os/security/cryptoservices/certificateandkeymgmt/tpkcs10/scripts/tpkcs10_v2.script
First public contribution.
2 // Copyright (c) 2009 Nokia Corporation and/or its subsidiary(-ies).
3 // All rights reserved.
4 // This component and the accompanying materials are made available
5 // under the terms of the License "Eclipse Public License v1.0"
6 // which accompanies this distribution, and is available
7 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
9 // Initial Contributors:
10 // Nokia Corporation - initial contribution.
17 PRINT Run Positive and OOM tests tpkcs1010serverv2 Suite
19 LOAD_SUITE tpkcs10serverv2
21 // pre- test: move out of the way key store file.
22 RUN_UTILS CopyFile c:\private\101f72a6\keys.dat c:\keys.dat
23 START_TESTCASE SEC-PKCS10-RSA-0001
24 //! @SYMTestCaseID SEC-PKCS10-RSA-0001
25 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
26 //! certificate requests using the parameters listed below.
27 //! Key Algorithm: RSA
28 //! Key size: 512 bits
29 //! Digest Algorithm: SHA1
30 //! Number of attributes: 0
33 //! @SYMTestPriority Critical
34 //! @SYMTestActions PKCS10 certificate request construction.
35 //! @SYMTestExpectedResults Encoding successfully validated
37 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
38 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0001
39 END_TESTCASE SEC-PKCS10-RSA-0001
41 START_TESTCASE SEC-PKCS10-RSA-0002
42 //! @SYMTestCaseID SEC-PKCS10-RSA-0002
43 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
44 //! certificate requests using the parameters listed below.
45 //! Key Algorithm: RSA
46 //! Key size: 512 bits
47 //! Digest Algorithm: MD2
48 //! Number of attributes: 0
51 //! @SYMTestPriority Critical
52 //! @SYMTestActions PKCS10 certificate request construction.
53 //! @SYMTestExpectedResults Encoding successfully validated
55 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
56 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0002
57 END_TESTCASE SEC-PKCS10-RSA-0002
59 START_TESTCASE SEC-PKCS10-RSA-0003
61 //! @SYMTestCaseID SEC-PKCS10-RSA-0003
62 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
63 //! certificate requests using the parameters listed below.
64 //! Key Algorithm: RSA
65 //! Key size: 512 bits
66 //! Digest Algorithm: MD5
67 //! Number of attributes: 0
70 //! @SYMTestPriority Critical
71 //! @SYMTestActions PKCS10 certificate request construction.
72 //! @SYMTestExpectedResults Encoding successfully validated
74 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
75 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0003
76 END_TESTCASE SEC-PKCS10-RSA-0003
78 START_TESTCASE SEC-PKCS10-RSA-0004
79 //! @SYMTestCaseID SEC-PKCS10-RSA-0004
80 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
81 //! certificate requests using the parameters listed below.
82 //! Key Algorithm: RSA
83 //! Key size: 512 bits
84 //! Digest Algorithm: SHA1
85 //! Number of attributes: 1 (challenge password)
88 //! @SYMTestPriority Critical
89 //! @SYMTestActions PKCS10 certificate request construction.
90 //! @SYMTestExpectedResults Encoding successfully validated
92 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
93 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0004
94 END_TESTCASE SEC-PKCS10-RSA-0004
96 START_TESTCASE SEC-PKCS10-RSA-0005
97 //! @SYMTestCaseID SEC-PKCS10-RSA-0005
98 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
99 //! certificate requests using the parameters listed below.
100 //! Key Algorithm: RSA
101 //! Key size: 512 bits
102 //! Digest Algorithm: SHA1
103 //! Number of attributes: 2 (challenge password and structured name)
105 //! @SYMREQ REQ1581.5
106 //! @SYMTestPriority Critical
107 //! @SYMTestActions PKCS10 certificate request construction.
108 //! @SYMTestExpectedResults Encoding successfully validated
110 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
111 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0005
112 END_TESTCASE SEC-PKCS10-RSA-0005
114 START_TESTCASE SEC-PKCS10-RSA-0006
115 //! @SYMTestCaseID SEC-PKCS10-RSA-0006
116 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
117 //! certificate requests using the parameters listed below.
118 //! Key Algorithm: RSA
119 //! Key size: 2048 bits
120 //! Digest Algorithm: SHA1
121 //! Number of attributes: 2 (challenge password and structured name)
123 //! @SYMREQ REQ1581.5
124 //! @SYMTestPriority Critical
125 //! @SYMTestActions PKCS10 certificate request construction.
126 //! @SYMTestExpectedResults Encoding successfully validated
128 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
129 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-RSA-0006
130 END_TESTCASE SEC-PKCS10-RSA-0006
132 START_TESTCASE SEC-PKCS10-DSA-0001
133 //! @SYMTestCaseID SEC-PKCS10-DSA-0001
134 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
135 //! certificate requests using the parameters listed below.
136 //! Key Algorithm: DSA
137 //! Key size: 512 bits
138 //! Digest Algorithm: SHA1
139 //! Number of attributes: 0
141 //! @SYMREQ REQ1581.5
142 //! @SYMTestPriority Critical
143 //! @SYMTestActions PKCS10 certificate request construction.
144 //! @SYMTestExpectedResults Encoding successfully validated
146 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
147 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0001
148 END_TESTCASE SEC-PKCS10-DSA-0001
150 START_TESTCASE SEC-PKCS10-DSA-0002
151 //! @SYMTestCaseID SEC-PKCS10-DSA-0002
152 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
153 //! certificate requests using the parameters listed below.
154 //! Key Algorithm: DSA
155 //! Key size: 512 bits
156 //! Digest Algorithm: SHA1
157 //! Number of attributes: 1 (challenge password)
159 //! @SYMREQ REQ1581.5
160 //! @SYMTestPriority Critical
161 //! @SYMTestActions PKCS10 certificate request construction.
162 //! @SYMTestExpectedResults Encoding successfully validated
164 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
165 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0002
166 END_TESTCASE SEC-PKCS10-DSA-0002
168 START_TESTCASE SEC-PKCS10-DSA-0003
169 //! @SYMTestCaseID SEC-PKCS10-DSA-0003
170 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
171 //! certificate requests using the parameters listed below.
172 //! Key Algorithm: DSA
173 //! Key size: 512 bits
174 //! Digest Algorithm: SHA1
175 //! Number of attributes: 2 (challenge password and structured name)
177 //! @SYMREQ REQ1581.5
178 //! @SYMTestPriority Critical
179 //! @SYMTestActions PKCS10 certificate request construction.
180 //! @SYMTestExpectedResults Encoding successfully validated
182 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
183 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0003
184 END_TESTCASE SEC-PKCS10-DSA-0003
186 START_TESTCASE SEC-PKCS10-DSA-0004
187 //! @SYMTestCaseID SEC-PKCS10-DSA-0004
188 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
189 //! certificate requests using the parameters listed below.
190 //! Key Algorithm: DSA
191 //! Key size: 2048 bits
192 //! Digest Algorithm: SHA1
193 //! Number of attributes: 2 (challenge password and structured name)
195 //! @SYMREQ REQ1581.5
196 //! @SYMTestPriority Critical
197 //! @SYMTestActions PKCS10 certificate request construction.
198 //! @SYMTestExpectedResults Encoding successfully validated
200 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
201 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-DSA-0004
202 END_TESTCASE SEC-PKCS10-DSA-0004
204 START_TESTCASE SEC-PKCS10-EXT-0001
205 //! @SYMTestCaseID SEC-PKCS10-EXT-0001
206 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
207 //! certificate requests including extension requestsusing the parameters listed below.
208 //! Key Algorithm: RSA
209 //! Key size: 2048 bits
210 //! Digest Algorithm: SHA1
211 //! Number of attributes: 2 (challenge password and structured name)
212 //! Extensions used: basic Constraints,
213 //! subject Alt Name,
216 //! extended Key Usage,
217 //! authority Info Access
219 //! @SYMREQ REQ1581.5
220 //! @SYMTestPriority Critical
221 //! @SYMTestActions PKCS10 certificate request construction.
222 //! @SYMTestExpectedResults Encoding successfully validated
224 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
225 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0001
226 END_TESTCASE SEC-PKCS10-EXT-0001
228 START_TESTCASE SEC-PKCS10-EXT-0002
229 //! @SYMTestCaseID SEC-PKCS10-EXT-0002
230 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
231 //! certificate requests including extension requestsusing the parameters listed below.
232 //! Key Algorithm: RSA
233 //! Key size: 2048 bits
234 //! Digest Algorithm: MD2
235 //! Number of attributes: 2 (challenge password and structured name)
236 //! Extensions used: basic Constraints,
237 //! subject Alt Name,
240 //! extended Key Usage,
241 //! authority Info Access
244 //! @SYMREQ REQ1581.5
245 //! @SYMTestPriority Critical
246 //! @SYMTestActions PKCS10 certificate request construction.
247 //! @SYMTestExpectedResults Encoding successfully validated
249 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
250 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0002
251 END_TESTCASE SEC-PKCS10-EXT-0002
253 START_TESTCASE SEC-PKCS10-EXT-0003
254 //! @SYMTestCaseID SEC-PKCS10-EXT-0003
255 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
256 //! certificate requests including extension requestsusing the parameters listed below.
257 //! Key Algorithm: RSA
258 //! Key size: 2048 bits
259 //! Digest Algorithm: MD5
260 //! Number of attributes: 2 (challenge password and structured name)
261 //! Extensions used: basic Constraints,
262 //! subject Alt Name,
265 //! extended Key Usage,
266 //! authority Info Access
269 //! @SYMREQ REQ1581.5
270 //! @SYMTestPriority Critical
271 //! @SYMTestActions PKCS10 certificate request construction.
272 //! @SYMTestExpectedResults Encoding successfully validated
274 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
275 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0003
276 END_TESTCASE SEC-PKCS10-EXT-0003
278 START_TESTCASE SEC-PKCS10-EXT-0004
279 //! @SYMTestCaseID SEC-PKCS10-EXT-0004
280 //! @SYMTestCaseDesc check that CPKCS10Request class generates correct encoding for
281 //! certificate requests including extension requestsusing the parameters listed below.
282 //! Key Algorithm: DSA
283 //! Key size: 2048 bits
284 //! Digest Algorithm: SHA1
285 //! Number of attributes: 2 (challenge password and structured name)
286 //! Extensions used: basic Constraints,
287 //! subject Alt Name,
290 //! extended Key Usage,
291 //! authority Info Access
294 //! @SYMREQ REQ1581.5
295 //! @SYMTestPriority Critical
296 //! @SYMTestActions PKCS10 certificate request construction.
297 //! @SYMTestExpectedResults Encoding successfully validated
299 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
300 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-EXT-0004
301 END_TESTCASE SEC-PKCS10-EXT-0004
303 START_TESTCASE SEC-PKCS10-OOM-0001
304 //! @SYMTestCaseID SEC-PKCS10-OOM-0001
305 //! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
306 //! Use the following parameters:
307 //! Key Algorithm: RSA
308 //! Key size: 512 bits
309 //! Digest Algorithm: SHA1
310 //! Number of attributes: 2
313 //! @SYMREQ REQ1581.5
314 //! @SYMTestPriority Critical
315 //! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
316 //! @SYMTestExpectedResults Encoding successfully validated
318 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
319 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0001
320 END_TESTCASE SEC-PKCS10-OOM-0001
322 START_TESTCASE SEC-PKCS10-OOM-0002
323 //! @SYMTestCaseID SEC-PKCS10-OOM-0002
324 //! @SYMTestCaseDesc To check that CPKCS10Request class can manage out of memory conditions graciously
325 //! Use the following parameters:
326 //! Key Algorithm: DSA
327 //! Key size: 512 bits
328 //! Digest Algorithm: SHA1
329 //! Number of attributes: 2
331 //! @SYMREQ REQ1581.5
332 //! @SYMTestPriority Critical
333 //! @SYMTestActions PKCS10 certificate request construction in OOM conditions.
334 //! @SYMTestExpectedResults Encoding successfully validated
336 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
337 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-OOM-0002
338 END_TESTCASE SEC-PKCS10-OOM-0002
340 START_TESTCASE SEC-PKCS10-REU-0001
341 //! @SYMTestCaseID SEC-PKCS10-REU-0001
342 //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
344 //! @SYMREQ REQ1581.5
345 //! @SYMTestPriority Critical
346 //! @SYMTestActions Create CPKCS10Attribute test object using using valid values.
347 //! Use GetEncodingLC to retrieve ASN1 value from this instance.
348 //! Use Reset method of CPKCS10Attribute test object with appropriate parameters.
349 //! Use GetEncodingLC method again to check that new ASN1 value had been
350 //! updated correctly.
352 //! @SYMTestExpectedResults Encoding matches in both cases.
354 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
355 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseAttribute c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0001
356 END_TESTCASE SEC-PKCS10-REU-0001
358 START_TESTCASE SEC-PKCS10-REU-0002
359 //! @SYMTestCaseID SEC-PKCS10-REU-0002
360 //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
362 //! @SYMREQ REQ1581.5
363 //! @SYMTestPriority Critical
364 //! @SYMTestActions Create CPKCS10Attribute instance with appropiate values
365 //! GetEncodingLC from test instance
366 //! repopulate data using appropiate methods
367 //! request a new cert request
368 //! @SYMTestExpectedResults New cert request in created correctly
370 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
371 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0002
372 END_TESTCASE SEC-PKCS10-REU-0002
374 START_TESTCASE SEC-PKCS10-REU-0003
375 //! @SYMTestCaseID SEC-PKCS10-REU-0003
376 //! @SYMTestCaseDesc To check that a CPKCS10Attribute can be reused with new values.
378 //! @SYMREQ REQ1581.5
379 //! @SYMTestPriority Critical
380 //! @SYMTestActions Create CPKCS10Attribute instance with appropiate values
381 //! GetEncodingLC from test instance
382 //! Do not repopulate data.
383 //! request a new cert request
384 //! @SYMTestExpectedResults New cert request in created correctly
386 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
387 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CertRequest c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0003
388 END_TESTCASE SEC-PKCS10-REU-0003
390 START_TESTCASE SEC-PKCS10-REU-0004
391 //! @SYMTestCaseID SEC-PKCS10-REU-0004
392 //! @SYMTestCaseDesc To check that a CPKCS9ChallengePasswordAttr can be reused with new values.
394 //! @SYMREQ REQ1581.5
395 //! @SYMTestPriority Critical
396 //! @SYMTestActions Create CPKCS9ChallengePasswordAttr test object using valid value.
397 //! Use GetEncodingLC to retrieve ASN1 value from this instance.
398 //! Use Reset method of CPKCS9ChallengePasswordAttr test object
399 //! with appropriate parameter.
400 //! Use GetEncodingLC method again to check that new ASN1 value
401 //! had been updated correctly.
402 //! @SYMTestExpectedResults Encoding matches in both cases.
404 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
405 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseChallengePasswordAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0004
406 END_TESTCASE SEC-PKCS10-REU-0004
408 START_TESTCASE SEC-PKCS10-REU-0005
409 //! @SYMTestCaseID SEC-PKCS10-REU-0005
410 //! @SYMTestCaseDesc To check that a CPKCS10GenericAttr can be reused with new values.
412 //! @SYMREQ REQ1581.5
413 //! @SYMTestPriority Critical
414 //! @SYMTestActions Create CPKCS9ExtensionRequestAttr test object using valid values.
415 //! Use GetEncodingLC to retrieve ASN1 value from this instance.
416 //! Use ResetL method of CPKCS9ExtensionRequestAttr test object
417 //! with appropriate parameters.
418 //! Use GetEncodingLC method again to check that new ASN1 value had
419 //! been updated correctly.
420 //! @SYMTestExpectedResults Encoding matches in both cases.
422 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
423 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10ReuseExtensionAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-REU-0005
424 END_TESTCASE SEC-PKCS10-REU-0005
426 START_TESTCASE SEC-PKCS10-NEG-0001
427 //! @SYMTestCaseID SEC-PKCS10-NEG-0001
428 //! @SYMTestCaseDesc Check that CPKCS10GenericAttr class returns a
429 //! KErrBadDescriptor (or KErrArgument) when its methods are used with
430 //! invalid/null value parameters.
432 //! @SYMREQ REQ1581.5
433 //! @SYMTestPriority Critical
434 //! @SYMTestActions PKCS10 CPKCS10GenericAttr construction
435 //! @SYMTestExpectedResults Returns KErrBadDescriptor (or KErrArgument)
437 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
438 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10GenericAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0001
439 END_TESTCASE SEC-PKCS10-NEG-0001
441 START_TESTCASE SEC-PKCS10-NEG-0002
442 //! @SYMTestCaseID SEC-PKCS10-NEG-0002
443 //! @SYMTestCaseDesc Check that CPKCS9ChallengePasswordAttr class returns a
444 //! KErrArgument when its methods are used with null value parameters.
446 //! @SYMREQ REQ1581.5
447 //! @SYMTestPriority Critical
448 //! @SYMTestActions PKCS10 CPKCS9ChallengePasswordAttr construction
449 //! @SYMTestExpectedResults Returns KErrArgument
451 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
452 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ChPwdAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0002
453 END_TESTCASE SEC-PKCS10-NEG-0002
455 START_TESTCASE SEC-PKCS10-NEG-0003
456 //! @SYMTestCaseID SEC-PKCS10-NEG-0003
457 //! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class can recognise
458 //! when application is trying to add malformed or un-initialised cert
459 //! extension object to extension request.
461 //! @SYMREQ REQ1581.5
462 //! @SYMTestPriority Critical
463 //! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction.
464 //! @SYMTestExpectedResults Returns KErrBadDescriptor
466 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
467 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS9ExtReqAttr c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0003
468 END_TESTCASE SEC-PKCS10-NEG-0003
470 START_TESTCASE SEC-PKCS10-NEG-0004
471 //! @SYMTestCaseID SEC-PKCS10-NEG-0004
472 //! @SYMTestCaseDesc Check that CPKCS9ExtensionRequestAttr class returns a
473 //! KErrArgument when its methods are used with null value parameters.
475 //! @SYMREQ REQ1581.5
476 //! @SYMTestPriority Critical
477 //! @SYMTestActions PKCS10 CPKCS9ExtensionRequestAttr construction
478 //! @SYMTestExpectedResults Returns KErrArgument
480 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
481 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Attributes c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0004
482 END_TESTCASE SEC-PKCS10-NEG-0004
484 START_TESTCASE SEC-PKCS10-NEG-0005
485 //! @SYMTestCaseID SEC-PKCS10-NEG-0005
486 //! @SYMTestCaseDesc Check that CPKCS10Request class returns a KErrArgument when
487 //! its methods are used with invalid value parameters.
489 //! @SYMREQ REQ1581.5
490 //! @SYMTestPriority Critical
491 //! @SYMTestActions PKCS10 CPKCS10Request construction.
492 //! @SYMTestExpectedResults Returns KErrArgument
494 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
495 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10NegPKCS10Request c:\tpkcs10\scripts\tpkcs10_v2.ini SEC-PKCS10-NEG-0005
496 END_TESTCASE SEC-PKCS10-NEG-0005
498 START_TESTCASE SEC-PKCS10-DEF103311-0001
499 //! @SYMTestCaseID SEC-PKCS10-DEF103311-0001
500 //! @SYMTestCaseDesc Test case added for defect DEF103311, increases test coverage for PKCS1-
502 //! @SYMTestPriority Critical
503 //! @SYMTestActions Creates a CPKCS10Request and then cancels it.
504 //! @SYMTestExpectedResults Returns KErrNone, no memory leak.
506 RUN_UTILS DeleteFile c:\private\101f72a6\keys.dat
507 RUN_TEST_STEP 500 tpkcs10serverv2 PKCS10CancelRequestA c:\tpkcs10\scripts\tpkcs10_v2.ini DEF103311-0001
508 END_TESTCASE SEC-PKCS10-DEF103311-0001
510 //Post- test: re-states key store file
511 RUN_UTILS CopyFile c:\keys.dat c:\private\101f72a6\keys.dat
512 RUN_UTILS DeleteFile c:\keys.dat
514 PRINT Complete_tpkcs10serverv2_Tests