA1 
   1.196 +//!				Number of attributes: 2 (challenge password and structured name)
   1.197 +//! @SYMPREQ 			CR0973
   1.198 +//! @SYMREQ 			REQ1581.5
   1.199 +//! @SYMTestPriority 		Critical
   1.200 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.201 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.202 +//! @SYMTestType 		CIT
   1.203 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.204 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004
   1.205 +END_TESTCASE 			SEC-PKCS10-DSA-0004
   1.206 +
   1.207 +START_TESTCASE 			SEC-PKCS10-EXT-0001
   1.208 +//! @SYMTestCaseID 		SEC-PKCS10-EXT-0001
   1.209 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.210 +//!		     		certificate requests including extension requestsusing the parameters listed below.
   1.211 +//!		  		Key Algorithm: RSA
   1.212 +//!				Key size: 2048 bits 
   1.213 +//!		     		   Digest Algorithm: SHA1 
   1.214 +//!				Number of attributes: 2 (challenge password and structured name)
   1.215 +//!				Extensions used: basic Constraints,
   1.216 +//!				 subject Alt Name,
   1.217 +//!				 issuer Alt Name, 
   1.218 +//!			         key Usage,
   1.219 +//!                              extended Key Usage,
   1.220 +//!				 authority Info Access 
   1.221 +//! @SYMPREQ 			CR0973
   1.222 +//! @SYMREQ 			REQ1581.5
   1.223 +//! @SYMTestPriority 		Critical
   1.224 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.225 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.226 +//! @SYMTestType 		CIT
   1.227 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.228 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001
   1.229 +END_TESTCASE 			SEC-PKCS10-EXT-0001
   1.230 +
   1.231 +START_TESTCASE 			SEC-PKCS10-EXT-0002
   1.232 +//! @SYMTestCaseID 		SEC-PKCS10-EXT-0002
   1.233 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.234 +//!		     		certificate requests including extension requestsusing the parameters listed below.
   1.235 +//!		  		Key Algorithm: RSA
   1.236 +//!				Key size: 2048 bits 
   1.237 +//!		       		 Digest Algorithm: MD2 
   1.238 +//!				Number of attributes: 2 (challenge password and structured name)
   1.239 +//!				Extensions used: basic Constraints,
   1.240 +//!					 subject Alt Name,
   1.241 +//!					 issuer Alt Name, 
   1.242 +//!			                 key Usage,
   1.243 +//!                                      extended Key Usage,
   1.244 +//!					 authority Info Access 
   1.245 +//!		
   1.246 +//! @SYMPREQ 			CR0973
   1.247 +//! @SYMREQ 			REQ1581.5
   1.248 +//! @SYMTestPriority 		Critical
   1.249 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.250 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.251 +//! @SYMTestType 		CIT
   1.252 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.253 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002
   1.254 +END_TESTCASE 			SEC-PKCS10-EXT-0002
   1.255 +
   1.256 +START_TESTCASE 			SEC-PKCS10-EXT-0003
   1.257 +//! @SYMTestCaseID 		SEC-PKCS10-EXT-0003
   1.258 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.259 +//!		     		certificate requests including extension requestsusing the parameters listed below.
   1.260 +//!		  		Key Algorithm: RSA
   1.261 +//!				Key size: 2048 bits 
   1.262 +//!		     	   	Digest Algorithm: MD5 
   1.263 +//!				Number of attributes: 2 (challenge password and structured name)
   1.264 +//!				Extensions used: basic Constraints,
   1.265 +//!					 subject Alt Name,
   1.266 +//!					 issuer Alt Name, 
   1.267 +//!			                 key Usage,
   1.268 +//!                                      extended Key Usage,
   1.269 +//!					 authority Info Access 
   1.270 +//!		
   1.271 +//! @SYMPREQ 			CR0973
   1.272 +//! @SYMREQ 			REQ1581.5
   1.273 +//! @SYMTestPriority 		Critical
   1.274 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.275 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.276 +//! @SYMTestType 		CIT
   1.277 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.278 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003
   1.279 +END_TESTCASE 			SEC-PKCS10-EXT-0003
   1.280 +
   1.281 +START_TESTCASE 			SEC-PKCS10-EXT-0004
   1.282 +//! @SYMTestCaseID 		SEC-PKCS10-EXT-0004
   1.283 +//! @SYMTestCaseDesc 		check that CPKCS10Request class generates correct encoding for 
   1.284 +//!		     		certificate requests including extension requestsusing the parameters listed below.
   1.285 +//!		  		Key Algorithm: DSA
   1.286 +//!				Key size: 2048 bits 
   1.287 +//!		        	Digest Algorithm: SHA1 
   1.288 +//!				Number of attributes: 2 (challenge password and structured name)
   1.289 +//!				Extensions used: basic Constraints,
   1.290 +//!					 subject Alt Name,
   1.291 +//!					 issuer Alt Name, 
   1.292 +//!			                 key Usage,
   1.293 +//!                                      extended Key Usage,
   1.294 +//!					 authority Info Access 
   1.295 +//!		
   1.296 +//! @SYMPREQ 			CR0973
   1.297 +//! @SYMREQ 			REQ1581.5
   1.298 +//! @SYMTestPriority 		Critical
   1.299 +//! @SYMTestActions 		PKCS10 certificate request construction.
   1.300 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.301 +//! @SYMTestType 		CIT
   1.302 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.303 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004
   1.304 +END_TESTCASE 			SEC-PKCS10-EXT-0004
   1.305 +
   1.306 +START_TESTCASE 			SEC-PKCS10-OOM-0001
   1.307 +//! @SYMTestCaseID 		SEC-PKCS10-OOM-0001
   1.308 +//! @SYMTestCaseDesc 		To check that CPKCS10Request class can manage out of memory conditions graciously
   1.309 +//!		  		Use the following parameters:
   1.310 +//!				Key Algorithm: RSA
   1.311 +//!				Key size: 512 bits 
   1.312 +//!		     		   Digest Algorithm: SHA1 
   1.313 +//!				Number of attributes: 2
   1.314 +//!		
   1.315 +//! @SYMPREQ 			CR0973
   1.316 +//! @SYMREQ 			REQ1581.5
   1.317 +//! @SYMTestPriority 		Critical
   1.318 +//! @SYMTestActions 		PKCS10 certificate request construction in OOM conditions.
   1.319 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.320 +//! @SYMTestType 		CIT
   1.321 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.322 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001
   1.323 +END_TESTCASE 			SEC-PKCS10-OOM-0001
   1.324 +
   1.325 +START_TESTCASE 			SEC-PKCS10-OOM-0002
   1.326 +//! @SYMTestCaseID 		SEC-PKCS10-OOM-0002
   1.327 +//! @SYMTestCaseDesc 		To check that CPKCS10Request class can manage out of memory conditions graciously
   1.328 +//!		  		Use the following parameters:
   1.329 +//!				Key Algorithm: DSA
   1.330 +//!				Key size: 512 bits 
   1.331 +//!		       		 Digest Algorithm: SHA1 
   1.332 +//!				Number of attributes: 2
   1.333 +//! @SYMPREQ 			CR0973
   1.334 +//! @SYMREQ 			REQ1581.5
   1.335 +//! @SYMTestPriority 		Critical
   1.336 +//! @SYMTestActions 		PKCS10 certificate request construction in OOM conditions.
   1.337 +//! @SYMTestExpectedResults 	Encoding successfully validated
   1.338 +//! @SYMTestType 		CIT
   1.339 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.340 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002
   1.341 +END_TESTCASE 			SEC-PKCS10-OOM-0002
   1.342 +
   1.343 +START_TESTCASE 			SEC-PKCS10-REU-0001
   1.344 +//! @SYMTestCaseID 		SEC-PKCS10-REU-0001
   1.345 +//! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.		
   1.346 +//! @SYMPREQ 			CR0973
   1.347 +//! @SYMREQ 			REQ1581.5
   1.348 +//! @SYMTestPriority 		Critical
   1.349 +//! @SYMTestActions 		Create CPKCS10Attribute test object using using valid values.
   1.350 +//!					Use GetEncodingLC to retrieve ASN1 value from this instance.
   1.351 +//!					Use Reset method of CPKCS10Attribute test object with appropriate parameters.
   1.352 +//!					Use GetEncodingLC method again to check that new ASN1 value had been 
   1.353 +//!					updated correctly. 
   1.354 +//!
   1.355 +//! @SYMTestExpectedResults 	Encoding matches in both cases.
   1.356 +//! @SYMTestType 		CIT
   1.357 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.358 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001
   1.359 +END_TESTCASE 			SEC-PKCS10-REU-0001
   1.360 +
   1.361 +START_TESTCASE 			SEC-PKCS10-REU-0002
   1.362 +//! @SYMTestCaseID 		SEC-PKCS10-REU-0002
   1.363 +//! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.	
   1.364 +//! @SYMPREQ 			CR0973
   1.365 +//! @SYMREQ 			REQ1581.5
   1.366 +//! @SYMTestPriority 		Critical
   1.367 +//! @SYMTestActions     	Create CPKCS10Attribute instance with appropiate values
   1.368 +//!                     	GetEncodingLC from test instance
   1.369 +//!                     	repopulate data using appropiate methods 
   1.370 +//! 				request a new cert request	
   1.371 +//! @SYMTestExpectedResults 	New cert request in created correctly
   1.372 +//! @SYMTestType 		CIT
   1.373 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.374 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002
   1.375 +END_TESTCASE 			SEC-PKCS10-REU-0002
   1.376 +
   1.377 +START_TESTCASE 			SEC-PKCS10-REU-0003
   1.378 +//! @SYMTestCaseID 		SEC-PKCS10-REU-0003
   1.379 +//! @SYMTestCaseDesc  		To check that a CPKCS10Attribute can be reused with new values.	
   1.380 +//! @SYMPREQ 			CR0973
   1.381 +//! @SYMREQ 			REQ1581.5
   1.382 +//! @SYMTestPriority 		Critical
   1.383 +//! @SYMTestActions    		Create CPKCS10Attribute instance with appropiate values
   1.384 +//!                     	GetEncodingLC from test instance
   1.385 +//!                     	Do not repopulate data.
   1.386 +//! 				request a new cert request	
   1.387 +//! @SYMTestExpectedResults 	New cert request in created correctly
   1.388 +//! @SYMTestType 		CIT
   1.389 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.390 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003
   1.391 +END_TESTCASE 			SEC-PKCS10-REU-0003
   1.392 +
   1.393 +START_TESTCASE 			SEC-PKCS10-REU-0004
   1.394 +//! @SYMTestCaseID 		SEC-PKCS10-REU-0004
   1.395 +//! @SYMTestCaseDesc  		To check that a CPKCS9ChallengePasswordAttr can be reused with new values.
   1.396 +//! @SYMPREQ 			CR0973
   1.397 +//! @SYMREQ 			REQ1581.5
   1.398 +//! @SYMTestPriority 		Critical
   1.399 +//! @SYMTestActions 		Create CPKCS9ChallengePasswordAttr test object using valid value.
   1.400 +//!					Use GetEncodingLC to retrieve ASN1 value from this instance.
   1.401 +//!					Use Reset method of CPKCS9ChallengePasswordAttr test object 
   1.402 +//!					with appropriate parameter.
   1.403 +//!					Use GetEncodingLC method again to check that new ASN1 value 
   1.404 +//!					had been updated correctly. 
   1.405 +//! @SYMTestExpectedResults 	Encoding matches in both cases.
   1.406 +//! @SYMTestType 		CIT
   1.407 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.408 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004
   1.409 +END_TESTCASE 			SEC-PKCS10-REU-0004
   1.410 +
   1.411 +START_TESTCASE 			SEC-PKCS10-REU-0005
   1.412 +//! @SYMTestCaseID 		SEC-PKCS10-REU-0005
   1.413 +//! @SYMTestCaseDesc  		To check that a CPKCS10GenericAttr can be reused with new values.
   1.414 +//! @SYMPREQ 			CR0973
   1.415 +//! @SYMREQ 			REQ1581.5
   1.416 +//! @SYMTestPriority 		Critical
   1.417 +//! @SYMTestActions 		Create CPKCS9ExtensionRequestAttr test object using valid values.
   1.418 +//!					Use GetEncodingLC to retrieve ASN1 value from this instance.
   1.419 +//!					Use ResetL method of CPKCS9ExtensionRequestAttr test object 
   1.420 +//!					with appropriate parameters.
   1.421 +//!					Use GetEncodingLC method again to check that new ASN1 value had 
   1.422 +//!					been updated correctly. 
   1.423 +//! @SYMTestExpectedResults Encoding matches in both cases.
   1.424 +//! @SYMTestType 		CIT
   1.425 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.426 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005
   1.427 +END_TESTCASE 			SEC-PKCS10-REU-0005
   1.428 +
   1.429 +START_TESTCASE 			SEC-PKCS10-NEG-0001
   1.430 +//! @SYMTestCaseID 		SEC-PKCS10-NEG-0001
   1.431 +//! @SYMTestCaseDesc 		Check that CPKCS10GenericAttr class returns a 
   1.432 +//!				KErrBadDescriptor (or KErrArgument) when its methods are used with 
   1.433 +//!				invalid/null value parameters. 
   1.434 +//! @SYMPREQ 			CR0973
   1.435 +//! @SYMREQ 			REQ1581.5
   1.436 +//! @SYMTestPriority 		Critical
   1.437 +//! @SYMTestActions 		PKCS10 CPKCS10GenericAttr construction
   1.438 +//! @SYMTestExpectedResults 	Returns KErrBadDescriptor (or KErrArgument)
   1.439 +//! @SYMTestType 		CIT
   1.440 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.441 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001
   1.442 +END_TESTCASE 			SEC-PKCS10-NEG-0001
   1.443 +
   1.444 +START_TESTCASE 			SEC-PKCS10-NEG-0002
   1.445 +//! @SYMTestCaseID 		SEC-PKCS10-NEG-0002
   1.446 +//! @SYMTestCaseDesc 		Check that CPKCS9ChallengePasswordAttr class returns a 
   1.447 +//!				KErrArgument when its methods are used with null value parameters. 
   1.448 +//! @SYMPREQ 			CR0973
   1.449 +//! @SYMREQ 			REQ1581.5
   1.450 +//! @SYMTestPriority 		Critical
   1.451 +//! @SYMTestActions 		PKCS10 CPKCS9ChallengePasswordAttr construction
   1.452 +//! @SYMTestExpectedResults 	Returns KErrArgument
   1.453 +//! @SYMTestType 		CIT
   1.454 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.455 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002
   1.456 +END_TESTCASE 			SEC-PKCS10-NEG-0002
   1.457 +
   1.458 +START_TESTCASE 			SEC-PKCS10-NEG-0003
   1.459 +//! @SYMTestCaseID 		SEC-PKCS10-NEG-0003
   1.460 +//! @SYMTestCaseDesc 		Check that CPKCS9ExtensionRequestAttr class can recognise 
   1.461 +//!				when application is trying to add malformed or un-initialised cert 
   1.462 +//!				extension object to extension request.
   1.463 +//! @SYMPREQ 			CR0973
   1.464 +//! @SYMREQ 			REQ1581.5
   1.465 +//! @SYMTestPriority 		Critical
   1.466 +//! @SYMTestActions 		PKCS10 CPKCS9ExtensionRequestAttr construction.
   1.467 +//! @SYMTestExpectedResults 	Returns KErrBadDescriptor
   1.468 +//! @SYMTestType 		CIT
   1.469 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.470 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003
   1.471 +END_TESTCASE 			SEC-PKCS10-NEG-0003
   1.472 +
   1.473 +START_TESTCASE 			SEC-PKCS10-NEG-0004
   1.474 +//! @SYMTestCaseID 		SEC-PKCS10-NEG-0004
   1.475 +//! @SYMTestCaseDesc 		Check that CPKCS9ExtensionRequestAttr class returns a 
   1.476 +//!				KErrArgument when its methods are used with null value parameters.
   1.477 +//! @SYMPREQ 			CR0973
   1.478 +//! @SYMREQ 			REQ1581.5
   1.479 +//! @SYMTestPriority 		Critical
   1.480 +//! @SYMTestActions 		PKCS10 CPKCS9ExtensionRequestAttr construction
   1.481 +//! @SYMTestExpectedResults 	Returns KErrArgument
   1.482 +//! @SYMTestType 		CIT
   1.483 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.484 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004
   1.485 +END_TESTCASE 			SEC-PKCS10-NEG-0004
   1.486 +
   1.487 +START_TESTCASE 			SEC-PKCS10-NEG-0005
   1.488 +//! @SYMTestCaseID 		SEC-PKCS10-NEG-0005
   1.489 +//! @SYMTestCaseDesc 		Check that CPKCS10Request class returns a KErrArgument when 
   1.490 +//!				its methods are used with invalid value parameters.
   1.491 +//! @SYMPREQ 			CR0973
   1.492 +//! @SYMREQ 			REQ1581.5
   1.493 +//! @SYMTestPriority 		Critical
   1.494 +//! @SYMTestActions 		PKCS10 CPKCS10Request construction.
   1.495 +//! @SYMTestExpectedResults 	Returns KErrArgument
   1.496 +//! @SYMTestType 		CIT
   1.497 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.498 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005
   1.499 +END_TESTCASE 			SEC-PKCS10-NEG-0005
   1.500 +
   1.501 +START_TESTCASE 			SEC-PKCS10-DEF103311-0001
   1.502 +//! @SYMTestCaseID 		SEC-PKCS10-DEF103311-0001
   1.503 +//! @SYMTestCaseDesc 		Test case added for defect DEF103311, increases test coverage for PKCS1-
   1.504 +//! @SYMREQ 			REQ0000
   1.505 +//! @SYMTestPriority 		Critical
   1.506 +//! @SYMTestActions 		Creates a CPKCS10Request and then cancels it. 
   1.507 +//! @SYMTestExpectedResults 	Returns KErrNone, no memory leak.
   1.508 +//! @SYMTestType 		CIT
   1.509 +RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
   1.510 +RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001
   1.511 +END_TESTCASE 			SEC-PKCS10-DEF103311-0001
   1.512 +
   1.513 +//Post- test: re-states key store file
   1.514 +RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat 
   1.515 +RUN_UTILS DeleteFile c:\keys.dat 
   1.516 +
   1.517 +PRINT Complete_tpkcs10serverv2_Tests